Blog Listing

5 Types of Insider Threats in Healthcare – and How to Mitigate Them
Every healthcare organization needs to defend itself from a major security concern – insider threats. From the malicious worker to the careless employee, these are the insiders you need to thwart.
5 sobering statistics related to drug diversion: What does it mean for Healthcare privacy and security?
Drug diversion is a severe concern in the healthcare industry. These statistics demonstrate the devastation this problem can have on communities and organizations.
5 Reasons Why Privileged User Abuse is a Top Security Concern in the Cloud
Data security should prevent external attacks and insider threats because privileged user abuse is a top concern in the cloud. Find out more about preventing insider abuse in this article.
5 Predictions for Healthcare Data Security and Privacy in 2019
2019 is slated to be a big year for healthcare data security and privacy. Explore our predictions for the coming year and what we think the most impactful trends will be in the industry.
5 More Considerations for Healthcare Organizations Building a Patient Data Privacy and Security Plan (Part 2 of 2)
When devising a patient data privacy and security plan, healthcare organizations need to consider these five things to ensure they leave no gaps.
5 Hospital Cybersecurity Considerations to Make During a Merger and Acquisition
What do hospital cybersecurity teams need to consider during a merger and acquisition? Find out in this post, which highlights five top considerations for teams to keep in mind during big changes.
5 Common Social Engineering Tactics and How to Identify Them
Explore the 5 most common social engineering tactics and learn the telltale signs to identify them and avoid attacks in this post.
5 Business Benefits of Monitoring Salesforce Login Activity
What are the top 5 business benefits of monitoring Salesforce login activity? You might catch someone logging in when they shouldn't be and stealing data. Find out more in this post.
4 Things You Can Quickly Learn From Monitoring Salesforce Data Exports
What can monitoring Salesforce data exports tell you? For one, the user might be departing your organization soon. Find out other insights you can learn from monitoring in this post.
4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do
To get the most value from Salesforce Event Monitoring, you must know what the tool does and doesn't do. Uncover the myths and facts and obtain more information by reading this post.
3 Salesforce Event Monitoring Facts and Misconceptions: Understanding What it Does (and Doesn’t) Do
Salesforce Event Monitoring is the only way to obtain your Salesforce user activity log files...true or false? Explore common myths about Event Monitoring in this eye-opening blog post.
3 Must-Have Capabilities Organizations Should Have to Prevent Data Theft in the Cloud in 2018
What tools and resources do you need to prevent mission-critical data from leaving your CRM? Discover three critical assets you should add to your security posture now.
Top HIMSS19 Sessions: Where We’ll Be This Week
As HIMSS19 ramps up, there are always far more sessions than any one person has time to attend. Here are the top HIMSS19 sessions we're most excited for at Imprivata FairWarning, including a few hot topics...
Complying with Privileged User Regulations: How One Firm Met GDPR, ISO 27001 in Salesforce
Find out how, like United Capital, you can protect data from privileged user abuse or misuse and comply with privileged user regulations.
Why Your Security Is Only as Good as Your Data Quality
Protecting EHR data from external threats is essential. But maintaining proper identity management practices and data quality is of equal importance. Learn why data quality matters.
Why Financial Services Companies Are Monitoring for Changes to Salesforce Permission Sets, Profiles
Salesforce’s flexible, layered data sharing model means you can dictate which data, objects, and fields users see, through Salesforce permission sets and profiles. Some companies take a blanket...
Who, What, When, Where: The Power of the Audit Trail in Data Security
We know very well that data security is critical and that sensitive information can be highly destructive and costly to an organization when it falls into the wrong hands. This rings especially...
What to Monitor in the Cloud: 2018 Cloud Visibility Report Reveals Blueprint to Success
Cloud spending is forecasted to reach $160 billion in 2018 – a 23.2 percent increase over 2017. Businesses around the globe are capturing the benefits of cloud technology to meet consumer demand...
What is the GDPR and How Can You Prepare?
In the past century, we have witnessed globalization interconnect the trade of goods and services around the world. But as we have evolved into a digital society, interconnectivity has become far...
What Is an Audit Trail, and Why Is It Important?
What is an audit trail? Audit trails are electronic captures of user activity in data management systems. How do they relate to data security?