Blog Listing

Image of the Imprivata booth at HIMSS23
HIMSS23 reflections: Customers, constraints, and cybersecurity
Imprivata CEO, Gus Malezis, reflects on a busy and successful HIMSS23 and shares what really left an impression.
Photos of hands using a mobile device
Imprivata OneSign is Google Chrome Enterprise Recommended for Clinicians
Imprivata OneSign compatibility with Google ChromeOS devices and the Chrome browser means fast, secure access, and better cost efficiency
Doctor looking at phone, typing on laptop
How healthcare organizations can maximize their cyber insurance strategies in 2022
According to several leading players, the cyber insurance industry is in the midst of a “crisis moment.” This has largely been driven by the rapidly growing prominence and sophistication of ransomware attacks over the last 12-18 months.
Image of a person looking at the monitor
Take a look at the improvements we’ve made to Imprivata Identity Governance 7.4
Discover the latest and greatest Imprivata Identity Governance has to offer...
Image of Claire Reilly
Humans of Healthcare: Claire Reilly, RN MSc
Our Humans of Healthcare series aims to spotlight medical professionals –the very foundation of our healthcare system. In it, we’ll share pain points they experience daily and solutions they’ve implemented to enhance workflows and improve care quality.
Image of a lock
4 ways that integrated access security helps in the fight against ransomware
Ransomware represents one of the most significant cybersecurity threats your organization will face. Here’s how integrated access security solutions can alleviate the risks associated with it.
Image of a doctor holding a bottle of pills
Ask a Pharmacist: What do federal EPCS mandates mean for me?
From the clinician to the pharmacist to the patient, there are many questions about what federal EPCS mandates could mean for public health. Drawing on her professional experience, PharmD Meg Flynn helps us answer some of those questions.
Image of people working on devices
Achieve privileged access goals and reduce burnout with PAM managed services
Technology keeps advancing while IT staffing shortages keep increasing. Maintain security and prevent IT team burnout with strong PAM managed services.
Image of a person accessing a locked device
What the NSA’s latest identity and access management guidance means for you
The NSA and CISA have shared actionable guidance for protection against evolving cyber threats to digital identities.
Image of a hand on a computer mouse, with graphics floating around
4 key takeaways from the new NSA report on Zero Trust and identity management
A new NSA report provides more clarity on how to achieve Zero Trust maturity for user access to IT systems
Image of a person using a phone, with symbols around
Epic data breach highlights issues with ad tracking pixel technology
A common digital advertising tactic may leave your patient or customer data vulnerable to a breach.
Image of people viewing a monitor
4 best practices for communicating with third-party vendors who need privileged access
Granting third-party vendors privileged access to your IT systems requires a well-defined plan and effective communication. Here are the best ways to ensure you have both.
Image of a person using a laptop, attempting to log in
Privileged access management helps organizations provide secure access to critical applications and data by addressing the very first security layer: the passwords
Take a look at the improvements we’ve made to Imprivata Privileged Access Management in the second half of 2022.
Image of a man surrounded by many monitors
7 best practices for securing your organization with access control
Access control is a vital step in cybersecurity because it secures the entry point of systems. Implementing the best access control practices to ward off cyber threats has never been so critical.
Image of a shield design
Three savvy strategies to improve the security experience
Balancing security and usability doesn’t need to be a daunting challenge. These strategies can help you strike the right balance.
Image of two doctors talking in a crowded lobby
How to prevent drug diversion using a holistic, tech-aided strategy
Drug diversion is a big problem. But a proactive, strategic approach can make a significant impact when it comes to recognizing and preventing it.
Image of a doctor speaking to a patient
4 steps to overcome patient misidentification
Patient misidentification is a problem that continues to plague healthcare organizations, but these steps help to make sure your HDO isn’t one of them.
Image of a nurse using a tablet
5 ransomware statistics and what they mean for healthcare IT decision-makers
In healthcare IT? Then these five statistics will change how you’re thinking about the security of your organization.
Image of two people viewing a device
3 signs your identity governance program may need a managed services component
Managed services may be the key to maturing your identity governance program. Here are some signs you might need to consider it.
Image of a person touching a hologram
Emerging from the multi-vendor quagmire
The move to one trusted vendor for your digital identity strategy may be easier than you think. And the consolidation brings both security and efficiency benefits.