Blog Listing

Teaser Feature Image
5 More Considerations for Healthcare Organizations Building a Patient Data Privacy and Security Plan (Part 2 of 2)
When devising a patient data privacy and security plan, healthcare organizations need to consider these five things to ensure they leave no gaps.
Teaser Feature Image
5 Hospital Cybersecurity Considerations to Make During a Merger and Acquisition
What do hospital cybersecurity teams need to consider during a merger and acquisition? Find out in this post, which highlights five top considerations for teams to keep in mind during big changes.
Teaser Feature Image
5 Common Social Engineering Tactics and How to Identify Them
Explore the 5 most common social engineering tactics and learn the telltale signs to identify them and avoid attacks in this post.
Teaser Feature Image
5 Business Benefits of Monitoring Salesforce Login Activity
What are the top 5 business benefits of monitoring Salesforce login activity? You might catch someone logging in when they shouldn't be and stealing data. Find out more in this post.
Teaser Feature Image
4 Things You Can Quickly Learn From Monitoring Salesforce Data Exports
What can monitoring Salesforce data exports tell you? For one, the user might be departing your organization soon. Find out other insights you can learn from monitoring in this post.
Teaser Feature Image
4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do
To get the most value from Salesforce Event Monitoring, you must know what the tool does and doesn't do. Uncover the myths and facts and obtain more information by reading this post.
Teaser Feature Image
3 Salesforce Event Monitoring Facts and Misconceptions: Understanding What it Does (and Doesn’t) Do
Salesforce Event Monitoring is the only way to obtain your Salesforce user activity log files...true or false? Explore common myths about Event Monitoring in this eye-opening blog post.
Teaser Feature Image
3 Must-Have Capabilities Organizations Should Have to Prevent Data Theft in the Cloud in 2018
What tools and resources do you need to prevent mission-critical data from leaving your CRM? Discover three critical assets you should add to your security posture now.
Teaser Feature Image
Top HIMSS19 Sessions: Where We’ll Be This Week
As HIMSS19 ramps up, there are always far more sessions than any one person has time to attend. Here are the top HIMSS19 sessions we're most excited for at Imprivata FairWarning, including a few hot topics...
Teaser Feature Image
Complying with Privileged User Regulations: How One Firm Met GDPR, ISO 27001 in Salesforce
Find out how, like United Capital, you can protect data from privileged user abuse or misuse and comply with privileged user regulations.
Teaser Feature Image
Why Your Security Is Only as Good as Your Data Quality
Protecting EHR data from external threats is essential. But maintaining proper identity management practices and data quality is of equal importance. Learn why data quality matters.
Teaser Feature Image
Why Financial Services Companies Are Monitoring for Changes to Salesforce Permission Sets, Profiles
Salesforce’s flexible, layered data sharing model means you can dictate which data, objects, and fields users see, through Salesforce permission sets and profiles. Some companies take a blanket...
Teaser Feature Image
Who, What, When, Where: The Power of the Audit Trail in Data Security
We know very well that data security is critical and that sensitive information can be highly destructive and costly to an organization when it falls into the wrong hands. This rings especially...
Teaser Feature Image
What to Monitor in the Cloud: 2018 Cloud Visibility Report Reveals Blueprint to Success
Cloud spending is forecasted to reach $160 billion in 2018 – a 23.2 percent increase over 2017. Businesses around the globe are capturing the benefits of cloud technology to meet consumer demand...
Teaser Feature Image
What is the GDPR and How Can You Prepare?
In the past century, we have witnessed globalization interconnect the trade of goods and services around the world. But as we have evolved into a digital society, interconnectivity has become far...
Teaser Feature Image
What Is an Audit Trail, and Why Is It Important?
What is an audit trail? Audit trails are electronic captures of user activity in data management systems. How do they relate to data security?
Teaser Feature Image
Weekly Cloud Security Roundup: The Nordstrom Insider Threat, Jail Time for the C-Suite, and More
Each week, we'll bring you seven of the most compelling cloud- and Salesforce-security-related stories from the last seven days. This week, we have the Nordstrom insider threat, a new bill that...
Teaser Feature Image
Weekly Cloud Security Roundup: Starwood Data Breach Lawsuits Begin, Cybersecurity Predictions, and More
Each week, we’ll bring you seven of the most compelling cloud- and Salesforce-security-related stories from the last seven days. This week, we have updates on the Starwood data breach, 2019...
Teaser Feature Image
Weekly Cloud Security Roundup: Bank Data Security Weakened by Insiders, New Privacy Developments, and More
Each week, we’ll bring you seven of the most compelling cloud- and Salesforce-security-related stories from the last seven days. This week, we have updates on one of the biggest threats to bank...
Teaser Feature Image
Verizon Protected Health Information Data Breach Report 2018 Breakdown
Healthcare faces an advanced set of challenges to secure data compared to other industries. There’s no single contributing factor, but rather a wide array of industry obstacles that make securing...