Blog Listing

Teaser Feature Image
Using Salesforce Shield to Monitor Salesforce Adoption, ROI
Are employees utilizing Salesforce the way you intended? What can lower performers learn from top performers? Where are your time and finances best spent? Who needs training -- and who can train?...
Teaser Feature Image
User Behavior Analytics
How proactive is your security team about detecting, investigating, and isolating alerts? Do your current strategies alert you to information systems misuse from within your own organization?
Teaser Feature Image
User Activity Monitoring in Salesforce: 5 Lessons Learned for a Stronger Data Governance Program
Here are five lessons learned from user activity monitoring in Salesforce – and what to keep in mind when building a data governance program.
Teaser Feature Image
4 Benefits of User Activity Monitoring for Healthcare Privacy
User activity monitoring in healthcare provides many benefits. To learn more about the top 4 benefits for privacy, read this post.
Teaser Feature Image
Unlock the Potential of Salesforce: Expand Trust, Privacy, and Cloud Application Security
Discover how to unlock the full potential of Salesforce to help you expand trust, privacy, and cloud application security at your organization.
Teaser Feature Image
Top 6 Security Takeaways from HIMSS 2018
Amid the Las Vegas lights, the Sands Expo was abuzz during the Healthcare Information and Management Systems Society (HIMSS) which gathered over 45,000 attendees to discuss the latest Innovations...
Teaser Feature Image
Top 5 Cyber Security and Privacy Tips for Managing Healthcare Investigations
The Office for Civil Rights (OCR) and the Department of Health and Human Services (HHS) are educating healthcare organizations on the importance of detecting and responding to data breaches, while...
Teaser Feature Image
Top 10 Health Technology Hazards for 2018: Ransomware and other Cybersecurity Threats Top the List
The ECRI Institute released it’s 2018 report of the Top 10 Health Technology Hazards of the year. Each year, the list is chosen regarding which hazards should receive the utmost priority in the...
Teaser Feature Image
The Top 13 Signs Your Employee Is About to Quit
Departing employees can create a lot of challenges for an organization. So what are the signs your employee is about to quit?
Teaser Feature Image
The Proliferation of PHI: Securing Patient Data in the Digital Era
Technological innovation continues to expand every day in healthcare. New and emerging technologies solve industry challenges, improve patient access, protect patient data, and more.
Teaser Feature Image
The Importance of HIPAA Audit Controls
HIPAA audit protocols are essential for ensuring the security of sensitive medical information. We explain their importance to protect patient data.
Teaser Feature Image
The Future of Securing Patient Data: How the Health Industry is Addressing the Healthcare Cybersecurity Skills Shortage
The cybersecurity skills gap will reach 1.8 million by 2022, according to the Global Information Security Workforce Study. The healthcare industry specifically plans to increase their workforce by...
Teaser Feature Image
The Biggest Business Challenge – Continuing to Make GREAT Hires
As a business grows, its team gets really busy, which is the case at Imprivata FairWarning since our founding. Anyone who has hired people knows that there is a tendency to make “hires of convenience” when...
Teaser Feature Image
The Battle for the Future of Our Privacy
The European Union General Data Protection Regulation or GDPR goes into effect May 2018, making 2018 a watershed year globally in the battle over the future of privacy. Soon, the United States’...
Teaser Feature Image
The Admin’s Guide to Salesforce Visibility: Using Event Monitoring to Boost ROI, Productivity
Salesforce has quickly become a mission-critical application for organizations of all types. The great news for admins is that Salesforce visibility can show you not only how users are adopting...
Teaser Feature Image
The 6 Elements Every Financial Institution Needs for Defense-in-Depth Security
In the same way that medieval castles were designed with multiple security layers for protection, today’s organizations require a multifaceted approach to safeguarding highly sensitive data.
Teaser Feature Image
Termination, IP Suits, and Earn-Outs: Which Salesforce Data is Most Useful in Legal Matters?
When it comes to legal matters, discovery can be made infinitely more complicated by the sheer amount of unstructured data held across applications. The lawyers are at the front line of attack,...
Teaser Feature Image
Storing Data in the Cloud: 4 Common Cloud Compliance Misconceptions
As you store more and more mission-critical data in Salesforce and other cloud-based applications, compliance becomes an ever-looming presence. GDPR, PCI DSS, HIPAA, SOX, FFIEC,  the California...
Teaser Feature Image
SOC 2 Attestation and Information Security at Imprivata FairWarning
Imprivata FairWarning continues to invest in information security technologies, procedures and training as well as associated governance.
Teaser Feature Image
Securing Your Sensitive Information in Salesforce: Data Protection and Security for Cloud
Salesforce data protection and security are critical for cloud apps. Protect information from insider threats with Imprivata FairWarning Cloud Security.