Blog Listing

Teaser Feature Image
Secure the Keys to Your Kingdom: Protect Your Organization’s Privileged User Accounts
If you were trying to break into a bank, would you rather go through the trouble of evading the physical and digital security measures (i.e. security guards, door access, vault passcodes, and...
Teaser Feature Image
Salesforce Application Performance
Welcome to part 3 of the Imprivata FairWarning® Salesforce business blog post series: performance. In this post, we will explain the value of measuring Salesforce application performance, maximizing ROI,...
Teaser Feature Image
6 Ways Privacy and Security Work Together to Improve Patient Care
Data breaches are still prominent in the healthcare industry, but this post contains six ways privacy and security can work together to improve patient care and security.
Teaser Feature Image
Privileged Users In Your Cloud Applications: Who Are They?
Privileged users of Salesforce, Microsoft 365, and other mission-critical cloud applications have access to sensitive data. Find out who these users are and how to secure your organization's data.
Teaser Feature Image
Privileged Users in Salesforce: What Can They Access?
Privileged user abuse may be malicious, or it may be unintentional. Either way, it represents a huge liability to your company. Identify potential privilege misuse and with the tips in this post.
Teaser Feature Image
Privileged User Monitoring: 5 Ways to Prevent Privileged User Abuse in Salesforce
By using privileged user activity monitoring, you can prevent insider threats like privileged user abuse in Salesforce.
Teaser Feature Image
Ponemon: The Average Cost of a Data Breach 2017
The spotlight continues to shine on data breach incidents. It comes as no surprise that the average cost of a data breach in 2017 has risen in the U.S. Learn key takeaways from the study in this post.
Teaser Feature Image
People-Centric Information Security
The people within your organization are what make it great. The right monitoring tools, information security, and support can make it even better.
Teaser Feature Image
OCR Seeks Public Comment on HIPAA Privacy Rule Impact on Coordinated Care, Possible Changes to Rules
If you’ve ever felt like the HIPAA Privacy Rule needs some work — or stands in your organization’s way of providing coordinated, value-based healthcare — then the U.S. Department of Health and...
Teaser Feature Image
Motivations Never Imagined – The Escalating Value of Patient Information to Bad Actors
The need for real-time information security with coordination between vendors and customers across the industry a necessity. In this post, read more about protecting patient data from bad actors.
Five key technology challenges to address in 2019
Technology in healthcare is in a state of flux. It is evolving, changing, and growing, encouraging providers and clinicians to adapt along with it.
Imprivata Proximity Aware Debuts at HIMSS19
At this year’s annual HIMSS conference, held last month in Orlando, Florida, we joined more than 45,000 professionals from across the globe to showcase innov
Showcasing Change and Innovation at HIMSS19
At this year’s annual HIMSS conference, held last month in Orlando, Florida, we joined more than 45,000 professionals from across the globe to showcase innov
Patient safety has it's own week. Here's why.
Patient Safety Awareness Week - March 10–16 - is an annual event that brings patient safety into laser focus.
Where to Find Imprivata at HIMSS19: By the Numbers
Imprivata had an incredible 2018 and the momentum continues to build as we look towards HIMSS19 (February 11-15 in Orlando, FL) where we’ll be debuting innov
Employee remote access risks vs. vendor access threats
The last decade saw a dramatic increase of enterprise employees leaving the confines of the company building to work remotely. The State of the Remote Job Marketplace report from FlexJobs found 2.9% of the entire United States workforce works from home at least half of the time. This introduces a significant security challenge for network managers.
A proposed solution to the challenges of patient matching, in response to the GAO report
Earlier this month, the GAO (Government Accountability Office) released a report long-anticipated
Overcome risk to drive a successful healthcare IT strategy (Part I)
If you’re a health system Chief Information Security Officer (CISO), you have one over-arching element you deal with all the time: operational risk.
Are You EPCS Ready? The National Compliance Deadline is Less than Two Years Away
On October 24, 2018, President Trump signed into law the “SUPPORT fo
The top five takeaways from the 2018 Gartner Identity and Access Management Summit
There are three main components of an identity and access management (IAM) strategy: identity governance and administration, access management (including privileged access management), and adaptive multifactor authentication.