Blog Listing

Embracing cybersecurity for better vendor access risk management
Embracing cybersecurity for better vendor access risk management
When the event hit the news that the medical debt collector American Medical Collection Agency (AMCA) suffered a massive data breach last year, businesses from various industries were shaken.
How can hospitals do remote access securely?
How can hospitals do remote access securely?
When COVID-19 broke out in earnest, hospitals and other employers told everybody to go home and work remotely. I’m doing the WFH drill right now.
GroundControl for patient iPads
GroundControl for patient iPads
An increasing number of hospitals are finding value providing iPads for inpatient use. During the current COVID-19 pandemic, many hospitals are severely limiting visitors.
Tips I learned running IT for the U.S. Air Force during 9/11
Tips I learned running IT for the U.S. Air Force during 9/11
COVID-19 is, simply put, a generational event.
Top industrial VPN alternatives for manufacturing
Top industrial VPN alternatives for manufacturing
The manufacturing industry, like so many others, is undergoing massive change. With the introduction of technologies like 3D printing, Internet of Things (IoT) and Industrial Internet of Things (IIoT), companies have been able to disrupt the industry extremely quickly with creative ways to manufacture products. However, these new tools, increasingly connected to global networks, have created heightened vulnerabilities to cyberattacks.
Monthly Healthcare News Roundup: Changes to HIPAA Telehealth Enforcements, Privacy Rules During the COVID-19 Crisis, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about changes to HIPAA telehealth enforcements, privacy rules during the...
The Cost of Insider Threats in Financial Services and How to Reduce Them
The cost of insider threats in financial services may be high, but there are ways to reduce them – find out how in this blog post.
The importance of vendor onboarding and offboarding processes with third-party risk management
The importance of vendor onboarding and offboarding processes with third-party risk management
Third-party risk management, or TPRM, is becoming a big deal in IT and Information security circles. This is because a large number of breaches and hacks are being connected to insecure or mismanaged third parties such as vendors, supply chain partners, and cloud companies providing infrastructure or software applications.
Imprivata GroundControl: Facilitating increased demand for telehealth and virtual care, on-site
Imprivata GroundControl: Facilitating increased demand for telehealth and virtual care, on-site
Telehealth lets hospitals limit physical provider contact with COVID-19 patients, while still allowing for high quality virtual care – a critical element in
Image for GroundControl news
Imprivata GroundControl: Enabling secure virtual visits during hospital lockdowns
In an effort to reduce COVID-19 infections, hospitals are implementing strict visitation policies preventing any family members, friends, or other loved ones
Healthcare IT companies offering assistance to customers on the front lines of COVID-19
Healthcare IT companies offering assistance to customers on the front lines of COVID-19
As healthcare providers continue to work around the clock to treat the influx of patients impacted by COVID-19, healthcare IT vendors are doing their part to
What desktop sharing tools are great for
What desktop sharing tools are great for
Remote access has become an irreplaceable tool for the success of many companies, but using it safely and securely is difficult.
3 Ways to Alleviate Data Privacy Concerns During the COVID-19 Crisis
As the impact of COVID-19 grows, protecting patient privacy is paramount for healthcare organizations hard at work treating those affected by the pandemic. Although many organizations are...
‘Pushing the Boundaries’ to Deliver Care Also Stretches Cybersecurity
‘Pushing the Boundaries’ to Deliver Care Also Stretches Cybersecurity
A crisis often brings out the best of the best.
Positive patient identification in the time of COVID-19
Positive patient identification in the time of COVID-19
As the volume of patients seeking medical attention increases during these challenging times, correct patient data is more important than ever.
Provider systems face a new crisis from COVID-19: Staffing
Provider systems face a new crisis from COVID-19: Staffing
Staffing has emerged as one of the most pressing challenges for provider systems dealing with the global COVID-1
The value of a vendor management platform
The value of a vendor management platform
The success of business projects and the associated technology solutions to implement them are almost always graded on how much return on investment (ROI) they deliver back to the business for the investment required.
Securing a Remote Workforce: Learn How to Protect Your At-Risk Salesforce Data
If you’re switching to a remote work environment, you’ll need to know about securing a remote workforce for maximum data security.
COVID-19: Our house is on fire
COVID-19: Our house is on fire
On my last ER shift, the nurses and I were discussing how all-consuming the COVID-19 crisis is becoming for hospital leadership and front line staff alike...
NERC updates may force utility companies into better cybersecurity
NERC updates may force utility companies into better cybersecurity
Once implemented, these upcoming regulations will ensure electrical utilities are safer from cyber threats, especially those brought in by third parties. Breaches and incidents at utility and other energy-related companies have been rising faster than an electric bill in a Texas summer.