Blog Listing

Image of a man surrounded by many monitors
7 best practices for securing your organization with access control
Access control is a vital step in cybersecurity because it secures the entry point of systems. Implementing the best access control practices to ward off cyber threats has never been so critical.
Image of a shield design
Three savvy strategies to improve the security experience
Balancing security and usability doesn’t need to be a daunting challenge. These strategies can help you strike the right balance.
Image of two doctors talking in a crowded lobby
How to prevent drug diversion using a holistic, tech-aided strategy
Drug diversion is a big problem. But a proactive, strategic approach can make a significant impact when it comes to recognizing and preventing it.
Image of a doctor speaking to a patient
4 steps to overcome patient misidentification
Patient misidentification is a problem that continues to plague healthcare organizations, but these steps help to make sure your HDO isn’t one of them.
Image of a nurse using a tablet
5 ransomware statistics and what they mean for healthcare IT decision-makers
In healthcare IT? Then these five statistics will change how you’re thinking about the security of your organization.
Image of two people viewing a device
3 signs your identity governance program may need a managed services component
Managed services may be the key to maturing your identity governance program. Here are some signs you might need to consider it.
Image of a person touching a hologram
Emerging from the multi-vendor quagmire
The move to one trusted vendor for your digital identity strategy may be easier than you think. And the consolidation brings both security and efficiency benefits.
The best VPN alternatives for businesses
The best VPN alternatives for businesses
If you work in the cybersecurity field, or if you’ve ever worked from home, you’re probably pretty familiar with a virtual private network, or as we all know
Image of medical bottles lined up in a rack
What is drug diversion? A look at the problem, and what happens if you don’t prevent it.
Left unchecked, the devastating toll taken by drug diversion runs wide and deep.
Image of a person typing on their laptop
Leading IGA capabilities with Imprivata Identity Governance 7.3
Check out the all-new updates to Imprivata Identity Governance with version 7.3.
Staying protected against ransomware
Staying protected against ransomware
As we wrap up cybersecurity month, we’d be remiss if we didn’t visit the ever-present threat of ransomware attacks. Every time we look at the trends around ransomware attacks, the news is rarely positive. The frequency of these attacks has yet to slow down, with experts estimating that an attempted ransomware attack occurred every 11 seconds in 2021, with a total 700 million attempted attacks, up 134% from 2020. Phishing attacks continue to be a common and successful method by which attackers gain initial access to an organization’s network.
What you need to know about cyber insurance
What you need to know about cyber insurance
While there are a variety of policies, providers, and cyber insurance offerings in the market, at its foundation, cyber insurance is an insurance policy that organizations purchase in the event of a successful cyber attack or data breach. As home or car insurance helps protect you when the worst happens by helping with the cost of recovery; for cyber insurance, the policy will reimburse the organization for financial losses sustained from the attack.
Image of a person using multiple devices
Take a look at what’s new with Imprivata Privileged Access Management
Take a look at the improvements we’ve made to Imprivata Privileged Access Management in the first half of 2022.
Image of pill bottle laying on its side, with pills spilling out
Stepping up to a proactive drug diversion prevention strategy
Fighting drug diversion takes a holistic approach aided by powerful technology.
UNITY graphic
Recently, the word unity has taken on a new meaning at Imprivata. With our team more spread out than ever before, our employees are working out of our various offices around the globe and even their homes.
Image of a person using a laptop with holographic signs
PAM and VPAM: The power couple safeguarding critical assets from inside and outside threats
Threats exist internally and externally, so you need to make sure you’re prepared. The powerful combo of PAM and VPAM can help keep your organization safe.
Image of two people looking at a tablet inside a storage area
Imprivata Identity Governance 7.2: Expanded capabilities to keep your organization secure
Take a look at the improvements we’ve made to Imprivata Identity Governance, all in the name of making sure we anticipate the needs of your organization.
Image of a person typing on a laptop, with icons surrounding the open space
Strengthen your security posture with identity governance and privileged access management
Need to keep identity and access locked down? Then you need identity governance and privileged access management.
Is the future of access management consolidation?
Is the future of access management consolidation?
Not only is cybersecurity changing, but the most recent iteration of the general idea, centered around access management, is itself in flux — threats are constantly changing and technology is evolving faster than most industries can implement.
Image of a person viewing a tablet at a desk
Why your Zero Trust strategy needs a third-party privileged access component
Zero Trust isn’t a buzzword. But to do it right, you need to lock down privileged access. Yes, even for third parties.