Blog Listing

Monthly Cloud Security Roundup: A New Cybersecurity Act for Schools, a Military Ban on TikTok, Wawa’s Data Breach, and More
Discover the latest cloud security news with December’s roundup, including a new cybersecurity act for schools, a ban on TikTok, data breaches, and more.
Imprivata FairWarning Year in Review: Top 10 Articles Detailing the Importance of Privacy in Healthcare
What had healthcare privacy, security, and compliance readers buzzing in 2019? Check out this recap for the content highlights of the year.
What every business needs to know about PCI compliance
What every business needs to know about PCI compliance
For any business accepting, processing, storing, or transmitting credit card information, PCI DSS compliance should be at the top of its must-do list. The Payment Card Industry Data Security Standard is a set of rules established to create a secure environment within all companies that accept credit card payments.
Multi-factor authentication is an underutilized tool in protecting against privileged credentials breaches
Multi-factor authentication is an underutilized tool in protecting against privileged credentials breaches
While it’s no surprise that nearly every major data breach of the last few years has involved the use of privileged credentials, it is surprising that one of the most effective security measures remains underutilized.
Monthly Healthcare News Roundup: The Future of Healthcare Technology, Data Breaches Tied to Fatal Heart Attacks, and More
From the human cost of data breaches to the future of healthcare technology, read last month’s top healthcare news.
Monthly Cloud Security Roundup: The 2019 Dreamforce Conference, Microsoft’s Response to CCPA, a Potential US Federal Privacy Law, and More
Discover the latest in cloud security news with November’s roundup, including the 2019 Dreamforce conference, Microsoft’s response to CCPA, and more.
An epidemic of ransomware washes over healthcare
An epidemic of ransomware washes over healthcare
Normally, the only types of epidemics that healthcare organizations fight are the microbial kind. But lately, they have been hit with a rash of ransomware attacks, crippling their IT systems and demanding payments to unlock the encrypted system.
The hidden cost of a data breach caused by third parties
The hidden cost of a data breach caused by third parties
As data breaches within private organizations and government entities continue to rise, the expenses to recover from them are escalating at an exponential pace. With third-party breaches, there can be additional costs beyond the usual financial, regulatory, and reputational damage that an internally caused data breach can bring.
HIPAA compliance: What healthcare administrators need to know
HIPAA compliance: What healthcare administrators need to know
According to a report from Duo Security, 56% of healthcare companies across the U.S. are still operating on legacy operating systems and software. In case you’re not familiar with the term, legacy is just another word for outdated. In the world of cybersecurity, outdated usually means vulnerable to a cyberattack.
Configuring Windows Server NLB for multi-node deployment
Configuring Windows Server NLB for multi-node deployment
 ArchitectureThis article discusses details of Windows Network Load Balancer (NLB) configuration to balance two or mo
Privileged User Monitoring: 3 Ways to Prevent Privileged User Abuse in Healthcare
Your healthcare privacy program can be complicated. It may contain thousands of users, multiple admins, community portals, customized data structure – the list goes on. And to prevent data...
The challenge of multifactor authentication and shared accounts
The challenge of multifactor authentication and shared accounts
Recently, I wrote about the importance of combining multifactor authentication (MFA) and privileged access management.
Monthly Cloud Security Roundup: The Worst State for Online Privacy, the Adobe Data Breach, Russian Hackers Targeting the Olympics, and More
Discover the latest in cloud security news with October’s roundup, including Adobe’s data breach, the worst state for online privacy, and more.
Monthly Healthcare News Roundup: Class Action Lawsuit Against Opioid Manufacturers, the FDA’s New Draft Recommendations for CDS, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about a historic class action lawsuit against opioid manufacturers, the FDA’s...
Setting up a vendor management program
Setting up a vendor management program
Vendor management is a process or solution that allows organizations to optimize and secure the introduction and ongoing operations of third-party service providers into their business operations.
Departing Employees May Exit Your Building — But Have They Truly Left Your Organization?
Departing employees are a major source of risk for organizations. Evaluate the strength of your company’s offboarding process with this blog post.
So You’ve Had a HIPAA Breach… Now What?
You’ve overseen your healthcare organization’s privacy program. You’ve monitored HIPAA compliance. You’ve established security controls to protect patient data. But a HIPAA breach still happened....
PAM vs. VPAM…What’s the difference?
PAM vs. VPAM…What’s the difference?
Privileged Access Management (PAM) is a newer technology within the Identity and Access Management (IAM) space that focuses on applying additional controls and protections on accounts with privileged or administrative rights.
Patient Privacy and Home Care: How to Satisfy HIPAA Compliance Requirements On The Go
Patients are increasingly being cared for outside of hospitals – about 10,000 people turn 65  every day and many of them will need home-based healthcare. As a low-cost and outcome-based solution,...
CCPA Compliance: Survey Says Most Companies Aren’t Ready – Is Yours?
Companies managing the data of California residents are behind on CCPA compliance, but it’s time to act. Find out how to prepare here.