Blog Listing

Five key technology challenges to address in 2019
Five key technology challenges to address in 2019
Technology in healthcare is in a state of flux. It is evolving, changing, and growing, encouraging providers and clinicians to adapt along with it.
Considerations for healthcare during National Cybersecurity Awareness Month
Considerations for healthcare during National Cybersecurity Awareness Month
In recognition of National Cybersecurity Awareness Month, we’ve reached out to our resident cybersecurity experts, Imprivata CTO, Wes Wright, and Imprivata Director of Information Security and Corporate Compliance, Al Colon, to ask them about some of the burning cybersecurity issues in healthcare.
Digital identity with Imprivata and Microsoft: Q&A with Wes Wright and Randy Nale
Digital identity with Imprivata and Microsoft: Q&A with Wes Wright and Randy Nale
Recently, we announced the next phase of our digital identity collaboration with Microsoft: Imprivata Identity Governance hosted in Microsoft Azure, and Impr
Monthly Healthcare News Roundup: The Rise of Ransomware Cyber Attacks, The Future of Medical Technology During COVID-19, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about the future of medical technology in the time of COVID-19, the rise of...
Monthly Cloud Security Roundup: Marriott Data Breach, COVID-19 Cyber Security Challenges, and More
Each month, we bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss the latest Marriott data breach, Ring’s call...
Dang, wish I’d have had a good automated IGA system…
Dang, wish I’d have had a good automated IGA system…
I’ve worked in almost more places than I can remember and, believe it or not, I’ve never had an automated Identity Governance Administration (IGA) system.
Use vendor management audit checklists to identify, monitor, & audit remote access to your network
Use vendor management audit checklists to identify, monitor, & audit remote access to your network
Using outside vendors can be a godsend for many organizations. These third parties provide the ability to scale a business, bring new and vital expertise to bear on problems, and let you concentrate on core competencies.
The cost of third-party remote access noncompliance: HIPAA violations edition
The cost of third-party remote access noncompliance: HIPAA violations edition
It’s no news to healthcare-related organizations that if they handle personal health information (PHI) or electronic personal health information (ePHI), they are required to maintain HIPAA/HITECH compliance. These regulations are stringent, and staying compliant can be difficult.
Let healthcare information technology help – we have a lot to offer
Let healthcare information technology help – we have a lot to offer
In most COVID-19 news coverage, national and state leaders talk about solutions to address this ongoing crisis. These conversations focus primarily on diagnostic or biomedical solutions, without mention of one area of innovation that offers immediate and significant assistance: information technology.
Credential harvesting attacks can threaten your networks
Credential harvesting attacks can threaten your networks
In these strange times of Covid-19, companies face increased and expanded cybersecurity threats. Enterprise security perimeters expanded exponentially almost overnight as both employees and vendor reps work from their homes.
How to navigate COVID-19 HIPAA enforcement changes while safeguarding healthcare data
With rapid changes to HIPAA enforcement throughout the COVID-19 crisis, keeping up has been an ongoing challenge for healthcare providers. Understanding the aspects of HIPAA that have changed and...
7 best practices for supporting telehealth, virtual care, and remote visitation amid COVID-19
7 best practices for supporting telehealth, virtual care, and remote visitation amid COVID-19
Prior to the COVID-19 pandemic, healthcare organizations were already implementing shared mobile devices in
Embracing cybersecurity for better vendor access risk management
Embracing cybersecurity for better vendor access risk management
When the event hit the news that the medical debt collector American Medical Collection Agency (AMCA) suffered a massive data breach last year, businesses from various industries were shaken.
How can hospitals do remote access securely?
How can hospitals do remote access securely?
When COVID-19 broke out in earnest, hospitals and other employers told everybody to go home and work remotely. I’m doing the WFH drill right now.
GroundControl for patient iPads
GroundControl for patient iPads
An increasing number of hospitals are finding value providing iPads for inpatient use. During the current COVID-19 pandemic, many hospitals are severely limiting visitors.
Tips I learned running IT for the U.S. Air Force during 9/11
Tips I learned running IT for the U.S. Air Force during 9/11
COVID-19 is, simply put, a generational event.
Top industrial VPN alternatives for manufacturing
Top industrial VPN alternatives for manufacturing
The manufacturing industry, like so many others, is undergoing massive change. With the introduction of technologies like 3D printing, Internet of Things (IoT) and Industrial Internet of Things (IIoT), companies have been able to disrupt the industry extremely quickly with creative ways to manufacture products. However, these new tools, increasingly connected to global networks, have created heightened vulnerabilities to cyberattacks.
Monthly Healthcare News Roundup: Changes to HIPAA Telehealth Enforcements, Privacy Rules During the COVID-19 Crisis, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about changes to HIPAA telehealth enforcements, privacy rules during the...
The Cost of Insider Threats in Financial Services and How to Reduce Them
The cost of insider threats in financial services may be high, but there are ways to reduce them – find out how in this blog post.
The importance of vendor onboarding and offboarding processes with third-party risk management
The importance of vendor onboarding and offboarding processes with third-party risk management
Third-party risk management, or TPRM, is becoming a big deal in IT and Information security circles. This is because a large number of breaches and hacks are being connected to insecure or mismanaged third parties such as vendors, supply chain partners, and cloud companies providing infrastructure or software applications.