Considerations for healthcare during National Cybersecurity Awareness Month
by Wes Wright and Al Colon
|
In recognition of National Cybersecurity Awareness Month, we’ve reached out to our resident cybersecurity experts, Imprivata CTO, Wes Wright, and Imprivata Director of Information Security and Corporate Compliance, Al Colon, to ask them about some of the burning cybersecurity issues in healthcare.…
Digital identity with Imprivata and Microsoft: Q&A with Wes Wright and Randy Nale
Recently, we announced the next phase of our digital identity collaboration with Microsoft: Imprivata Identity Governance hosted in Microsoft Azure, and Impr…
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about the future of medical technology in the time of COVID-19, the rise of...…
Each month, we bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss the latest Marriott data breach, Ring’s call...…
Dang, wish I’d have had a good automated IGA system…
Wes Wright
|
I’ve worked in almost more places than I can remember and, believe it or not, I’ve never had an automated Identity Governance Administration (IGA) system.…
Use vendor management audit checklists to identify, monitor, & audit remote access to your network
Using outside vendors can be a godsend for many organizations. These third parties provide the ability to scale a business, bring new and vital expertise to bear on problems, and let you concentrate on core competencies.…
The cost of third-party remote access noncompliance: HIPAA violations edition
It’s no news to healthcare-related organizations that if they handle personal health information (PHI) or electronic personal health information (ePHI), they are required to maintain HIPAA/HITECH compliance. These regulations are stringent, and staying compliant can be difficult.…
Let healthcare information technology help – we have a lot to offer
Gus Malezis
|
In most COVID-19 news coverage, national and state leaders talk about solutions to address this ongoing crisis. These conversations focus primarily on diagnostic or biomedical solutions, without mention of one area of innovation that offers immediate and significant assistance: information technology.…
Credential harvesting attacks can threaten your networks
In these strange times of Covid-19, companies face increased and expanded cybersecurity threats. Enterprise security perimeters expanded exponentially almost overnight as both employees and vendor reps work from their homes.…
With rapid changes to HIPAA enforcement throughout the COVID-19 crisis, keeping up has been an ongoing challenge for healthcare providers. Understanding the aspects of HIPAA that have changed and...…
Embracing cybersecurity for better vendor access risk management
When the event hit the news that the medical debt collector American Medical Collection Agency (AMCA) suffered a massive data breach last year, businesses from various industries were shaken.…
An increasing number of hospitals are finding value providing iPads for inpatient use. During the current COVID-19 pandemic, many hospitals are severely limiting visitors.…
The manufacturing industry, like so many others, is undergoing massive change. With the introduction of technologies like 3D printing, Internet of Things (IoT) and Industrial Internet of Things (IIoT), companies have been able to disrupt the industry extremely quickly with creative ways to manufacture products. However, these new tools, increasingly connected to global networks, have created heightened vulnerabilities to cyberattacks.…
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about changes to HIPAA telehealth enforcements, privacy rules during the...…
The importance of vendor onboarding and offboarding processes with third-party risk management
Third-party risk management, or TPRM, is becoming a big deal in IT and Information security circles. This is because a large number of breaches and hacks are being connected to insecure or mismanaged third parties such as vendors, supply chain partners, and cloud companies providing infrastructure or software applications.…