Blog Listing

Image for GroundControl news
Imprivata GroundControl: Enabling secure virtual visits during hospital lockdowns
In an effort to reduce COVID-19 infections, hospitals are implementing strict visitation policies preventing any family members, friends, or other loved ones
Healthcare IT companies offering assistance to customers on the front lines of COVID-19
Healthcare IT companies offering assistance to customers on the front lines of COVID-19
As healthcare providers continue to work around the clock to treat the influx of patients impacted by COVID-19, healthcare IT vendors are doing their part to
What desktop sharing tools are great for
What desktop sharing tools are great for
Remote access has become an irreplaceable tool for the success of many companies, but using it safely and securely is difficult.
3 Ways to Alleviate Data Privacy Concerns During the COVID-19 Crisis
As the impact of COVID-19 grows, protecting patient privacy is paramount for healthcare organizations hard at work treating those affected by the pandemic. Although many organizations are...
‘Pushing the Boundaries’ to Deliver Care Also Stretches Cybersecurity
‘Pushing the Boundaries’ to Deliver Care Also Stretches Cybersecurity
A crisis often brings out the best of the best.
Positive patient identification in the time of COVID-19
Positive patient identification in the time of COVID-19
As the volume of patients seeking medical attention increases during these challenging times, correct patient data is more important than ever.
Provider systems face a new crisis from COVID-19: Staffing
Provider systems face a new crisis from COVID-19: Staffing
Staffing has emerged as one of the most pressing challenges for provider systems dealing with the global COVID-1
The value of a vendor management platform
The value of a vendor management platform
The success of business projects and the associated technology solutions to implement them are almost always graded on how much return on investment (ROI) they deliver back to the business for the investment required.
Securing a Remote Workforce: Learn How to Protect Your At-Risk Salesforce Data
If you’re switching to a remote work environment, you’ll need to know about securing a remote workforce for maximum data security.
COVID-19: Our house is on fire
COVID-19: Our house is on fire
On my last ER shift, the nurses and I were discussing how all-consuming the COVID-19 crisis is becoming for hospital leadership and front line staff alike...
NERC updates may force utility companies into better cybersecurity
NERC updates may force utility companies into better cybersecurity
Once implemented, these upcoming regulations will ensure electrical utilities are safer from cyber threats, especially those brought in by third parties. Breaches and incidents at utility and other energy-related companies have been rising faster than an electric bill in a Texas summer.
Monthly Cloud Security Roundup: The Least Secure Industry (According to Hackers), the Cybersecurity Skills Shortage, and More
Each month, we bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss the acquisition of Vlocity by Salesforce,...
Yale New Haven matches workstation locations to clinician logins to help manage Coronavirus
Yale New Haven matches workstation locations to clinician logins to help manage Coronavirus
A message from Dr. Sean Kelly, Chief Medical Officer, Imprivata
Monthly Healthcare News Roundup: The Cost of Insider Security Breaches, CTA’s New Healthcare AI Standard, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about the cost of insider security breaches, the Consumer Technology...
Boost manufacturing security with a vendor access management strategy
Boost manufacturing security with a vendor access management strategy
In our previous blog, we explained how cyberattacks are putting manufacturing systems at greater risk of data loss and malicious activity. Now let’s look at strategies companies can take to tighten up some of the security gaps that can leave manufacturing systems vulnerable to attack.
Five ways cyber attacks put manufacturing systems at risk
Five ways cyber attacks put manufacturing systems at risk
Some industries, like financial services and healthcare, have been targets of cyberattacks since day one. For years, manufacturing seemed far less interesting to hackers, and even C-suite executives at these companies weren’t particularly worried about the risk of attack.
The Cost of Insider Threats in the Healthcare Industry and How to Reduce Them
With mounting costs of insider threats in healthcare, how can organizations protect themselves from risks that come from inside?
Why you need third-party risk management in manufacturing
Why you need third-party risk management in manufacturing
Manufacturing is changing. As we enter the fourth industrial revolution, factories are becoming globalized, digitized, and relying more and more on the internet of things to produce goods and services. As this transformation continues and once localized entities become smart factories, they are connecting to more third parties. And inviting in more third-party risk.
Monthly Healthcare News Roundup: Microsoft AI for Health Initiative, 2020 Predictions for Cyberattacks, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about Microsoft’s new AI for Health Initiative, health IT professionals’...
The NIST Privacy Framework: How to Mitigate Risk and Align Security Efforts
Discover how the new NIST Privacy Framework aligns with the Cybersecurity Framework to simplify your compliance, security, and privacy efforts.