Blog Listing

Preparing for cyberattacks: building a resilient infrastructure
Preparing for cyberattacks: building a resilient infrastructure
As history shows, global ransomware attacks have been part of the new reality for quite some time.
How inefficient communication technologies slow down providers and jeopardize patient safety
How inefficient communication technologies slow down providers and jeopardize patient safety
According to a new report
Roaming quickly and securely at Cumberland Healthcare
Roaming quickly and securely at Cumberland Healthcare
I recently sat down with Jason Morse, Director of Information Technology at Cumberland Healthcare (Cumberland Memorial Hospital), a 25-bed facility in Cumber
Connecticut the Fourth State to Mandate E-Prescribing to Combat Opioid Abuse
Connecticut the Fourth State to Mandate E-Prescribing to Combat Opioid Abuse
Connecticut lawmakers recently passed legislation that requires electronic prescribing of opioid medication, further validating the significant role technolo
Five reasons single-password authentication should be banned
Five reasons single-password authentication should be banned
With the rapidly growing number of sophisticated cyber-attacks, such as phishing and ransomware, single-factor authentication has had its day. One way to fight back against the rise in cyber-attacks is by using strong multi-factor authentication.
Four tips on implementing 2FA policies
Four tips on implementing 2FA policies
If you’re still authenticating remote users with a single password, it’s time to make a change. There’s just too much at stake. With that in mind, here are four things to keep in mind when considering a two-factor authentication policy for your organization - and one thing you should probably avoid.
The Report on Improving Cybersecurity in the Health Care Industry – where and how to start updating your cybersecurity strategy
The Report on Improving Cybersecurity in the Health Care Industry – where and how to start updating your cybersecurity strategy
On Friday, June 2nd, the U.S.
Three considerations when implementing two-factor authentication
Three considerations when implementing two-factor authentication
Healthcare organizations are under constant attack from cyber threats.
Patches aren’t the silver bullet; hospitals can keep systems running when hit by ransomware attacks
Patches aren’t the silver bullet; hospitals can keep systems running when hit by ransomware attacks
As news of the
Is your casino network under attack?
Is your casino network under attack?
See how to streamline your security methods and ensure your gaming business doesn’t suffer a hacking incident. This article covers recent casino data breaches and reveals how to prevent cybercriminals from accessing sensitive, confidential data on your network.
Five security questions your law firm should ask
Five security questions your law firm should ask
Law firms are appealing targets for cybercriminals. Home to a multitude of sensitive, personal, confidential, financial information, what better place to attack in order to steal some juicy data? There’s certainly a few questions that should be on your security radar, let’s address them in this blog.
Government funding bill includes huge step forward for patient identification
Government funding bill includes huge step forward for patient identification
Congress recently passed a spending bi
Hospitality: Stopping third-party breaches
Hospitality: Stopping third-party breaches
The more technology advances, the more this creates potential security issues for the hospitality world. Learn ways you can protect your hotel from costly cybercrimes, hacking attacks, and reputational damage.
How Gundersen Health System is securing its EMR without impacting clinical access
How Gundersen Health System is securing its EMR without impacting clinical access
As electronic medical records play an increasingly central role in all aspects of healthcare, many organizations struggle with how to make their EMRs more se
Retailers: Are vendors leaving you vulnerable?
Retailers: Are vendors leaving you vulnerable?
The threat is real. With all the security risks facing retailers today, we look at an approach to secure your remote support and deliver rapid, safe vendor access, track every system session, and gain proof of PCI compliance.
Cybersecurity and third-party vendor access
Cybersecurity and third-party vendor access
There’s a trend of hackers being able to remain on an organization’s network for periods of time – without even being detected. Does this make you think about what measures you currently have in place to provide visibility of who is on your network, and what they are doing?
Can you really trust your VPN?
Can you really trust your VPN?
As the need grows for supporting geographically spread vendors, how can you make sure you’re validating identities and encrypting all data to keep your network secure?
Imprivata leading the way in the IAM category in the KLAS Cybersecurity 2017 report
Imprivata leading the way in the IAM category in the KLAS Cybersecurity 2017 report
With 90% of healthcare organizations breached in the past two years,1 it’s no wonder that cybersecurity has become a front-and-center priority of
Education: How are you securing access to data?
Education: How are you securing access to data?
Due to the rise in cyber threats, educational institutions are facing increasing pressure to protect their sensitive data. In addition, they have to comply with FERPA or risk facing penalties. Read this blog to learn steps your organization can take to prevent a security attack.
Back to the Future
Back to the Future
It was February 2012 at HIMSS in Las Vegas when I first got a glimpse into the future of End User Computing.