The search found 3764 results.
Blog
What must security and IT professionals look out for when managing their organizations’ cloud landscape? What cloud security challenges are CISOs facing in 2018? Find out in this blog post.
Blog
As a care provider, you can instill trust through a strong data privacy and security program. Here are six considerations for creating a comprehensive patient data privacy and security plan.
Blog
Protecting sensitive health information is essential for HIPAA compliance and data breach prevention, but it can also impact patient safety. According to a recent study by Vanderbilt University,...
Blog
How do you choose which vendors are doing their due diligence and offering you the most value? Trust these independent third-party sources when vetting cloud security vendors.
Blog
Data breaches are still prominent in the healthcare industry, but this post contains six ways privacy and security can work together to improve patient care and security.
Blog
Departing employees can take information out the door of your organization. You need a proper data protection strategy to prevent data theft.
Blog
Access control is a vital step in cybersecurity because it secures the entry point of systems. Implementing the best access control practices to ward off cyber threats has never been so critical.
Blog
Prior to the COVID-19 pandemic, healthcare organizations were already implementing shared mobile devices in both inpatient and outpatient settings to improve care quality and the patient experience. However, the current emergency has shortened the timeline of deploying these shared devices in hospitals, presenting acquisition, security, and device management challenges.
Blog
Discover the common VPN security risks and learn how to protect your network. Learn how Imprivata Vendor Privileged Access Management can solve your VPN problems.
Blog
As cyber threat frequency and severity continue to grow, the HHS has stepped into the picture. Here’s a look at recent settlements announced by the HHS and its best practice recommendations to mitigate threats.