The search found 3760 results.
Blog
As Big Tech is under attack from Congress and the public about how they handle and monetize customer private data, some companies have chosen to pivot. Instead of collecting and profiting off of consumer data, their focus is on protecting privacy.
Blog
The Colonial Pipeline hack, in the end, came down to poor access management. The hackers found their way into operational technology (OT) through a VPN password that had never been de-provisioned. A small error that cost millions.
Blog
Kronos just experienced a big ransomware attack. But it feels like just another in a never-ending line. Here’s what you can do to help keep your organization safe.
Blog
At the end of last year, we said that in 2021 ransomware would be here to stay, and the big trends will be third-party attacks and cyber terrorism. While no one likes to say “I told you, so,” especially when it comes to cybersecurity, the past 12 months saw headline after headline about ransomware attacks, third-party hacks, breaches of valuable data (like EMRs),
Blog
When it comes to securing internal credentials, controlling the movement of internal users, and provisioning or de-provisioning internal access rights, it can be done in-house. Enterprise access management best practices call for aligning those user rights with an internal HR system, and creating a robust access policy for internal users is do-able for most organizations, especially when it’s dealing with internal access and more routine access points (like email).
Press
Magazine honors the best employers in Massachusetts
Waltham, Mass. – December 2, 2021 — Imprivata, the digital identity company for healthcare and beyond, has been named one of the Top Places to Work in Massachusetts in the 14th annual employee-based survey project from The Boston Globe. The Top Places to Work 2021 issue publishes online at Globe.com/TopPlaces on the night of December 1 and in Globe Magazine on December 5.
Blog
Five key questions to ensure a strong risk profile with cyber security insurers and minimize the cost of skyrocketing premiums.
Blog
While access governance is the big picture, policy-building part of Critical Access Management, access control is the double-locks and extra protections that help keep an organization’s most valuable assets safe.
Blog
Many in the managed service provider (MSP) market are turning to Imprivata to complement their security offerings by implementing a solution that lowers liability, increases efficiency of remote connections, and exceeds clients’ security, audit, and compliance needs.
Blog
The termination gap can cause all kinds of trouble. That length of time between an employee leaving their role and their user access being de-provisioned is when dangerous activities can occur -- including a malicious breach by that internal user -- and the truth is, organizations aren’t worrying enough about it.