The search found 3760 results.
Blog
Providing remote access for your third-party vendors is an essential part of doing business. Whether it’s Amazon’s AWS, Google’s G-Suite, or a custom platform, most enterprises have migrated their back-office, e-commerce, and other operations to cloud applications and remote services infrastructure.
Blog
In this blog post, we'll explore exactly what a man-in-the-middle attack is - and how you can prevent this kind of attack happening to you.
Blog
I read an interesting story over at HealthcareInfoSecurity.com highlighting the “Official Breach Tally Approaches 100”. The article includes a link to the official federal list of healthcare information breaches that was launched a few short months ago. While the article highlighted the major breaches affecting 500+ individuals as reported to the HHS Office for Civil Rights (OCR) and called out 61% of incidents stemming from stolen computer devices (e.g., laptops, USB drives, hard drives etc.), many of the largest breaches involved unauthorized access. Here’s a snapshot at the major breaches stemming from unauthorized access...
Blog
Uncover the benefits of data protection and privacy program maturity in this article. Find out about programs, attributes of maturity, and more!
News
A ransomware attack on a major aerospace company has rippled across Europe’s aviation industry, grounding flights and delaying passengers at airports from Brussels to London Heathrow. The UK’s National Crime Agency (NCA) confirmed the arrest of a man in connection with the incident, though investigators stressed the probe remains in its early stages.
Customer
“Before Imprivata FairWarning, all of our EHR monitoring would be done manually, making it a very reactive process and difficult to pinpoint users," says MaineGeneral's HIM Operations Manager, Tara Yeaton.