The search found 3743 results.
Blog Post
Uncover the benefits of data protection and privacy program maturity in this article. Find out about programs, attributes of maturity, and more!
Blog Post
I read an interesting story over at HealthcareInfoSecurity.com highlighting the “Official Breach Tally Approaches 100”. The article includes a link to the official federal list of healthcare information breaches that was launched a few short months ago. While the article highlighted the major breaches affecting 500+ individuals as reported to the HHS Office for Civil Rights (OCR) and called out 61% of incidents stemming from stolen computer devices (e.g., laptops, USB drives, hard drives etc.), many of the largest breaches involved unauthorized access. Here’s a snapshot at the major breaches stemming from unauthorized access...
Blog Post
George A. Gellert MD, MPH, MPA, is an epidemiologist focused on using information technology to improve public health outcomes. In this blog he discusses the findings from his recent research collaboration with Imprivata, just published in the peer reviewed journal Advances in Health Information Science and Practice (AHISP), the official journal of the American Health Information Management Association (AHIMA), on the impact and value of single sign-on and access management in hospitals in the UK and Ireland.
Blog Post
In this blog post, we'll explore exactly what a man-in-the-middle attack is - and how you can prevent this kind of attack happening to you.
Blog Post
Providing remote access for your third-party vendors is an essential part of doing business. Whether it’s Amazon’s AWS, Google’s G-Suite, or a custom platform, most enterprises have migrated their back-office, e-commerce, and other operations to cloud applications and remote services infrastructure.
Blog Post
A year-end review of how Imprivata Managed Services became a critical component of our customers’ success in 2020