The search found 3759 results.
Blog
Healthcare data breaches are increasing exponentially year after year, and it doesn’t seem like they’re going to slow down any time soon. It’s important for healthcare IT professionals to take steps to safeguard their systems, whether that means protecting against external threats posed by hackers and cyber criminals or securing internal threats that come from access abuse from internal users.
Blog
According to the 2021 Executive Order, “Zero Trust Architecture allows users full access but only to the bare minimum they need to perform their jobs. This data-centric security model allows the concept of least-privileged access to be applied for every access decision, where the answers to the questions of who, what, when, where, and how are critical for appropriately allowing or denying access to resources.”
Press
Enterprise-class PAM solution bolsters Imprivata’s identity and access management platform for enterprise organizations in healthcare and beyond
Blog
Protecting patient data is a Herculean task for healthcare organizations, as protections must be in place for internal and external threats. On top of that, HIPAA regulations add in a layer of required parameters that healthcare organizations must have in place to be compliant and not face penalties.
Blog
It seems like every year we hear that cyberattacks and ransomware in hospitals are on the rise. Unfortunately, it’s true every year. In fact, during the first 10 months of 2020, the number of reported breaches rose 18% over the same period in 2019.
Blog
A crucial aspect of cybersecurity was missing from Colonial Pipeline when a criminal hacking group was able to access a shared internal drive and demanded close to $5 million in exchange for the files: multi-factor authentication.