The search found 3762 results.
Blog
As a care provider, you can instill trust through a strong data privacy and security program. Here are six considerations for creating a comprehensive patient data privacy and security plan.
Blog
What must security and IT professionals look out for when managing their organizations’ cloud landscape? What cloud security challenges are CISOs facing in 2018? Find out in this blog post.
Press
Second-annual report by SecureLink and Ponemon Institute notes that the financial impact of cyberattacks averaged $9M
Austin, TX — July 20, 2022 — SecureLink, a leader in critical access management, and Ponemon Institute today released a new report titled “Treading Water: The State of Cybersecurity and Third-Party Remote Access Risk,” which reveals that organizations have made no significant progress in mitigating cyberattacks and have, in fact, experienced an increase in third-party attacks over the past year.
Press
48.2 Percent Believe that Password Management Issues Slow Physician Adoption of EMRs
News
Last year, the Ponemon Institute, a research firm that advises organizations on data security and privacy, released a report revealing that each hospital loses an average $2 million a year in productivity when clinicians can’t access electronic health records. The report sponsored by “Best in KLAS” SSO market leader, Imprivata states that 83 percent of respondents said SSO simplifies access to applications and data, and about 70 percent of participants thought SSO was important or very important to adoption of EHRs and related systems.
Blog
You'll need executive buy-in if you want to successfully fund and build a robust cybersecurity program. Discover how you can gain leadership support in this blog post.
Blog
Creating a culture of patient data privacy is critical for healthcare organizations. Find out, from the experts, how you can implement a culture of privacy from top to bottom in this article.
Blog
United Capital was able to bolster their Salesforce security to protect sensitive customer financial data using these five methods. Find out what they are and how you can replicate their success here.
Blog
Every healthcare organization needs to defend itself from a major security concern – insider threats. From the malicious worker to the careless employee, these are the insiders you need to thwart.
Blog
Every financial organization needs to defend itself from a major security concern – insider threats. From the malicious worker to the careless employee, these are the insiders you need to thwart.