The search found 3762 results.
Blog
Manufacturing is changing. As we enter the fourth industrial revolution, factories are becoming globalized, digitized, and relying more and more on the internet of things to produce goods and services. As this transformation continues and once localized entities become smart factories, they are connecting to more third parties. And inviting in more third-party risk.
Blog
As the Manager of Information Systems at Wooster Community Hospital with 14 years of healthcare IT experience, Eric Gasser is no stranger to what tools are needed to help a hospital run smoothly. Wooster Community Hospital has used Imprivata OneSign for SSO, access control, and e-signing in MEDITECH since 2010, and recently implemented Imprivata Confirm ID for Electronic Prescribing of Controlled Substances (EPCS).
News
The concept of zero trust has been around for nearly two decades, but it is only recently that the security model has caught on and is now one of the hottest trends in cybersecurity. A Microsoft report found that 90% of security decision-makers are now familiar with the concept, up from 20% just one year ago. But adoption is still a challenge as organizations rethink how they handle identity management.
Blog
While it’s easy for us to show you what makes Imprivata a great place to work, we asked our team what they love most about Imprivata, here’s what they had to say
Blog
As the number of cyberattacks and data breaches continue to rise in healthcare, organizations and their patients’ health information (PHI) are increasingly targeted.
News
Put yourself in my shoes… a Code Stroke patient arrives in our busy ER. Time is of the essence. We need to rapidly diagnose and treat the patient to prevent long term paralysis or even death. But nothing happens until we can access their health records, review the relevant data, order a CT scan, consult our colleagues, and initiate treatment. And none of that can happen at all because our hospital has put in a new enhanced password policy. As well they should. Keeping protected health information (PHI) private and secure is of utmost concern in healthcare…but more on that later.
News
The Fourth Industrial Revolution created a new digital world for manufacturers — one requiring greater connectivity, agility, and efficiency than ever before. To keep up with global demands, manufacturers transformed into smart factories. Now, critical operations no longer rely on just legacy applications and perimeter-based security but, instead, complex networks of software, workstations, and devices, in several different locations, accessed by hundreds of people.
Blog
We’ve made it through one full month of the New Year and the outlook for terrorism-related cyber incidents is already pretty stormy. During the standoff with Iran, cyberattacks were listed as one of their top possible responses.
News
From the development of the EMR to the growth of telehealth, the digital environment for healthcare has evolved tremendously over the last few years. So, it’s no surprise that IT spending is set to increase by 12.3% for cloud computing, 9.7%, for digital transformation, and 9.7% for security software this year. Though healthcare organizations have historically been slower to adopt cloud, we’re now seeing renewed interest.
Blog
The Works, which sells books, toys, and other objects, has 520 stores across the UK. Recently, many of those locations had to temporarily close after a major cyberattack on the retailer. This kind of cybersecurity incident is becoming more and more common across the globe as cyberattacks soar and industries like retail find themselves digitizing faster than their cybersecurity architecture can keep up.