The search found 3762 results.
Blog
The stimulus package recently signed by President Obama has been the cause for vigorous debate. One by-product of the package that has not been widely discussed is a provision that would reshape the medical industry by creating a central repository of computerized medical records for all American's. An increase in the level of electronic information of this magnitude exponentially raises the vulnerability of a security breach, which we'll focus on today.
Customer
Learn how Steward centralized vendor management, implemented strict vendor access controls, and ensures HIPAA compliance with SecureLink.
Blog
Fighting drug diversion takes a holistic approach aided by powerful technology.
Blog
As we wrap up cybersecurity month, we’d be remiss if we didn’t visit the ever-present threat of ransomware attacks. Every time we look at the trends around ransomware attacks, the news is rarely positive. The frequency of these attacks has yet to slow down, with experts estimating that an attempted ransomware attack occurred every 11 seconds in 2021, with a total 700 million attempted attacks, up 134% from 2020. Phishing attacks continue to be a common and successful method by which attackers gain initial access to an organization’s network.
Blog
As cybersecurity risks escalate and evolve, organizations will need to be highly adaptive and proactive, while leveraging proven digital identity solutions to combat them in 2024 and beyond.
Blog
Kronos just experienced a big ransomware attack. But it feels like just another in a never-ending line. Here’s what you can do to help keep your organization safe.
Blog
I know you don’t really need reminding, but here it is anyway: the security of your organization needs to be top of mind. Always.
Customer
Starwood Capital Group needed to protect its data during (and after) its Salesforce migration, along with making Salesforce’s entry-log data more accessible, less cryptic, and more actionable.