The search found 135 results.
News
Shared-use mobile devices are transforming care delivery across Australia’s hospitals, offering clinicians faster access to patient information and driving significant cost efficiencies. Imprivata research reveals that Australian hospitals could save an average of A$1.2 million annually through shared mobile device programs.
News
As Zero Trust architecture becomes the framework for most modern cybersecurity strategies, many overlook a critical vulnerability: vendor access. Only 36% of health IT leaders say their organisations have a privileged access strategy applied consistently enterprise-wide, according to data from Imprivata and the Ponemon Institute.
News
Passwords remain one of the weakest links in cybersecurity. According to Verizon’s 2024 Data Breach Investigations Report, 80% of breaches stem from compromised credentials.
News
Recent Imprivata research reveals a growing security gap in healthcare as more organisations incorporate mobile devices into their technology fleets. The findings show that 74% of shared-use devices are often left signed in after use, and 79% of staff admit to sharing credentials, putting sensitive patient data at risk. Data security is the most frequently cited challenge for shared-use device adoption, cited by 44% of respondents.
News
Healthcare IT teams have struggled to balance cybersecurity compliance and clinical efficiency. Each new digital system required for care delivery, like electronic health records (EHRs), prescription services, lab portals, etc., adds another login to a busy clinician’s workflow.
News
As healthcare accelerates digital transformation efforts, leaders are confronting a critical balancing act: advancing innovation while fortifying defences against growing cyber threats. According to the 2024 Digital Health Most Wired report, IT budget allocations for digital initiatives nearly doubled from 4.8% to 9.7% year over year. This indicates that digital transformation is now essential to care delivery.
News
Passwords continue to slow down productivity in fast-paced workflows. In addition to creating inefficiencies, they are also known to be less secure than other authentication methods. According to IBM’s Cost of a Data Breach Report, 90% of successful cyberattacks and 70% of data breaches originate at endpoint devices.