It is time for a national strategy on patient identity
By Sean Kelly
|
As a practicing emergency physician, I see the need for better patient identification on every shift. Every aspect of patient care begins with proper patient identification. Every decision I make depends on the availability and accuracy of the information available.…
Best practices to prevent data breaches for technology vendors
As a technology vendor, your number one goal is to provide the best service possible to your customers. The enterprises you support likely rely on you for pretty critical business functions, like operating machinery or storing confidential patient or client information.…
7 common VPN security risks: the not-so-good, the bad, and the ugly
Discover the common VPN security risks and learn how to protect your network. Learn how Imprivata Vendor Privileged Access Management can solve your VPN problems.…
Why Digital Identity Governance Matters for Clinicians, IT, and Compliance Officers
By Rebecca Slisz, Manager, Product Marketing, Imprivata
|
The COVID-19 pandemic profoundly impacted healthcare delivery organizations. Many HDOs were forced to quickly scale-up telehealth initiatives and remote-care options with little planning or notice. And many non-clinical employees (IT staff, financial personnel, marketing professionals, etc.) were forced to work from home—practically overnight.…
In Healthcare, Digital Identity is More Important than Ever
By Wes Wright, Chief Technology Officer at Imprivata
|
Imprivata is proud to be an Identity Management Champion for the first annual Identity Management Day, recognized on April 13, 2021. This day of awareness is designed to educate business leaders, IT decision makers, and the general public about the importance of managing and securing digital identities.…
Information blocking: Ensuring patients’ secure and convenient access to health information
Starting April 5, 2021, healthcare entities are required to abide by a specific rule set forth in the 21st Century Cures Act on Interoperability, Information Blocking, and ONC Health IT Certification. This rule gives patients the right to electronically access all of their electronic health information (EHI).…
Why governments need secure third-party remote access
Take a moment to think about the fallout of a government data breach. Security systems threatened. Federal departments, like the Treasury and State departments, compromised. Constituents’ trust displaced. Unfortunately, this was a reality for the U.S. government in late 2020.…
The value of PAM integrations with a credential vault
Imprivata's mission is to make third-party remote access as comprehensive and powerful as possible. To achieve this, our product integrates with a number of other cybersecurity programs and applications to make our customer’s experience as secure and efficient as possible.…
VPNs and desktop sharing slow you down and put you at risk
When you think about providing remote access to your network, VPNs and desktop sharing are the two most frequently used methods. VPNs are great for allowing access to local resources, but they present challenges for access for third-party vendors.…
News broke recently that a water plant in Florida, which provides water to businesses and around 15,000 residents, was permeated by a hacker. The hacker increased the amount of sodium hydroxide in the water treatment system to more than 10,000% of the normal ratio.…
Is it time to rethink your third-party remote access platform?
Enterprise organizations around the world rely on third-party software applications to keep their businesses running both securely and efficiently. These necessary relationships between enterprises and vendors, however, are known to be risky because they are a top attack vector for hackers.…
Healthcare Roundup: HIPAA Safe Harbor Bill, HIPAA Penalties Lifted, Takedown of Cyber Threats, and Biden's Cybersecurity Team
From the HIPAA Safe Harbor bill becoming law and the OCR lifting HIPAA penalties to the takedown of cyber threats and Biden’s cybersecurity team, read the most pressing healthcare news in this post.…
How vendors can navigate the challenges of remote support
Way back in 2018, we conducted a survey that found that for every technology vendor there are 239 customers who rely on their support. Sure, you're probably thinking that 2018 happened so long ago that you don't even remember what was going on before then, right?…
4 key differences between consumer and enterprise biometrics (Part 1)
By Jeremiah Mason
|
By now, we’re all pretty familiar with biometrics as a way to measure a person's physical characteristics to verify their identity. Most of us use biometrics daily to log in to our mobile devices via a fingerprint or face scan or to activate a home personal assistant device like Amazon Alexa or Google Home using our voice. These are popular methods of consumer biometrics.…
The importance of HIPAA-compliant remote access and third parties
Though most are very familiar with the Health Insurance Portability and Accountability Act (HIPAA) and its relation to third parties and remote access, we're going to break it down a bit. HIPAA carries with it data privacy requirements for individuals, organizations, and entities working with patient information.…
Healthcare Roundup: Top Privacy and Security Stories of 2020, Global Supply-Chain Cyberattacks, Changes to HIPAA's Privacy Rule, and More
From the top privacy and security stories of 2020 and global supply-chain cyberattacks to the proposed modifications to the HIPAA Privacy Rule and more, read the most pressing healthcare news here.…