Build the best vendor access management program in 3 easy steps
With the continued rise of high profile data breaches caused by third parties, many organizations are becoming aware that in order to maintain the security of their network and systems, they need to create and implement a solution for specifically managing access for their vendors.…
The top 8 security points of vendor lifecycle management
Companies continue to heavily rely on third-party vendors to manage mission-critical business functions. These applications may be cloud-based (SaaS) or deployed on-premises and they are often accessed remotely via different devices.…
4 ways to prevent the next third-party data breach
Way back in 2018, the Department of Defense (DOD) reported a data breach that affected at least 30,000 military and civilian personnel. Let's take a stroll down memory lane to look at what happened in this data breach: hackers gained access through a third-party contractor that maintained travel records for the department.…
Companies of all sizes often turn to virtual private networks, or VPNs, for a critical layer of data security. These solutions are used to protect user-information that's transferred via internet connections from unauthorized access.…
Healthcare Roundup: UVM Health Restoring EHR Access, Healthcare Organizations As Sitting Ducks, SSL-Based Cyberattacks, and HHS Rules
From UVM Health restoring EHR access and healthcare organizations as sitting ducks to SSL-based cyberattacks and HHS rules, read the most pressing healthcare news in this post.…
Key Attributes and Habits of Privacy and Data Protection Program Maturity
How does data protection program maturity impact the success of an organization's data privacy efforts? Discover the attributes of mature data protection programs here.…
Data breaches that involve third parties, vendors, and contractors have continued to make headlines throughout the past 10 years. We continue to see headlines, see articles on social media, and we've all become numb to getting the letters in the mail about another data breach.…
Healthcare Roundup: Ryuk Ransomware Attacks, Insider Threats, ONC Information Blocking, and More
From the recent Ryuk ransomware attacks on U.S. hospitals to the delay to the ONC information blocking requirements deadline, and more, read the most pressing healthcare news in this post.…
The continued importance of patient identification during COVID-19
By Rebecca Slisz
|
The COVID-19 pandemic is placing an enormous burden and stress on our entire healthcare system -- from strained ICUs and a lack of adequate personal protective equipment (PPE) to grossly inadequate testing and inaccurate reporting systems.…
Why efficiency and security are more important than ever for vendor access management
We're not going to be dropping new information when we say that security is important when allowing network access to external parties like vendors and contractors. Along the same lines, breaches coming from third-party access are increasing, as vendors often offer an easier way into your network than a full-frontal assault on your defenses.…
Insights from Roundtable of Pharmacy Directors’ Discussion of Drug Diversion
Imprivata FairWarning convened a Roundtable of Directors of Pharmacy to discuss drug diversion - the lasting impacts, red flags, how to identify incidents, and industry resources.…