Blog Listing

How to build a highly secure company network
News broke recently that a water plant in Florida, which provides water to businesses and around 15,000 residents, was permeated by a hacker. The hacker increased the amount of sodium hydroxide in the water treatment system to more than 10,000% of the normal ratio.
Is it time to rethink your third-party remote access platform?
Enterprise organizations around the world rely on third-party software applications to keep their businesses running both securely and efficiently. These necessary relationships between enterprises and vendors, however, are known to be risky because they are a top attack vector for hackers.
Teaser Feature Image
Healthcare Roundup: HIPAA Safe Harbor Bill, HIPAA Penalties Lifted, Takedown of Cyber Threats, and Biden's Cybersecurity Team
From the HIPAA Safe Harbor bill becoming law and the OCR lifting HIPAA penalties to the takedown of cyber threats and Biden’s cybersecurity team, read the most pressing healthcare news in this post.
Teaser Feature Image
Cloud Security Roundup: Microsoft 365 Phishing Attacks, Washington’s Potential Privacy Law, and More
Discover the latest cloud security news, including Microsoft 365 phishing attacks, the U.S.’ new cyber protection group, and more.
How vendors can navigate the challenges of remote support
Way back in 2018, we conducted a survey that found that for every technology vendor there are 239 customers who rely on their support. Sure, you're probably thinking that 2018 happened so long ago that you don't even remember what was going on before then, right?
4 key differences between consumer and enterprise biometrics (Part 1)
By now, we’re all pretty familiar with biometrics as a way to measure a person's physical characteristics to verify their identity. Most of us use biometrics daily to log in to our mobile devices via a fingerprint or face scan or to activate a home personal assistant device like Amazon Alexa or Google Home using our voice. These are popular methods of consumer biometrics.
The importance of HIPAA-compliant remote access and third parties
Though most are very familiar with the Health Insurance Portability and Accountability Act (HIPAA) and its relation to third parties and remote access, we're going to break it down a bit. HIPAA carries with it data privacy requirements for individuals, organizations, and entities working with patient information.
Teaser Feature Image
Healthcare Roundup: Top Privacy and Security Stories of 2020, Global Supply-Chain Cyberattacks, Changes to HIPAA's Privacy Rule, and More
From the top privacy and security stories of 2020 and global supply-chain cyberattacks to the proposed modifications to the HIPAA Privacy Rule and more, read the most pressing healthcare news here.
Teaser Feature Image
Cloud Security Roundup: SolarWinds Breach, Twitter’s GDPR Fine, WFH Insider Threats, and More
Discover the latest cloud security news, including, SolarWinds breach, Twitter’s $500k GDPR fine, WFH insider threats, and more.
COVID-19 has created additional digital identity management challenges in healthcare, Imprivata survey reveals
Points to need for healthcare-specific digital identity strategy
Build the best vendor access management program in 3 easy steps 
With the continued rise of high profile data breaches caused by third parties, many organizations are becoming aware that in order to maintain the security of their network and systems, they need to create and implement a solution for specifically managing access for their vendors.
The top 8 security points of vendor lifecycle management
Companies continue to heavily rely on third-party vendors to manage mission-critical business functions. These applications may be cloud-based (SaaS) or deployed on-premises and they are often accessed remotely via different devices.
Teaser Feature Image
SolarWinds "Orion" Supply-Chain Breach
There have been no reports or indications that any Imprivata FairWarning solutions have been compromised or otherwise impacted by this breach.
4 ways to prevent the next third-party data breach
Way back in 2018, the Department of Defense (DOD) reported a data breach that affected at least 30,000 military and civilian personnel. Let's take a stroll down memory lane to look at what happened in this data breach: hackers gained access through a third-party contractor that maintained travel records for the department.
The top 3 reasons VPNs are a compliance nightmare
Companies of all sizes often turn to virtual private networks, or VPNs, for a critical layer of data security. These solutions are used to protect user-information that's transferred via internet connections from unauthorized access.
Imprivata was in the news yesterday morning. Didn’t notice? Good.
You’d be forgiven for not noticing Imprivata in the news yesterday morning.
Imprivata and FairWarning: One company, one culture, and one shared mission to provide world-class customer service
Last week, we announced our 
Teaser Feature Image
Cloud Security Roundup: Salesforce Buys Slack, Top Cybersecurity Threats, CPRA Amends CCPA, and More
Discover the latest cloud security news, including, Salesforce’s purchase of Slack, the top cybersecurity threats, CPRA, and more.
Teaser Feature Image
Healthcare Roundup: UVM Health Restoring EHR Access, Healthcare Organizations As Sitting Ducks, SSL-Based Cyberattacks, and HHS Rules
From UVM Health restoring EHR access and healthcare organizations as sitting ducks to SSL-based cyberattacks and HHS rules, read the most pressing healthcare news in this post.
Managed Services by the numbers
A year-end review of how Imprivata Managed Services became a critical component of our customers’ success in 2020