Blog Listing

4 ways to prevent the next third-party data breach
4 ways to prevent the next third-party data breach
Way back in 2018, the Department of Defense (DOD) reported a data breach that affected at least 30,000 military and civilian personnel. Let's take a stroll down memory lane to look at what happened in this data breach: hackers gained access through a third-party contractor that maintained travel records for the department.
The top 3 reasons VPNs are a compliance nightmare
The top 3 reasons VPNs are a compliance nightmare
Companies of all sizes often turn to virtual private networks, or VPNs, for a critical layer of data security. These solutions are used to protect user-information that's transferred via internet connections from unauthorized access.
Imprivata was in the news yesterday morning. Didn’t notice? Good.
Imprivata was in the news yesterday morning. Didn’t notice? Good.
You’d be forgiven for not noticing Imprivata in the news yesterday morning.
Imprivata and FairWarning: One company, one culture, and one shared mission to provide world-class customer service
Imprivata and FairWarning: One company, one culture, and one shared mission to provide world-class customer service
Last week, we announced our 
Cloud Security Roundup: Salesforce Buys Slack, Top Cybersecurity Threats, CPRA Amends CCPA, and More
Discover the latest cloud security news, including, Salesforce’s purchase of Slack, the top cybersecurity threats, CPRA, and more.
Healthcare Roundup: UVM Health Restoring EHR Access, Healthcare Organizations As Sitting Ducks, SSL-Based Cyberattacks, and HHS Rules
From UVM Health restoring EHR access and healthcare organizations as sitting ducks to SSL-based cyberattacks and HHS rules, read the most pressing healthcare news in this post.
Managed Services by the numbers
Managed Services by the numbers
A year-end review of how Imprivata Managed Services became a critical component of our customers’ success in 2020 
How remote access support software helps vendors support their customers
How remote access support software helps vendors support their customers
Data breaches caused by the remote access that vendors and external third parties have continues to be the easiest way hackers have into a network.
Key Attributes and Habits of Privacy and Data Protection Program Maturity
How does data protection program maturity impact the success of an organization's data privacy efforts? Discover the attributes of mature data protection programs here.
How data breaches affect technology vendors
How data breaches affect technology vendors
Data breaches that involve third parties, vendors, and contractors have continued to make headlines throughout the past 10 years. We continue to see headlines, see articles on social media, and we've all become numb to getting the letters in the mail about another data breach.
New Imprivata FairWarning Dashboard Experience Offers Enhancements to Save Time and Increase Efficiency
The latest release of Imprivata FairWarning includes a new dashboard experience that helps you save time and increase efficiency.
Healthcare Roundup: Ryuk Ransomware Attacks, Insider Threats, ONC Information Blocking, and More
From the recent Ryuk ransomware attacks on U.S. hospitals to the delay to the ONC information blocking requirements deadline, and more, read the most pressing healthcare news in this post.
Cloud Security Roundup: China’s Data Protection Law, Microsoft Teams Security Threats, and More
Discover the latest cloud security news, including China’s data protection law, Microsoft Teams security threats, and more.
Privacy Pays: Why and How to Develop a Mature Data Protection Program
What is a mature data protection program and how does implementing one benefit your organization? Learn more in this post.
The continued importance of patient identification during COVID-19
The continued importance of patient identification during COVID-19
The COVID-19 pandemic is placing an enormous burden and stress on our entire healthcare system -- from strained ICUs and a lack of adequate personal protective equipment (PPE) to grossly inadequate testing and inaccurate reporting systems.
Why efficiency and security are more important than ever for vendor access management
Why efficiency and security are more important than ever for vendor access management
We're not going to be dropping new information when we say that security is important when allowing network access to external parties like vendors and contractors. Along the same lines, breaches coming from third-party access are increasing, as vendors often offer an easier way into your network than a full-frontal assault on your defenses.
Insights from Roundtable of Pharmacy Directors’ Discussion of Drug Diversion
Imprivata FairWarning convened a Roundtable of Directors of Pharmacy to discuss drug diversion - the lasting impacts, red flags, how to identify incidents, and industry resources.
New independent research reveals significant time and cost savings with single sign-on
New independent research reveals significant time and cost savings with single sign-on
As an emergency physician, I’ve been deeply impressed by the medical community’s response to the crisis conditions imposed by the 
How the cloud could improve vendor access management
How the cloud could improve vendor access management
At first, it may seem antithetical to consider deploying a vendor access management system in the cloud. After all, you are trying to provide access for third parties to internal systems, and whether it’s a VPN concentrator or a vendor privileged access management (VPAM) system, these devices typically sit inside or on your DMZ.
Multi-factor authentication for remote access
Multi-factor authentication for remote access
Multi-factor authentication (MFA) is talked about, and used, a lot in our day-to-day lives. A classic example of using MFA is a debit card. Not only do you need the physical card, but you also have to enter a personal identification number (PIN) to use it when checking out at a store, or when taking money out of the ATM.