Leading Academic Study Shows the Value of Imprivata OneSign to Hospitalists
Leading Academic Study Shows the Value of Imprivata OneSign to Hospitalists
A recent study released in the Journal of Hospital Administration (JHA) – titled “Easing hospitalist electronic health
Monthly Cloud Security Roundup: The Impact of the Cybersecurity Skills Gap, The Most Expensive Cause of Data Breaches, and More
Discover the latest cloud security news with July’s roundup, including the impact of the cybersecurity skills gap and more.
Monthly Healthcare News Roundup: The State of Healthcare Data Breaches in 2020, Telehealth Expansions, and More
From the cost of a health sector data breach to telehealth expansions, read the most pressing healthcare news from the last month.
Is cyber insurance worth it?
Is cyber insurance worth it?
These days, having cyber insurance that covers a company for costs related to cyberattacks is an expected standard corporate practice. It is the last in the line of risk mitigation tools that lessens or defers your company’s cyber risk.
The CISO is dead; Long live the CISO
The CISO is dead; Long live the CISO
More and more companies are hiring Chief Information Security Officers (CISOs) to navigate the rough waters of cybersecurity. The need for CISOs in enterprise organizations is at the height of importance with the increase in both ransomware attacks and data breaches.
Manage your vendors efficiently: Top features for remote access software
Manage your vendors efficiently: Top features for remote access software
Providing remote access for your third-party vendors is an essential part of doing business. Whether it’s Amazon’s AWS, Google’s G-Suite, or a custom platform, most enterprises have migrated their back-office, e-commerce, and other operations to cloud applications and remote services infrastructure.
The case for more Mobile in Healthcare
The case for more Mobile in Healthcare
During the last four months we’ve seen some dramatic changes in the UK healthcare landscape, particularly as the entire nation adapts to more mobile and home working. Now, everyone that can work from home, is doing so. This rapid uptake in the use of technology necessitated by the move to home working has advanced some trusts by several years.
What is vendor privileged access management (VPAM)?
What is vendor privileged access management (VPAM)?
If you’re in the cybersecurity world, you’ve probably come across the acronym PAM, or Privileged Access Management. This technology adds additional access controls and processes to coveted privileged credentials in order to prevent them from being compromised, while also limiting the damage if they ever are compromised.
Monthly Cloud Security Roundup: Hybrid Cloud Security Challenges, Vermont’s Updated Data Breach Law, Zoom’s New CISO, And More
Discover the latest cloud security news, including hybrid cloud security challenges, Vermont’s updated data breach law, Zoom’s new CISO, and more.
Healthcare News Roundup: How Machine Learning Can Shift Volume Based Care to Value Based Care & More
From shifting volume-based care to value-based care with machine learning to preventing medical record hacks, read pressing healthcare news from last month.
What is third-party remote access?
What is third-party remote access?
Risk management is critical for any company looking for growth and profit instead of liabilities and reputational damages. So let's answer an important question: What is third-party remote access, and why should you care? Networks can be attacked from all sides.
In the COVID-19 battle, did we leave our best players on the bench?
In the COVID-19 battle, did we leave our best players on the bench?
When it comes to battling COVID-19, did we leave our best players on the bench?
How reputational damage from a data breach affects consumer perception
How reputational damage from a data breach affects consumer perception
Conversations regarding cyberattacks are often limited to the organization that suffered reputational damage from a data breach. We talk about what led to the cyberattack, how it was found and reported, and the associated costs.
Monthly Cloud Security Roundup: The Impact of COVID-19 on Cybersecurity, Managing Remote Employee Risks, and More
Each month, we bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss the impact of COVID-19 on cybersecurity, the...
Monthly Healthcare News Roundup: Top 10 Children’s Hospitals in the US, Maintaining Cybersecurity During a Crisis, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about the top 10 children’s hospitals in the US, maintaining cybersecurity...
Consumer password habits: Concerning, but not surprising
Consumer password habits: Concerning, but not surprising
Whether it’s a sticky note, a phone app, or keeping a password saved on your computer, we don’t always take all the precautions that we should to keep our password a secret from others.
Implementing role-based access controls for third-party access
Implementing role-based access controls for third-party access
Role-Based Access Control, or RBAC as it’s commonly referred to, is one of the types of access control that has been considered a core best practice for organizations to protect their IT assets for a long time.
Key elements of third-party remote access audit controls
Key elements of third-party remote access audit controls
I have written often about the three main principles of sound Third-Party Risk Management (TPRM); they are identify, control and audit. By using these three basic control areas, risk from third parties to organizations can be greatly reduced.
How do companies get hacked?
How do companies get hacked?
It's not a matter of if your company will be hacked - but when. Planning and ongoing preparation is the ultimate protection against cyber-attacks. Our guest blogger and cybersecurity expert, Marco Essomba, explores seven reasons companies get hacked.
Guiding Salesforce Security Priorities with the 2020 Verizon Data Breach Investigations Report
Salesforce Security Architect and former author of the Verizon Data Breach Investigations Report Kevin Thompson offers key insights from the 2020 DBIR.