5 Things to Know About Data Privacy Compliance for CCPA and Beyond
There’s much to know about CCPA, but these five key takeaways regarding data privacy compliance will help ease your preparations for the new regulation.
3 Ways Patient Privacy Monitoring Impacts Lives and Reduces the Cost of Data Breaches in the Healthcare Industry
Data breaches in the healthcare industry cost 2,100 lives and $4 billion annually. Read these 3 ways to protect both patient privacy and safety.
HIPAA compliance: What healthcare administrators need to know
HIPAA compliance: What healthcare administrators need to know
According to a report from Duo Security, 56% of healthcare companies across the U.S. are still operating on legacy operating systems and software. In case you’re not familiar with the term, legacy is just another word for outdated. In the world of cybersecurity, outdated usually means vulnerable to a cyberattack.
Configuring Windows Server NLB for multi-node deployment
Configuring Windows Server NLB for multi-node deployment
 
Privileged User Monitoring: 3 Ways to Prevent Privileged User Abuse in Healthcare
Your healthcare privacy program can be complicated. It may contain thousands of users, multiple admins, community portals, customized data structure – the list goes on. And to prevent data...
The challenge of multifactor authentication and shared accounts
The challenge of multifactor authentication and shared accounts
Recently, I wrote about the importance of combining multifactor authentication (MFA) and privileged access management.
Monthly Cloud Security Roundup: The Worst State for Online Privacy, the Adobe Data Breach, Russian Hackers Targeting the Olympics, and More
Discover the latest in cloud security news with October’s roundup, including Adobe’s data breach, the worst state for online privacy, and more.
Monthly Healthcare News Roundup: Class Action Lawsuit Against Opioid Manufacturers, the FDA’s New Draft Recommendations for CDS, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about a historic class action lawsuit against opioid manufacturers, the FDA’s...
Setting up a vendor management program
Setting up a vendor management program
Vendor management is a process or solution that allows organizations to optimize and secure the introduction and ongoing operations of third-party service providers into their business operations.
Considerations for healthcare during National Cybersecurity Awareness Month
Considerations for healthcare during National Cybersecurity Awareness Month
In recognition of National Cybersecurity Awareness Month, we’ve reached out to our resident cybersecurity experts, Imprivata CTO, Wes Wright, and Imprivata Director of Information Security and Corporate Compliance, Al Colon, to ask them about some of the burning cybersecurity issues in healthcare.
Departing Employees May Exit Your Building — But Have They Truly Left Your Organization?
Departing employees are a major source of risk for organizations. Evaluate the strength of your company’s offboarding process with this blog post.
So You’ve Had a HIPAA Breach… Now What?
You’ve overseen your healthcare organization’s privacy program. You’ve monitored HIPAA compliance. You’ve established security controls to protect patient data. But a HIPAA breach still happened....
PAM vs. VPAM…What’s the difference?
PAM vs. VPAM…What’s the difference?
Privileged Access Management (PAM) is a newer technology within the Identity and Access Management (IAM) space that focuses on applying additional controls and protections on accounts with privileged or administrative rights.
Patient Privacy and Home Care: How to Satisfy HIPAA Compliance Requirements On The Go
Patients are increasingly being cared for outside of hospitals – about 10,000 people turn 65  every day and many of them will need home-based healthcare. As a low-cost and outcome-based solution,...
CCPA Compliance: Survey Says Most Companies Aren’t Ready – Is Yours?
Companies managing the data of California residents are behind on CCPA compliance, but it’s time to act. Find out how to prepare here.
8 Takeaways from the 2019 Cost of a Data Breach Report
Discover eight of the top takeaways from the recent 2019 Cost of a Data Breach Report from IBM and Ponemon Institute in this blog post.
Monthly Healthcare News Roundup: Millions of Americans’ Data Exposed on the Internet, Best Practices for Mitigating Insider Threats, NIST Re
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn more about millions of Americans’ medical imaging data being available for...
Monthly Cloud Security Roundup: UK Banks’ Top Priority, New Salesforce Capabilities, the DoorDash Data Breach, and More
Discover the latest in cloud security news with September’s roundup, including the DoorDash data breach, new Salesforce features, and more.
How Two Systems Create a Culture of Compliance with Data Governance in Healthcare
Governance serves a dizzying array of purposes in healthcare – from acting as a blanket set of responsibilities to which an organization adheres to protecting systems through OCR audits and...
Salesforce Data Privacy and Why It Matters: Establishing Robust Privacy Practices in Salesforce and Beyond
In the webinar, Why Privacy Matters: How to Establish Trust Through Salesforce Security and Privacy, Salesforce Principal Platform Security Specialist Rachel Beard and United Capital CISO Mark...