Blog Listing

Monthly Cloud Security Roundup: The Worst State for Online Privacy, the Adobe Data Breach, Russian Hackers Targeting the Olympics, and More
Discover the latest in cloud security news with October’s roundup, including Adobe’s data breach, the worst state for online privacy, and more.
Monthly Healthcare News Roundup: Class Action Lawsuit Against Opioid Manufacturers, the FDA’s New Draft Recommendations for CDS, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about a historic class action lawsuit against opioid manufacturers, the FDA’s...
Setting up a vendor management program
Setting up a vendor management program
Vendor management is a process or solution that allows organizations to optimize and secure the introduction and ongoing operations of third-party service providers into their business operations.
Considerations for healthcare during National Cybersecurity Awareness Month
Considerations for healthcare during National Cybersecurity Awareness Month
In recognition of National Cybersecurity Awareness Month, we’ve reached out to our resident cybersecurity experts, Imprivata CTO, Wes Wright, and Imprivata Director of Information Security and Corporate Compliance, Al Colon, to ask them about some of the burning cybersecurity issues in healthcare.
Departing Employees May Exit Your Building — But Have They Truly Left Your Organization?
Departing employees are a major source of risk for organizations. Evaluate the strength of your company’s offboarding process with this blog post.
So You’ve Had a HIPAA Breach… Now What?
You’ve overseen your healthcare organization’s privacy program. You’ve monitored HIPAA compliance. You’ve established security controls to protect patient data. But a HIPAA breach still happened....
PAM vs. VPAM…What’s the difference?
PAM vs. VPAM…What’s the difference?
Privileged Access Management (PAM) is a newer technology within the Identity and Access Management (IAM) space that focuses on applying additional controls and protections on accounts with privileged or administrative rights.
Patient Privacy and Home Care: How to Satisfy HIPAA Compliance Requirements On The Go
Patients are increasingly being cared for outside of hospitals – about 10,000 people turn 65  every day and many of them will need home-based healthcare. As a low-cost and outcome-based solution,...
CCPA Compliance: Survey Says Most Companies Aren’t Ready – Is Yours?
Companies managing the data of California residents are behind on CCPA compliance, but it’s time to act. Find out how to prepare here.
8 Takeaways from the 2019 Cost of a Data Breach Report
Discover eight of the top takeaways from the recent 2019 Cost of a Data Breach Report from IBM and Ponemon Institute in this blog post.
Monthly Healthcare News Roundup: Millions of Americans’ Data Exposed on the Internet, Best Practices for Mitigating Insider Threats, NIST Re
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn more about millions of Americans’ medical imaging data being available for...
Monthly Cloud Security Roundup: UK Banks’ Top Priority, New Salesforce Capabilities, the DoorDash Data Breach, and More
Discover the latest in cloud security news with September’s roundup, including the DoorDash data breach, new Salesforce features, and more.
How Two Systems Create a Culture of Compliance with Data Governance in Healthcare
Governance serves a dizzying array of purposes in healthcare – from acting as a blanket set of responsibilities to which an organization adheres to protecting systems through OCR audits and...
Salesforce Data Privacy and Why It Matters: Establishing Robust Privacy Practices in Salesforce and Beyond
In the webinar, Why Privacy Matters: How to Establish Trust Through Salesforce Security and Privacy, Salesforce Principal Platform Security Specialist Rachel Beard and United Capital CISO Mark...
In the News – Dreamforce 2019: Your Guide to Salesforce’s Party in San Fran
Get ready for Dreamforce 2019 with this comprehensive guide that contains everything you need to know about the upcoming tradeshow and learn what Imprivata FairWarning team members are excited for this year.
How can you avoid the roadblocks in the way of your IAM and PAM project implementation?
How can you avoid the roadblocks in the way of your IAM and PAM project implementation?
Privileged Access Management (PAM) consistently receives recognition as the most important and impactful cybersecurity consideration. This is due to the criticality of privileged credentials and the need to protect them.
4 Data Governance Best Practices for Healthcare Organizations
Governance is an essential aspect of healthcare organizations. Explore these 4 data governance best practices to better understand how organizations can boost compliance, prevent breaches, and more.
Vendors and network vulnerability, part 2: Tools to reduce risk in vendor remote access
Vendors and network vulnerability, part 2: Tools to reduce risk in vendor remote access
In Part 1 of this blog post, we examined the risks inherent in using certain types of vendor remote access software, and the potential damage that can occur due to vendor caused network risks.
The Importance of Cloud Data Privacy and Trust
Organizations understand the importance of data security in the cloud, but many are realizing the need for cloud data privacy. Find out why privacy matters and how to implement it in this post.
Got Workflow? 3 Ways to Strengthen Your HIPAA Compliance Program
In preparation for NCHICA’s 25th Annual Conference from September 16-18, 2019, Beth Hunt, Chief Compliance Officer at Southeastern Health, and Lisa Fiene, Training Manager at Imprivata FairWarning, joined...