Privileged User Monitoring: 3 Ways to Prevent Privileged User Abuse in Healthcare
Your healthcare privacy program can be complicated. It may contain thousands of users, multiple admins, community portals, customized data structure – the list goes on. And to prevent data...…
Monthly Healthcare News Roundup: Class Action Lawsuit Against Opioid Manufacturers, the FDA’s New Draft Recommendations for CDS, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn about a historic class action lawsuit against opioid manufacturers, the FDA’s...…
Vendor management is a process or solution that allows organizations to optimize and secure the introduction and ongoing operations of third-party service providers into their business operations.…
Considerations for healthcare during National Cybersecurity Awareness Month
by Wes Wright and Al Colon
|
In recognition of National Cybersecurity Awareness Month, we’ve reached out to our resident cybersecurity experts, Imprivata CTO, Wes Wright, and Imprivata Director of Information Security and Corporate Compliance, Al Colon, to ask them about some of the burning cybersecurity issues in healthcare.…
You’ve overseen your healthcare organization’s privacy program. You’ve monitored HIPAA compliance. You’ve established security controls to protect patient data. But a HIPAA breach still happened....…
Privileged Access Management (PAM) is a newer technology within the Identity and Access Management (IAM) space that focuses on applying additional controls and protections on accounts with privileged or administrative rights.…
Patient Privacy and Home Care: How to Satisfy HIPAA Compliance Requirements On The Go
Patients are increasingly being cared for outside of hospitals – about 10,000 people turn 65 every day and many of them will need home-based healthcare. As a low-cost and outcome-based solution,...…
Monthly Healthcare News Roundup: Millions of Americans’ Data Exposed on the Internet, Best Practices for Mitigating Insider Threats, NIST Re
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn more about millions of Americans’ medical imaging data being available for...…
How Two Systems Create a Culture of Compliance with Data Governance in Healthcare
Governance serves a dizzying array of purposes in healthcare – from acting as a blanket set of responsibilities to which an organization adheres to protecting systems through OCR audits and...…
Salesforce Data Privacy and Why It Matters: Establishing Robust Privacy Practices in Salesforce and Beyond
In the webinar, Why Privacy Matters: How to Establish Trust Through Salesforce Security and Privacy, Salesforce Principal Platform Security Specialist Rachel Beard and United Capital CISO Mark...…
In the News – Dreamforce 2019: Your Guide to Salesforce’s Party in San Fran
Get ready for Dreamforce 2019 with this comprehensive guide that contains everything you need to know about the upcoming tradeshow and learn what Imprivata FairWarning team members are excited for this year.…
How can you avoid the roadblocks in the way of your IAM and PAM project implementation?
Privileged Access Management (PAM) consistently receives recognition as the most important and impactful cybersecurity consideration. This is due to the criticality of privileged credentials and the need to protect them.…
4 Data Governance Best Practices for Healthcare Organizations
Governance is an essential aspect of healthcare organizations. Explore these 4 data governance best practices to better understand how organizations can boost compliance, prevent breaches, and more.…