In the News – Dreamforce 2019: Your Guide to Salesforce’s Party in San Fran
Get ready for Dreamforce 2019 with this comprehensive guide that contains everything you need to know about the upcoming tradeshow and learn what Imprivata FairWarning team members are excited for this year.…
How can you avoid the roadblocks in the way of your IAM and PAM project implementation?
Privileged Access Management (PAM) consistently receives recognition as the most important and impactful cybersecurity consideration. This is due to the criticality of privileged credentials and the need to protect them.…
4 Data Governance Best Practices for Healthcare Organizations
Governance is an essential aspect of healthcare organizations. Explore these 4 data governance best practices to better understand how organizations can boost compliance, prevent breaches, and more.…
Vendors and network vulnerability, part 2: Tools to reduce risk in vendor remote access
In Part 1 of this blog post, we examined the risks inherent in using certain types of vendor remote access software, and the potential damage that can occur due to vendor caused network risks.…
Organizations understand the importance of data security in the cloud, but many are realizing the need for cloud data privacy. Find out why privacy matters and how to implement it in this post.…
Got Workflow? 3 Ways to Strengthen Your HIPAA Compliance Program
In preparation for NCHICA’s 25th Annual Conference from September 16-18, 2019, Beth Hunt, Chief Compliance Officer at Southeastern Health, and Lisa Fiene, Training Manager at Imprivata FairWarning, joined...…
How providers can improve healthcare vendor management
As the healthcare sector continues to adopt new technologies, their reliance on remote and cloud-based services has also exponentially increased. While relying on third-party vendors to provide more efficiency and state-of-the-art care and management, providers must also put more emphasis on healthcare vendor management.…
Managing vendor access into your network and systems is becoming a more critical job as news about third-party breaches seems to break almost daily and regulatory focus on third-party risk is intensifying.…
Monthly Cloud Security Roundup: 4.1 Billion Records Exposed, AI in Cybersecurity, iOS Jailbreaking, and More
Each month, we’ll bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss Facebook’s new data blocking tool, AI in...…
Employee Spotlight: Meagan Tobin, IT Services Technician
Kelliann McCabe
|
Imprivata employees are very passionate about their roles at Imprivata but also take pride in the activities and hobbies they participate in outside the office. In this employee Q&A, Meagan Tobin, IT Services Technician, discusses her position at Imprivata, why she enjoys working at Imprivata, and what she likes to do outside of work.…
30 Questions with Barbara Dumery, Senior Vice President of Product Management
by Kelliann McCabe
|
In this “30 Questions” video, Imprivata Senior Vice President of Product Management, Barbara Dumery, is in the spotlight. In this video, Barbara candidly answers 30 random questions about her personal and professional life including her passions for watercolor painting, music, and working in healthcare.…
Monthly Healthcare News Roundup: Black Market PHI Driving Espionage, Migrating to the Cloud to Protect Healthcare Data Security, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn more about black market PHI driving espionage, an alarming amount of hospital...…
When an organization needs to provide employees or third parties remote access to its network, there are a number of solutions available. In this post, we’ll discuss the most popular types of remote access - VPNs, desktop sharing, PAM, and VPAM.…
6 Independent Third-Party Sources for Vetting Cloud Security Vendors
How do you choose which vendors are doing their due diligence and offering you the most value? Trust these independent third-party sources when vetting cloud security vendors.…
Researchers at DEF CON demonstrate the most “vulnerable part of your network” could be your SSL VPN. Last Friday at the annual DEF CON and Blackhat security conferences, Taiwanese security researchers Orange Tsai and Meh Chang revealed two new flaws in major vendor’s SSL VPN products.…
Monthly Healthcare News Roundup: GDPR Compliance Fines for a Netherlands Hospital, Healthcare’s Number One Financial Issue, and More
In this edition of our healthcare news roundup, learn about GDPR Compliance fines for a Netherlands hospital, healthcare’s number one financial issue, and more.…