Blog Listing

How providers can improve healthcare vendor management
How providers can improve healthcare vendor management
As the healthcare sector continues to adopt new technologies, their reliance on remote and cloud-based services has also exponentially increased. While relying on third-party vendors to provide more efficiency and state-of-the-art care and management, providers must also put more emphasis on healthcare vendor management.
Top vendor management processes to automate
Top vendor management processes to automate
Managing vendor access into your network and systems is becoming a more critical job as news about third-party breaches seems to break almost daily and regulatory focus on third-party risk is intensifying.
Monthly Cloud Security Roundup: 4.1 Billion Records Exposed, AI in Cybersecurity, iOS Jailbreaking, and More
Each month, we’ll bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss Facebook’s new data blocking tool, AI in...
Image of Meagan
Employee Spotlight: Meagan Tobin, IT Services Technician
Imprivata employees are very passionate about their roles at Imprivata but also take pride in the activities and hobbies they participate in outside the office. In this employee Q&A, Meagan Tobin, IT Services Technician, discusses her position at Imprivata, why she enjoys working at Imprivata, and what she likes to do outside of work.
30 Questions with Barbara Dumery, Senior Vice President of Product Management
30 Questions with Barbara Dumery, Senior Vice President of Product Management
In this “30 Questions” video, Imprivata Senior Vice President of Product Management, Barbara Dumery, is in the spotlight. In this video, Barbara candidly answers 30 random questions about her personal and professional life including her passions for watercolor painting, music, and working in healthcare.
blogpci2.png
Cultivating the next generation of leaders through the Imprivata Leadership Development Program
 “Inspire, equip, and develop leadership talent”Imprivata’s fifth Leadership Development Program (LDP) kicked off earlier this year.
Monthly Healthcare News Roundup: Black Market PHI Driving Espionage, Migrating to the Cloud to Protect Healthcare Data Security, and More
Every month, we compile the most compelling healthcare privacy and security related news stories. Below, you’ll learn more about black market PHI driving espionage, an alarming amount of hospital...
Types of remote access: Benefits & disadvantages
Types of remote access: Benefits & disadvantages
When an organization needs to provide employees or third parties remote access to its network, there are a number of solutions available. In this post, we’ll discuss the most popular types of remote access - VPNs, desktop sharing, PAM, and VPAM.
Leveraging technology to simplify clinical workflow
Leveraging technology to simplify clinical workflow
What role does technology play in a provider’s ability to deliver the best patient care? A large one.
Facing the Opioid Crisis by Identifying Signs of Drug Diversion
How can identifying signs of drug diversion help fight the opioid crisis? Find out more in this article that explores ways to combat the epidemic.
6 Independent Third-Party Sources for Vetting Cloud Security Vendors
How do you choose which vendors are doing their due diligence and offering you the most value? Trust these independent third-party sources when vetting cloud security vendors.
What's the most vulnerable part of your network?
What's the most vulnerable part of your network?
Researchers at DEF CON demonstrate the most “vulnerable part of your network” could be your SSL VPN. Last Friday at the annual DEF CON and Blackhat security conferences, Taiwanese security researchers Orange Tsai and Meh Chang revealed two new flaws in major vendor’s SSL VPN products.
3 considerations for multifactor authentication in healthcare
3 considerations for multifactor authentication in healthcare
Not only is multifactor authentication a critical tool for healthcare organizations lookin
Monthly Healthcare News Roundup: GDPR Compliance Fines for a Netherlands Hospital, Healthcare’s Number One Financial Issue, and More
In this edition of our healthcare news roundup, learn about GDPR Compliance fines for a Netherlands hospital, healthcare’s number one financial issue, and more.
Vulnerable vendors make you vulnerable
Vulnerable vendors make you vulnerable
Managing third-party vendors is a fact of life for many organizations, and one factor that is important to consider (yet often overlooked) is whether one or more of your vendors may be vulnerable to outside intrusion in any way.
4 steps to prevent third-party data breaches 
4 steps to prevent third-party data breaches 
As the lessons learned from the LabCorp and Quest Diagnostic's patient data hacks fade from our collective memory, we must remember that attacks on corporate health systems and government networks are occurring with greater frequency and impact.
Monthly Cloud Security Roundup: The Capital One Data Breach, CCPA’s Influence on US Privacy Laws, and More
Each month, we’ll bring you some of the most compelling cloud and Salesforce security-related stories from the last four weeks. In this post, we discuss the Capital One data breach, British...
Cloud Security Tools: Selecting the Right Solutions and the Right Vendors
In this post, we highlight the five most effective cloud security vendor solutions that thwart the type of malicious activity that threatens the safety of your data.
What to know when pricing VPNs and remote access software
What to know when pricing VPNs and remote access software
Deciding which remote access solution to use is not a simple or quick decision for most people, and it doesn't matter if you work in a large enterprise, a midsized organization, a small business, or on a solo project.
How do I manage my vendors efficiently?
How do I manage my vendors efficiently?
Businesses increasingly rely on vendors to make their operations run smoothly and efficiently. And because of this, many companies have migrated essential business operations to a cloud-based infrastructure. Although this outsourcing makes good business sense since it can save money, dependence on vendors also comes with security risks and operational challenges.