Blog Listing

Showcasing Change and Innovation at HIMSS19
Showcasing Change and Innovation at HIMSS19
At this year’s annual HIMSS conference, held last month in Orlando, Florida, we joined more than 45,000 professionals from across the globe to showcase innov
Patient safety has it's own week. Here's why.
Patient safety has it's own week. Here's why.
Patient Safety Awareness Week - March 10–16 - is an annual event that brings patient safety into laser focus.
Where to Find Imprivata at HIMSS19: By the Numbers
Where to Find Imprivata at HIMSS19: By the Numbers
Imprivata had an incredible 2018 and the momentum continues to build as we look towards HIMSS19 (February 11-15 in Orlando, FL) where we’ll be debuting innov
Employee remote access risks vs. vendor access threats
Employee remote access risks vs. vendor access threats
The last decade saw a dramatic increase of enterprise employees leaving the confines of the company building to work remotely. The State of the Remote Job Marketplace report from FlexJobs found 2.9% of the entire United States workforce works from home at least half of the time. This introduces a significant security challenge for network managers.
A proposed solution to the challenges of patient matching, in response to the GAO report
A proposed solution to the challenges of patient matching, in response to the GAO report
Earlier this month, the GAO (Government Accountability Office) released a report long-anticipated
Overcome risk to drive a successful healthcare IT strategy (Part I)
Overcome risk to drive a successful healthcare IT strategy (Part I)
If you’re a health system Chief Information Security Officer (CISO), you have one over-arching element you deal with all the time: operational risk.
Are You EPCS Ready? The National Compliance Deadline is Less than Two Years Away
Are You EPCS Ready? The National Compliance Deadline is Less than Two Years Away
On October 24, 2018, President Trump signed into law the “SUPPORT fo
The top five takeaways from the 2018 Gartner Identity and Access Management Summit
The top five takeaways from the 2018 Gartner Identity and Access Management Summit
There are three main components of an identity and access management (IAM) strategy: identity governance and administration, access management (including privileged access management), and adaptive multifactor authentication.
10 questions to ask privileged access management vendors
10 questions to ask privileged access management vendors
If a hacker gets access to your privileged accounts they can move around your network, applications and equipment.
The do's and don'ts of using active directory in your organization
The do's and don'ts of using active directory in your organization
Active Directory (AD) is so ubiquitous on Windows networks that many organizations have not invested time optimizing the tool.
The importance and impact of patient matching
The importance and impact of patient matching
For decades, the healthcare industry has struggled with accurately linking a patient’s health data within and across health systems — an activity known as pa
‘Reference Architecture’ guide helps customers implement Imprivata OneSign Single Sign-On with Epic systems
‘Reference Architecture’ guide helps customers implement Imprivata OneSign Single Sign-On with Epic systems
We know how time-consuming it can be to identify various types of clinical workflows within a healthcare organization and then deploy technology securely without creating disruptions for end users. How do you enable single sign-on (SSO) into the EHR for each clinician, even though some may be accessing via shared workstations or through virtual desktops?
Imprivata for Community Connect offers a cost-saving and secure solution for Great Plains Health
Imprivata for Community Connect offers a cost-saving and secure solution for Great Plains Health
To help streamline workflows for healthcare organizations who use Epic Community Connect, Imprivata developed
10 most common HIPAA violations and solutions
10 most common HIPAA violations and solutions
Enacted into law in 1996, the Health Insurance Portability and Accountability Act (HIPAA) includes five sections detailing data privacy and security provisio
The Broad Impact of Unique Patient Identifiers
The Broad Impact of Unique Patient Identifiers
Originally published by Just Associates
How to improve patient care starting at registration
How to improve patient care starting at registration
Wait times across all types of healthcare settings averaged nearly 19 minutes in 2017, according to a Vitals2 study.
Getting authentication right – considerations for medical device security
Getting authentication right – considerations for medical device security
Drivers such as HIPAA compliance, general PHI privacy, and concerns around unauthorized use have led to increased regulations for medical device security.
What is access provisioning in Identity Access Management (IAM)?
What is access provisioning in Identity Access Management (IAM)?
Account provisioning in identity access management solutions simplify and reduce time to complete tasks. Learn why IAM is the best choice in this blog.
Why an identity governance program is important in healthcare
Why an identity governance program is important in healthcare
Controlling and securing access to protected health information (PHI) is one of the most
Mass lawmakers embrace electronic prescribing of controlled substances
Mass lawmakers embrace electronic prescribing of controlled substances
Massachusetts lawmakers recently passed legislation that requires providers and pharmacies to switch to electronic prescribing of opioid medication by 2020,