The spotlight continues to shine on data breach incidents. It comes as no surprise that the average cost of a data breach in 2017 has risen in the U.S. Learn key takeaways from the study in this post.…
OCR Seeks Public Comment on HIPAA Privacy Rule Impact on Coordinated Care, Possible Changes to Rules
If you’ve ever felt like the HIPAA Privacy Rule needs some work — or stands in your organization’s way of providing coordinated, value-based healthcare — then the U.S. Department of Health and...…
Motivations Never Imagined – The Escalating Value of Patient Information to Bad Actors
The need for real-time information security with coordination between vendors and customers across the industry a necessity. In this post, read more about protecting patient data from bad actors.…
At this year’s annual HIMSS conference, held last month in Orlando, Florida, we joined more than 45,000 professionals from across the globe to showcase innov…
At this year’s annual HIMSS conference, held last month in Orlando, Florida, we joined more than 45,000 professionals from across the globe to showcase innov…
Where to Find Imprivata at HIMSS19: By the Numbers
Gus Malezis
|
Imprivata had an incredible 2018 and the momentum continues to build as we look towards HIMSS19 (February 11-15 in Orlando, FL) where we’ll be debuting innov…
Employee remote access risks vs. vendor access threats
The last decade saw a dramatic increase of enterprise employees leaving the confines of the company building to work remotely. The State of the Remote Job Marketplace report from FlexJobs found 2.9% of the entire United States workforce works from home at least half of the time. This introduces a significant security challenge for network managers.…
The top five takeaways from the 2018 Gartner Identity and Access Management Summit
Rebecca Slisz
|
There are three main components of an identity and access management (IAM) strategy: identity governance and administration, access management (including privileged access management), and adaptive multifactor authentication.…
For decades, the healthcare industry has struggled with accurately linking a patient’s health data within and across health systems — an activity known as pa…
‘Reference Architecture’ guide helps customers implement Imprivata OneSign Single Sign-On with Epic systems
Joel Alcon
|
We know how time-consuming it can be to identify various types of clinical workflows within a healthcare organization and then deploy technology securely without creating disruptions for end users. How do you enable single sign-on (SSO) into the EHR for each clinician, even though some may be accessing via shared workstations or through virtual desktops?…
Enacted into law in 1996, the Health Insurance Portability and Accountability Act (HIPAA) includes five sections detailing data privacy and security provisio…