Blog Listing

Teaser Feature Image
Image of a doctor inputting prescription
Mitigating drug diversion: Safeguard patients, providers, and healthcare organizations by implementing best practices
Best practices for combating drug diversion are based on protecting both inpatient and outpatient settings with an emphasis on using electronic prescript
Teaser Feature Image
Imprivata building
Introducing The New Imprivata.com: A Fresh Digital Experience
We are thrilled to announce the launch of our brand-new website, and we couldn't be more excited to share it with you.
Teaser Feature Image
Identity governance
Take a look at the improvements we’ve made to Imprivata Identity Governance 7.5
Discover the latest and greatest Imprivata Identity Governance has to offer... 
Teaser Feature Image
Business woman with phone stock
Simplify and secure your shared mobile device strategy
Shared mobile devices come with immense benefits, but they also introduce vulnerabilities that demand a sound mobile device security strategy.
Teaser Feature Image
Travel nurse stock
Seamless onboarding for travel nurses: Providing day one access without risks or password sharing
Don't let the demand for travel nurses put patient safety at risk.
Teaser Feature Image
Access management
Recapping VMware Explore 2023: Mobility & Digital Identity Drive Interest
Organizations are embracing a mobile-first future and are looking for technologies that improve mobile experiences, both for end-users and IT teams.
Teaser Feature Image
Image of a doctor using a mobile phone
Frustration and friction-free: Secure mobile workflows
Frictionless mobile device security is not an oxymoron. You really can unlock the power of mobility without frustrating clinicians (or CISOs).
Teaser Feature Image
Image of a person's finder, with a holographic fingerprint on top
Conquer the CISO’s top challenge with powerful identity and access management solutions
A new report on challenges faced by CISOs ranks IAM as a top concern and priority. Are you prepared to meet the identity and access needs of today?
Teaser Feature Image
IT security
Don’t slow down: The importance of accelerating your identity and access management investments
Investing in identity and access management solutions is imperative for your organization’s security and bottom line, now more than ever. Find out more!
Teaser Feature Image
brain health technology
Navigating the risks of identity governance and artificial intelligence
Identity governance and artificial intelligence can be a beautiful technological marriage that enhances security and optimizes the benefits of technology
Teaser Feature Image
Backlit keyboard
Third parties are a major source of ransomware attacks –here’s what you can do about it
Healthcare organizations are particularly vulnerable to ransomware attacks, and nearly half of these attacks enter through third-party access points.
Teaser Feature Image
Hard working
The three key phases to achieve a mature privacy monitoring program
Best practices for a mature privacy monitoring program are based in three key phases that build upon one another, and quickly progress in scope and sophi
Teaser Feature Image
Nurse with ipad
Imprivata Humans of Healthcare: Tara Gregorio, RN
Our Humans of Healthcare series aims to spotlight medical professionals like Tara – the very foundation of our healthcare system.
Teaser Feature Image
Image of a person's thumb with graphics over it
Imprivata Privileged Access Management in 2023: Simplify workflows with new features and enhancements.
Check out the latest improvements we’ve made to Imprivata Privileged Access Management in the first half of 2023.
Teaser Feature Image
nurse holding phone
Mobile innovation supports care without barriers. Imprivata supports mobility without risk.
Mobile technology is playing an increasingly important role in enabling clinical workflows, but ensuring its security is still a concern for HDOs.
Teaser Feature Image
Doctor writing prescription
The prescription for preventing patient misidentification
Inaccurate patient information can lead to medical record errors and dire consequences for both patients and healthcare delivery organizations. The good news? Biometric patient identification can deliver a proven solution for preventing patient misidentification.
Teaser Feature Image
Digital-business-interface-and-icons
Using large language models like ChatGPT in healthcare: Make sure you understand the risks
ChatGPT opens doors to exciting new possibilities in healthcare, but significant risks remain – particularly when it comes to data privacy and security.
Teaser Feature Image
Image of a lock
Cybersecurity leadership panel shares perspective on healthcare IoT and protecting patient data
Cybersecurity leaders share perspectives on challenges and best practices surrounding patient data privacy and healthcare IoT devices. Read the blog.
Teaser Feature Image
User access
Top User Access Review Best Practices
Learn what user access reviews are, the risks of not reviewing user access, and recommended user access review best practices. Read the blog.
Teaser Feature Image
Cyber insurance: Elusive. Expensive. Essential.
Cyber insurance: Elusive. Expensive. Essential.
Worried about whether you can meet rapidly changing cyber insurance requirements? You’re not alone. But there are steps you can take to help secure (and afford) protection.