Retailers: Are vendors leaving you vulnerable?
Retailers: Are vendors leaving you vulnerable?
The threat is real. With all the security risks facing retailers today, we look at an approach to secure your remote support and deliver rapid, safe vendor access, track every system session, and gain proof of PCI compliance.
Cybersecurity and third-party vendor access
Cybersecurity and third-party vendor access
There’s a trend of hackers being able to remain on an organization’s network for periods of time – without even being detected. Does this make you think about what measures you currently have in place to provide visibility of who is on your network, and what they are doing?
Can you really trust your VPN?
Can you really trust your VPN?
As the need grows for supporting geographically spread vendors, how can you make sure you’re validating identities and encrypting all data to keep your network secure?
Imprivata leading the way in the IAM category in the KLAS Cybersecurity 2017 report
Imprivata leading the way in the IAM category in the KLAS Cybersecurity 2017 report
With 90% of healthcare organizations breached in the past two years,1 it’s no wonder that cybersecurity has become a front-and-center priority of
Education: How are you securing access to data?
Education: How are you securing access to data?
Due to the rise in cyber threats, educational institutions are facing increasing pressure to protect their sensitive data. In addition, they have to comply with FERPA or risk facing penalties. Read this blog to learn steps your organization can take to prevent a security attack.
Back to the Future
Back to the Future
It was February 2012 at HIMSS in Las Vegas when I first got a glimpse into the future of End User Computing.
Identifying new cybersecurity threats
Identifying new cybersecurity threats
Discover emerging cybersecurity threats - and ways your organization can combat them. In this blog, you’ll learn about the latest tricks cybercriminals are using to target your company and find guidance on how to be vigilant against these attacks.
Healthcare organizations report thousands of hours and millions of dollars saved with SSO and VDI
Healthcare organizations report thousands of hours and millions of dollars saved with SSO and VDI
As a practicing emergency physician, I’ve seen firsthand how technology impacts patient care.
Virginia joins the ranks of states using e-prescribing to save lives, combat opioid abuse
Virginia joins the ranks of states using e-prescribing to save lives, combat opioid abuse
As the nation’s opioid epidemic grows, technology continues to play an increasing role in combatting the crisis.
Technology is a Powerful Weapon in the Fight Against Opioid Abuse
Technology is a Powerful Weapon in the Fight Against Opioid Abuse
Recently, Imprivata’s Chief Medical Officer, Dr.
Third-party vendors and HIPAA compliance
Third-party vendors and HIPAA compliance
Considering the risks of HIPAA non-compliance, health care companies generally benefit from hiring third party vendors that specifically handle HIPAA regulatory compliance. To fully protect patients, these vendors should have clear policies that restrict access, remain transparent and auditable, and maintain the most updated data security measures.
How Saint Joseph Health System is making checking in more secure and accurate with biometric identification
How Saint Joseph Health System is making checking in more secure and accurate with biometric identification
Checking in to a hospital can be a long and tedious process, but palm vein biometric identification technology can make registration simple, saving not only
A Virtualized Healthcare Environment: The keys to improving Metro Health: University of Michigan Health’s clinical and patient experience
A Virtualized Healthcare Environment: The keys to improving Metro Health: University of Michigan Health’s clinical and patient experience
I recently sat down with Joshua Wilda, VP of Information Technology at Metro Health: University of Michigan Health, a 208-bed teaching hospital in western Mi
Imprivata Confirm ID Earns Citrix Stamp of Approval
Imprivata Confirm ID Earns Citrix Stamp of Approval
The healthcare industry is undoubtedly facing serious security challenges. As evidence, the U.S.
Keep your third-party vendors close
Keep your third-party vendors close
Whether you work with only a few vendors, hundreds, or thousands, your network is only as safe as the security practices of your weakest partner.
IoT threats to third-party networks
IoT threats to third-party networks
Outsourcing offers key advantages in costs and subject matter expertise. Yet, the safety of your business data depends on IoT risk management and the security protocols of vendor partners.
Healthcare cybersecurity: Hacking medical devices
Healthcare cybersecurity: Hacking medical devices
Imagine in the future a critical, personal medical device taken offline by ransomware. Is the Healthcare industry prepared for this cybersecurity risk?
The Impact of Cyber-Attacks, and how Healthcare Organizations can protect themselves
The Impact of Cyber-Attacks, and how Healthcare Organizations can protect themselves
Cyber-attacks have become an increasing problem for healthcare organizations, and according to the 2016 HIMS
Positive Patient Identification: The foundation of effective healthcare
Positive Patient Identification: The foundation of effective healthcare
New survey results reveal why mistakes at registration put hospitals and patients at risk
Healthcare organizations tell all in new report: desktop virtualization adoption trends explained
Healthcare organizations tell all in new report: desktop virtualization adoption trends explained
For years, Imprivata has worked with – and learned from – our virtualization partners and hospital organizations around the world.