Blog Listing

Five questions you should be asking about cybersecurity
The threat of hackers stealing private information and holding it for ransom is real, and the healthcare industry has become a prime target – in fact, phishi
Helpful everyday uses for SSO
The days of needing only one or two sets of login credentials are long gone.
Is a longer password better than a complex one?
YES!! Longer passwords are better.
Protecting medical devices to build cyber resilience
The digitization of healthcare has allowed healthcare organizations to utilize robust technology such as medical devices to help improve both patient care an
Imprivata Joins CommonWell Health Alliance to Promote Interoperability
Earlier this week, we announced our new membership in CommonWell Health Alliance, a leading organization ded
Bipartisan legislation in U.S. Congress requires e-prescribing to combat opioid abuse
On July 28, federal legislators introduced HR 3528, The Every Prescription Conve
Compare RDP vs VNC in simple language
 RDP or VNC AccessA friend recently asked me to explain the difference between RDP and VNC protocol to remotely access a computer.
Community Hospital Anderson Ensures Positive Patient Identification
Community Hospital Anderson, a part of Indiana’s Community Health Network, believes that positive
Teaser Feature Image
4-Methods
Four methods to access cloud computers securely
 Networks in the cloudIt is easy to start a virtual computer these days in a cloud datacenter managed by Amazon AWS or Microsoft Azure
Preparing for cyberattacks: building a resilient infrastructure
As history shows, global ransomware attacks have been part of the new reality for quite some time.
Roaming quickly and securely at Cumberland Healthcare
I recently sat down with Jason Morse, Director of Information Technology at Cumberland Healthcare (Cumberland Memorial Hospital), a 25-bed facility in Cumber
Connecticut the Fourth State to Mandate E-Prescribing to Combat Opioid Abuse
Connecticut lawmakers recently passed legislation that requires electronic prescribing of opioid medication, further validating the significant role technolo
Five reasons single-password authentication should be banned
With the rapidly growing number of sophisticated cyber-attacks, such as phishing and ransomware, single-factor authentication has had its day. One way to fight back against the rise in cyber-attacks is by using strong multi-factor authentication.
Four tips on implementing 2FA policies
If you’re still authenticating remote users with a single password, it’s time to make a change. There’s just too much at stake. With that in mind, here are four things to keep in mind when considering a two-factor authentication policy for your organization - and one thing you should probably avoid.
The Report on Improving Cybersecurity in the Health Care Industry – where and how to start updating your cybersecurity strategy
On Friday, June 2nd, the U.S.
Three considerations when implementing two-factor authentication
Healthcare organizations are under constant attack from cyber threats.
Patches aren’t the silver bullet; hospitals can keep systems running when hit by ransomware attacks
As news of the
Is your casino network under attack?
See how to streamline your security methods and ensure your gaming business doesn’t suffer a hacking incident. This article covers recent casino data breaches and reveals how to prevent cybercriminals from accessing sensitive, confidential data on your network.
Five security questions your law firm should ask
Law firms are appealing targets for cybercriminals. Home to a multitude of sensitive, personal, confidential, financial information, what better place to attack in order to steal some juicy data? There’s certainly a few questions that should be on your security radar, let’s address them in this blog.
Government funding bill includes huge step forward for patient identification
Congress recently passed a spending bi