Image of a lock
4 ways that integrated access security helps in the fight against ransomware
Ransomware represents one of the most significant cybersecurity threats your organization will face. Here’s how integrated access security solutions can alleviate the risks associated with it.
Image of a doctor holding a bottle of pills
Ask a Pharmacist: What do federal EPCS mandates mean for me?
From the clinician to the pharmacist to the patient, there are many questions about what federal EPCS mandates could mean for public health. Drawing on her professional experience, PharmD Meg Flynn helps us answer some of those questions.
Image of people working on devices
Achieve privileged access goals and reduce burnout with PAM managed services
Technology keeps advancing while IT staffing shortages keep increasing. Maintain security and prevent IT team burnout with strong PAM managed services.
Image of a person accessing a locked device
What the NSA’s latest identity and access management guidance means for you
The NSA and CISA have shared actionable guidance for protection against evolving cyber threats to digital identities.
Image of a hand on a computer mouse, with graphics floating around
4 key takeaways from the new NSA report on Zero Trust and identity management
A new NSA report provides more clarity on how to achieve Zero Trust maturity for user access to IT systems
Image of a person using a phone, with symbols around
Epic data breach highlights issues with ad tracking pixel technology
A common digital advertising tactic may leave your patient or customer data vulnerable to a breach.
Image of a person holding a phone, with message 'data protection'
Patient data breaches can strike anywhere: Make sure you’re prepared for them all
Recent healthcare data breaches prove that risks can come from anywhere. From vendor access risks to insider snooping, the security landscape needs to change.
Image of people viewing a monitor
4 best practices for communicating with third-party vendors who need privileged access
Granting third-party vendors privileged access to your IT systems requires a well-defined plan and effective communication. Here are the best ways to ensure you have both.
Image of a person using a laptop, attempting to log in
Privileged access management helps organizations provide secure access to critical applications and data by addressing the very first security layer: the passwords
Take a look at the improvements we’ve made to Imprivata Privileged Access Management in the second half of 2022.
Image of a man surrounded by many monitors
7 best practices for securing your organization with access control
Access control is a vital step in cybersecurity because it secures the entry point of systems. Implementing the best access control practices to ward off cyber threats has never been so critical.
Image of a shield design
Three savvy strategies to improve the security experience
Balancing security and usability doesn’t need to be a daunting challenge. These strategies can help you strike the right balance.
Image of two doctors talking in a crowded lobby
How to prevent drug diversion using a holistic, tech-aided strategy
Drug diversion is a big problem. But a proactive, strategic approach can make a significant impact when it comes to recognizing and preventing it.
Image of a doctor speaking to a patient
4 steps to overcome patient misidentification
Patient misidentification is a problem that continues to plague healthcare organizations, but these steps help to make sure your HDO isn’t one of them.
Image of a nurse using a tablet
5 ransomware statistics and what they mean for healthcare IT decision-makers
In healthcare IT? Then these five statistics will change how you’re thinking about the security of your organization.
Image of two people viewing a device
3 signs your identity governance program may need a managed services component
Managed services may be the key to maturing your identity governance program. Here are some signs you might need to consider it.
Image of a person touching a hologram
Emerging from the multi-vendor quagmire
The move to one trusted vendor for your digital identity strategy may be easier than you think. And the consolidation brings both security and efficiency benefits.
The best VPN alternatives for businesses
The best VPN alternatives for businesses
If you work in the cybersecurity field, or if you’ve ever worked from home, you’re probably pretty familiar with a virtual private network, or as we all know
Image of medical bottles lined up in a rack
What is drug diversion? A look at the problem, and what happens if you don’t prevent it.
Left unchecked, the devastating toll taken by drug diversion runs wide and deep.
Image of a person typing on their laptop
Leading IGA capabilities with Imprivata Identity Governance 7.3
Check out the all-new updates to Imprivata Identity Governance with version 7.3.
Staying protected against ransomware
Staying protected against ransomware
As we wrap up cybersecurity month, we’d be remiss if we didn’t visit the ever-present threat of ransomware attacks. Every time we look at the trends around ransomware attacks, the news is rarely positive. The frequency of these attacks has yet to slow down, with experts estimating that an attempted ransomware attack occurred every 11 seconds in 2021, with a total 700 million attempted attacks, up 134% from 2020. Phishing attacks continue to be a common and successful method by which attackers gain initial access to an organization’s network.