Blog Listing

Tribal casinos are becoming a major target for ransomware
Tribal casinos are becoming a major target for ransomware
There’s plenty of money in casinos, and we’re not talking about the coins rattling around in slot machines. Tribal casinos are becoming a new target for ransomware attacks, with bad actors holding systems for ransom and making away with some serious dough.
Thumbnail image of the SecureLink blog
We’re expanding the Imprivata family: Welcome, SecureLink!
We’re thrilled to be welcoming SecureLink, the leader in critical access management, to the Imprivata family!
Common risks of digital supply chain transformation
Common risks of digital supply chain transformation
The supply chain is changing. Like many industries — retail, critical infrastructure, healthcare — what was once analog is now digital, and the digital supply chain transformation carries with it new, unimagined risks. 
How user access reviews help organizations achieve SOX compliance
How user access reviews help organizations achieve SOX compliance
Compliance is critical for many organizations. It not only keeps an organization’s valuable data safe, it also protects against fines, lawsuits, and general mismanagement of data. While it varies based on the industry and size of the organization, the cost of non-compliance can be staggering.
Improve third-party vendor security and reduce vendor risk
Improve third-party vendor security and reduce vendor risk
Just one weak link in your supply chain could lead to a potential security disaster. A third-party data breach could cause your organization financial loss, regulatory issues, and damage to your reputation. Here's three easy steps you can take to reduce your third-party vendor risks.
Principle of least privilege benefits
Principle of least privilege benefits
Current cybersecurity and data protection best practices are far beyond the days of just employing a perimeter defense. Threats are coming in from all sides and old castle-and-moat methodologies are outdated and vulnerable. All it takes is a look at the headlines to see how hackers are able to leverage privileged accounts to gain access to critical data.
Image of an abstract web of fingerprints and red lines connecting them
Staving off March (security) madness: Digital identity management is your key defense strategy
I know you don’t really need reminding, but here it is anyway: the security of your organization needs to be top of mind. Always.
Third-party vendor remote access best practices
Third-party vendor remote access best practices
Enterprises should be aware that vendors and employees need to have very different logins and credentials. It’s imperative that businesses have much more granular control over remote vendor access to their networks. Find out more in this post.
What’s the difference between RDP and VPN for remote access?
What’s the difference between RDP and VPN for remote access?
Remote access has become a necessity in business environments. Whether it’s employees working from home or third-party vendors that need to access a customer network, remote access needs to provide secure and reliable connectivity—keyword here being secure.
Okta breach highlights need for third-party security
Okta breach highlights need for third-party security
Chances are you know of, or have even used, Okta. The authentication and identity management software is almost ubiquitous, offering multi-factor authentication for single users across large organizations. Unfortunately, Okta was the subject of a security breach back in January.
Four problems enterprise access solves
Four problems enterprise access solves
Using third parties is nearly inevitable in today’s business landscape. Most organizations need to outsource some of their operations, whether it’s on a large or small scale.
An investment in cybersecurity is an investment in patient care
An investment in cybersecurity is an investment in patient care
Healthcare organizations’ number one priority is patient care. They’re in the business of helping patients, so most of their time, energy, and resources are allocated there. However, cybersecurity is becoming an increasingly important topic for healthcare organizations.
Five cybersecurity risks the manufacturing industry faces
Five cybersecurity risks the manufacturing industry faces
As society enters a fourth industrial revolution, the manufacturing industry is facing vast, rapid changes. Those changes are marked by both innovation, productivity and efficiency improvements, and new, unforeseen risks.
How enterprise access helps achieve compliance
How enterprise access helps achieve compliance
Third parties continue to be one of the biggest cybersecurity risks to an organization. Last year, nearly half of organizations experienced a data breach caused by a third party and with ransomware on the rise, businesses need to lock down their third-party security strategy before a hacker finds a vulnerable access point.
Imprivata Hires Sign
Hiring globally in a Zoom world
Recruiting at Imprivata continues to be a top priority, even as our entire workforce remains remote.
Health and Wellness Awards
Imprivata's commitment to health and wellness
Imprivata is honored to be named to Comparably’s list of large companies with the best perks & benefits and best company culture.
Why We Love Imprivata Thumbnail
Why we love Imprivata!
While it’s easy for us to show you what makes Imprivata a great place to work, we asked our team what they love most about Imprivata, here’s what they had to say
Two people viewing statistics from an iPad
Inside the cyber insurance application process
The Imprivata team shares lessons learned from recent completion of the cyber insurance application process. Start early and be ready and transparent.
Benefits of credential vaulting
Benefits of credential vaulting
Despite warnings from every cybersecurity professional, passwords are still being shared, compromised, and ineffectively managed. 66% of individuals are using the same password across devices and applications. 42% rely on sticky notes to manage passwords. And shockingly, 59% of IT professionals rely on memory to manage their corporate credentials.
Why multi-factor authentication isn't enough to secure enterprises
Why multi-factor authentication isn't enough to secure enterprises
A couple of decades ago, I received my first “authenticator” while working at Indiana University. As explained to me then, the device generated a secure token that only it and the server would know about. In this way, the servers I was helping to support would know that the bearer of that device (me) was legit.