Two people viewing statistics from an iPad
Inside the cyber insurance application process
The Imprivata team shares lessons learned from recent completion of the cyber insurance application process. Start early and be ready and transparent.
Benefits of credential vaulting
Benefits of credential vaulting
Despite warnings from every cybersecurity professional, passwords are still being shared, compromised, and ineffectively managed. 66% of individuals are using the same password across devices and applications. 42% rely on sticky notes to manage passwords. And shockingly, 59% of IT professionals rely on memory to manage their corporate credentials.
Why multi-factor authentication isn't enough to secure enterprises
Why multi-factor authentication isn't enough to secure enterprises
A couple of decades ago, I received my first “authenticator” while working at Indiana University. As explained to me then, the device generated a secure token that only it and the server would know about. In this way, the servers I was helping to support would know that the bearer of that device (me) was legit.
Cybersecurity for smart factories in manufacturing
Cybersecurity for smart factories in manufacturing
The fourth industrial revolution has arrived. Also called industry 4.0, this term refers to the rise of smart factories and how manufacturing as an industry is quickly transitioning from place-based warehouses to networks of global software, automated systems, OT, and integration of the internet of things to manufacture anything and everything in entirely new ways.
Ransomware is only increasing: is your organization protected?
Ransomware is only increasing: is your organization protected?
Ransomware has existed as long as the internet has. From phishing scams to system takeovers to cyber espionage, hackers and bad actors have figured out that ransomware is both easy and profitable. It’s so profitable, in fact, that ransomware attacks have doubled in each of the last two years, and account for 22 percent of all 2021 cyber attacks.
You need decentralized cybersecurity to match decentralized attacks
You need decentralized cybersecurity to match decentralized attacks
The world of cybersecurity is rapidly changing. Hackers are getting smarter and more sophisticated, and in the age of remote work, globalization, and endless third-party connections, attack methods and motivations are changing. Organizations need to pay attention.
Is your tinder date snooping on your electronic medical records?
Is your tinder date snooping on your electronic medical records?
With Imprivata FairWarning, your organization will be equipped with the tools necessary to ensure compliance and keep your data safe from any prying eyes.
'Hack one, breach many' is here to stay: how to secure your third-party risks
'Hack one, breach many' is here to stay: how to secure your third-party risks
The numbers tell a scary story. When polled by Ponemon, 44% of organizations say they’ve experienced a third-party data breach in the last year. In addition, 65% of respondents have not identified the third parties with access to their most sensitive data and 51% stated that their organizations are not assessing the security and privacy practices of the third parties that are granted access to their systems.
Four ways covered entities can ensure HIPAA compliance
Four ways covered entities can ensure HIPAA compliance
Every healthcare organization knows about the Health Insurance Portability and Accountability Act (HIPAA). It’s part of daily life for those working in a healthcare setting, and it can be — from a cybersecurity perspective — a difficult set of regulations to navigate.
How artificial intelligence benefits access control systems
How artificial intelligence benefits access control systems
With a single healthcare system averaging 2.5 million EMR accesses a day, it’s safe to say that access control can be an overwhelming task for an organization to manage.
Why enterprise access is a superior VPAM system
Why enterprise access is a superior VPAM system
The digital world today is all about access. Third parties are accessing software programs, systems, and assets remotely. Employees are accessing servers and data from coffee shops, vacation homes, and even on the road. But more access inherently means more risk.
Image of a zero trust security model
Biden administration’s new cybersecurity directive champions Zero Trust
It’s the year of Zero Trust. For your strategy to succeed, be sure to put digital identity at its core. Here’s why.
Medical students working on a project together
If 95% of cyber-attacks are due to human error, why have so few clinicians been trained to avoid them?
New study finds a serious lack of urgency among many clinical executives regarding cybersecurity awareness.
Zero trust network access vs. least privileged access
Zero trust network access vs. least privileged access
If there’s a phrase as buzzy as Zero Trust these days, it’s least privileged access. The two sound similar in both name and concept. If you’re employing zero trust aren’t you, by default, also only granting least privileged access?
How access monitoring protects providers from health data breaches
How access monitoring protects providers from health data breaches
With the average healthcare organization going through over 2.5 million EMR accesses a day, it can be difficult for an organization to ensure those accesses are safe, all important data is secure, and that industry-specific compliance is reached.
Why having a privacy monitoring solution matters
Why having a privacy monitoring solution matters
If you’re an average size healthcare organization, the amount of EMR access happening in your network, per day, can top 2.5 million. That can be hard to fathom at first, but it makes sense.
Privacy as a competitive advantage
Privacy as a competitive advantage
As Big Tech is under attack from Congress and the public about how they handle and monetize customer private data, some companies have chosen to pivot. Instead of collecting and profiting off of consumer data, their focus is on protecting privacy. 
How to manage the access provisioning lifecycle
How to manage the access provisioning lifecycle
The Colonial Pipeline hack, in the end, came down to poor access management. The hackers found their way into operational technology (OT) through a VPN password that had never been de-provisioned. A small error that cost millions.
cyber-attack-1-318x152.png
Stay vigilant: What we can learn from the Kronos hack
Kronos just experienced a big ransomware attack. But it feels like just another in a never-ending line. Here’s what you can do to help keep your organization safe.
Reviewing the biggest data breaches of 2021
Reviewing the biggest data breaches of 2021
At the end of last year, we said that in 2021 ransomware would be here to stay, and the big trends will be third-party attacks and cyber terrorism. While no one likes to say “I told you, so,” especially when it comes to cybersecurity, the past 12 months saw headline after headline about ransomware attacks, third-party hacks, breaches of valuable data (like EMRs),