
Nurses, Nurses, Nurses, and How Cybersecurity Is Helping (And Sometimes Hurting) Nursing Today
Most times, the real superheroes don’t wear capes. They wear PPE and help keep our bodies and minds safe from bacterial invaders and foreign objects. However, the real heroes of nursing are those who not only juggle healthcare and the ins-and-outs of healthy bodies and minds, but the ones who juggle legacy PHI systems, old

Business Email Hacking, Cyber Extortion, and Simplifying Zero-Trust One More Time
Have you ever felt like you are in the middle of a cyber storm? When a leak or a hack happens, it can feel like being in the center of a crazy cyber-nado, cyberricane, if you will. Sometimes it can feel a bit overwhelming just looking at the odds of a cyber event, even more

Data Quality – Why You Can’t Ignore It Any Longer
by Leah Livingston Managing your organization’s data can seem like a daunting task, especially after years of piecemeal processes, applications and add-ons have compounded upon one another. Once in this type of situation, getting your “house in order” can seem overwhelming and nearly impossible. However, just like the foundation of your home, ignoring that

Healthcare and Cybersecurity, May They Stay Hand in Hand
While May isn’t a magical “primetime” for cybersecurity in healthcare, we at Idenhaus think cybersecurity should be highlighted every month. How prepared is your clinic or organization for a cybersecurity issue, whether that’s a case of phishing, malware, a data breech, or an insider threat? Idenhaus is here to help you prepare with some articles

Security Priorities, Zero Trust (Again!) and Employee or Insider: Cybersecurity News for May
If April brings cybersecurity showers, does that mean that May would bring cybersecurity flowers? At Idenhaus, we think so! The good news is that while the numbers are staying fairly steady as far as breaches, the amount of cybersecurity planning and ramp-up we are seeing is very promising. The government is looking to help those

Building A New Foundation for Decentralized Identity
Written by Ron Bowron For those of us from the Apple IIe and the Windows 3.1 Generation, we all remember the days of “Granted until Denied” permissions and the simple Access Control List. Imagine having full access to the computer and all the system’s resources just by logging in? We were gods in our own

How HR Processes Can Work in Tandem with Identity Management
How HR Processes Can Work in Tandem with Identity Management One of the most staggering statistics that you’ll find across third-party research, is that more than half of identity management projects fail the first time. You are more likely to toss a coin in the air and call heads and get it right

Does Your Organization Need An IAM Strategy?
Do You Need An IAM Strategy? There is a well-known management book titled “What got you here, won’t get you there”. The basic premise is that future success begins with a commitment to continuous improvement, especially for those people who have already achieved an initial level of success. The central imperative is to challenge