8 Must-Read Identity Management & Cybersecurity Articles, September 2019

Share on linkedin
Share on twitter
Share on facebook

identity management and cybersecurity articles

Thanks for reading the Idenhaus Identity Mangement & Cybersecurity biweekly news digest. Every two weeks, we curate a selection of informative IAM, Data Governance, Identity Management & Cybersecurity articles. Be sure to check out our new resources section with on-demand webinars, case studies, and educational videos.

Subscribe to the Idenhaus biweekly newsletter here or the healthcare IT newsletter here.

Security Thought of the Week

An Enterprise Identity Management (IAM) Architecture evaluates the strategies, HR and end user provisioning processes, user data, systems,  business functions, and security capabilities of an organization to better align IT resources with the strategic objectives of the business.

8 Must-Read Identity Management & Cybersecurity Articles

 

Cybersecurity Culture and the Law: What You Need to Know via Idenhaus

Michael Daugherty, CEO of LabMD and founder of the Cyber Education Foundation, shares why corporate cybersecurity culture is key to regulatory compliance.

 

The Top 3 Enterprise Identity Governance Mistakes via SolutionsReview

Of all the IAM categories, identity governance remains one of the most enigmatic and misunderstood. Yet IGA’s capabilities and functions ensure the fulfillment of strong identity security and efficient workflows.

 

How Patient-Centered Care is Shaping Provider Health IT Strategy via Patient Engagement HIT

Third-party tools make it easier for patients, especially new patients, to find online appointment scheduling on a provider website, but they pique security concerns for hospital IT leaders.

 

How to Know if Your Cybersecurity Tools Are Actually Working via IBM

This uncertainty is pandemic, and it’s largely the result of the fast-changing threat landscape. Cybercriminals are hatching new schemes for stealing data and causing havoc at an ever-accelerating pace.

 

Digital Identity Verification Is One Key to Fighting Cybersecurity Threats via HealthcareIT News

Over the past decade, there have been more than 2,550 healthcare data breaches impacting more than 175 million medical records, according to the HIPAA Journal. That’s the equivalent of affecting more than 50% of the U.S. population.

 

Privileged Access and the Future of Security via CSO

Prioritizing privileged access in a security and risk management strategy allows organizations to track all activities that involve critical IT infrastructure and/or sensitive information.

 

Healthcare providers can improve their third-party vendor management  via SecurityBoulevard

While relying on third-party vendors to provide more efficiency and state-of-the-art care and management, healthcare providers must also put more emphasis on third-party vendor risk management.

 

5 Most Common Pre-Breach Cybersecurity Mistakes and How to Avoid Them  via Idenhaus

What should organizations do to protect themselves from the problem and the exposure that comes with a significant cybersecurity event? Although perfect security doesn’t exist, there are common mistakes companies make time and time again.

 

Check out our previous digest of insightful Data Governance and access management articles here: Idenhaus Biweekly: Data Governance, Privileged Identity, Healthcare IT

 

 

NEW CASE STUDY: Bell Textron, Inc needed a new approach to mature its IGA framework to improve efficiency and support its security objectives. Download the Bell case study here.

 

Follow @Idenhaus on Twitter and subscribe to our biweekly newsletter or our healthcare IT biweekly here.

 

Photo credit: Flickr

 


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top