The biggest difference between SAQ A and SAQ A-EP is based on how cardholder data is handled.
PCI DSS Requirement 3 involves protecting card data storage.
Developing and implementing an incident response plan will help your business handle a data breach quickly, efficiently, and with minimal damage done.
What area of your business would benefit the most from a penetration test?
Learn what’s required to fill out SAQ A.
PCI Requirement 2 involves securing your systems.
See how healthcare organizations are managing their firewalls. Do you know if your firewalls are HIPAA compliant?
Things to remember from this year are password security, securing remote access, and PCI compliant firewalls.
Read this blog to help you determine what type of penetration test is best for your business.
Here are 5 tips for enterprise organizations to get PCI compliant more efficiently.
PCI Requirement 1 deals with setting up and configuring firewalls to protect your business data.
SecurityMetrics has created a new audit based off the SANS Top 20 Critical Security Controls.
If your business collects, transmits, or stores cardholder and credit card data, you need to be PCI compliant. Here are 7 PCI compliance tips for small businesses.
Here are some basic things your organization should know about HIPAA penetration testing.
If you’re a service provider, you may have some different PCI requirements based on what level you are.
Learn more about the Dirty Cow vulnerability present in Linux systems and Android phones.
Learn more about PCI merchant levels and how they affect PCI requirements.
Learn more information about the Shoplift Bug, how it makes your system vulnerable, and what you need to do to combat it.
Let’s take a look at some of the different costs your business could incur as a result of a data breach.
Learn how your business is making itself a target with cybersecurity vulnerabilities.
The PCI DSS 3.2 has recently made some changes to multi-factor authentication.
See how healthcare organizations are managing their firewalls.
PCI 3.2 has come out with new requirements for penetration testing and network segmentation.