Blog

PCI DSS 3.2 Changes: What Your Business Needs to Know

Learn what new requirements 3.2 is implementing into the PCI standard.

Firewalls 101: 5 Things You Should Know

What are firewalls and how do they help protect your business?

Recording Your QIR: SecurityMetrics' New QIR Feature

Here’s what you need to know about QIRs and how SecurityMetrics is addressing Visa’s mandate.

Badlock: Combatting the New Samba Vulnerability

The New Samba vulnerability could expose companies to man-in-the-middle attacks.

System Hardening Standards: How to Comply with PCI Requirement 2.2

Merchants must “address all known security vulnerabilities and [be] consistent with industry-accepted system hardening standards.”

The Ultimate Cheat Sheet on Making Online PCI Compliance Work for You

Learn some tricks to getting your ecommerce business PCI compliant.

Four Steps to Securing Your Medical Devices

Unfortunately, many healthcare organizations aren’t properly securing their medical devices, leaving them open to cyber attacks.

Here Comes PCI DSS 3.2: What Changes You Should Expect

See what changes PCI 3.2 brings and what you’ll need to do.

Code Reviews: A Method to Reveal Costly Mistakes

Double checking code catches a potential compromise before it happens.

Wireless Access Point Protection: 5 Steps to Find Rogue Wi-Fi Networks and Comply with PCI DSS Requirement 11.1

A rogue access point is a wireless access point installed on a secure network without the knowledge of the system administrator.

Vulnerability Scanners 101: What, Why, and How to Comply

Learn the fundamentals of vulnerability scanning, especially for PCI compliance requirements.

Study on Data Security Auditing

Learn more about the study the FTC is conducting on the PCI DSS assessment process.

DROWN Attack and SSL: What You Need to Know

Here’s what you need to know about DROWN.

PCI 6.6: Why You Need a Web Application Firewall and Network Firewall

Web application firewalls rest in front of public-facing web applications to monitor, detect, and prevent web-based attacks.

Implementing HIPAA: A 12-Month HIPAA Plan to Get Compliant

Getting HIPAA compliant doesn't have to be overwhelming.

What is Tokenization and How Can I Use it for PCI DSS Compliance?

Tokenization is used for securing sensitive data, such as a credit card number, by exchanging it for non-sensitive data - a token.

Ditch Typical Anti Virus for True PCI Requirement 5 Compliance

Anti virus doesn’t protect; it cleans up malware infections after the fact.

Fighting Phishing Email Scams: What You Should Know

Phishing Email Scams remain one of the top threats to companies.

How Much Credit Card Data do You Store? (It's More Than You Think.)

See the unencrypted storage results from SecurityMetrics’ latest PANscan reports.

Configuring Your Remote Desktop Connection

Learn what you need to know about configuring your remote desktop.

Integrate 2fa Tech To Correctly Comply with PCI Req. 8.3

Understand how to integrate 2fa technology to comply with PCI req. 8.3. It's easier to incorporate than you think.

Biometrics: The Future of Payment Data Security?

Biometrics more accurately associates a specific individual to a device or system.

A Hacking Scenario: How Hackers Choose Their Victims

See the step-by-step ways the average hacker looks for valuable data and what hacking victims should do in response to an attack.