Blog

5 Steps to Making a Risk Assessment

Making a risk Assessment, or Risk Analysis, is the first step in the Security Rule compliance.

PCI DSS 3: Agent Training Isn't Enough for Contact Center Compliance

Learn how to secure telephone payments and reduce PCI DSS scope through DTMF payment technology.

Medical Data Encryption: Keeping Your PHI Secure

Add another layer of security to your organization’s PHI with encryption.

5 Ways Your Mobile Device Can Get Malware

While convenient, mobile devices on your network can pose a risk to your business.

How to Meet HIPAA Documentation Requirements

A HIPAA document is more than a policy: it's proof you care about protecting patient data.

Intrusion Detection System: What's Missing in HIPAA Security

The #1 most important piece of a data loss prevention method? An intrusion detection system.

Staying Compliant: Visa's New Level 4 Requirements

Visa requires annual validation of PCI compliance.

6 Ways to Make Data Security Consistent in Your Business

Depending on the size and environment of your company, security consistency can be a real challenge.

How to Prepare for a HIPAA Audit in 3 Steps

Learn the three essential steps to help you effectively prepare for a HIPAA audit.

Spotting Vulnerabilities – Is Vulnerability Scanning Antiquated?

Vulnerability scanning is one of the only crucial things that can help companies keep up-to-date on emerging vulnerabilities.

How to Confront Hospital Ransomware

Don’t let your patients’ medical records be taken hostage.

Top 10 Network Security Audit Fails

The top PCI DSS assessment failures haven’t changed in years.

What is HIPAA Compliance, and How Long Will It Take?

HIPAA compliance is a process, not a destination . . . but it doesn’t hurt to know your timeframe.

10 Tips for Increasing IT Budget and Security Buy-In

Here are 10 ways to get executives to increase your budget and get organizational buy-in on security

Case Studies for PCI Compliance Solutions

See how SecurityMetrics was able to help organizations reach full PCI DSS compliance.

Physical Security: What You Aren't Thinking About

How to find the risks you might be missing.

Tips to Prepare for a PCI Audit

Here are some tips on how to prepare for a PCI DSS audit:

Five Things to Consider When Making a HIPAA Security Budget

Having the proper security budget protects not just your organization, but your patients as well.

Picking Your Vulnerability Scanner: The Questions You Should Ask

Here are some questions you need to ask about your business and about your potential vulnerability scanner.

HIPAA Security Rule Requirements and Healthcare Security

While most healthcare entities follow the Privacy Rule fairly well, many aren’t compliant in the HIPAA Security Rule.

Ensuring Cloud Security: What You Might Not Know

Don’t be afraid of the cloud; just be smart with it.

HIPAA and the Status of Healthcare: What C-suites Should Know

You can’t afford to be passive anymore; it’s time to be aggressive.

How Long are Businesses Vulnerable Before a Security Breach?

On average, a merchant was vulnerable for 470 days before an attacker was able to compromise the system.

9 Ways to Social Engineer a Hospital

Fight against social engineering by providing proper regular staff training.