Blog

Computer Security and The FTC: Suing Hacked Companies

Don’t become lax with computer security, or it can come back to bite you in more ways than one.

Securing Healthcare Mobile Devices

Patient data is in jeopardy when mobile devices aren't secure.

How to Permanently Delete Files with Sensitive Data

When delete doesn’t actually delete, it can increase your vulnerability.

HIPAA Violations: Who is Responsible?

Is it your responsibility to ensure that your clinic is HIPAA compliant?

Printer Security: Does Your Device Let Hackers In?

Network-enabled printers may contain very sensitive information about your internal network.

Payroll Phishing Emails Attack Hospital and Healthcare Security

Essentially, the hackers steal paychecks from right under their noses.

The Cost of a PCI Security Policy: What You Need to Know

The key to properly using PCI policies is communication.

Preventing Stolen Patient Data Through Remote Access Security

My advice? Decide to take security seriously.

3 Data Security Best Practices

Let’s discuss four data security best practices and how to correctly implement them in your organization.

The Hippocratic Oath and Doing No Harm In The Information Age

Each healthcare professional has a responsibility and stewardship over the patients’ PHI they handle.

Make Your Auditor Happy: Follow These PCI Audit Requirements

Similar problems materialize before or during an audit that ultimately slow audit progress.

Healthcare Reception Desks: Breeding Ground for HIPAA Compromise

Your reception desk might be one of the most vulnerable locations in your entire organization for a data breach. W

SecurityMetrics Vulnerability Scanning Process FAQ

The most commonly asked customer questions about the vulnerability scanning process.

Network Inventory, Configuration Management, and Security

Once you have established that your records reflect reality, it is time to monitor to ensure they are accurate.

SecurityMetrics PCI Support FAQ

The most commonly PCI support asked questions about our PCI compliance product.

Healthcare: Recognize Social Engineering Techniques

Don’t let human hackers disorient your employees.

PHI: It's Literally Everywhere [Infographic]

The unprotected PHI problem is easy to fix, but it must start with you.

Two Factor Authentication – Security Beyond Passwords

Is two-factor authentication perfect? No, but it does make a hacker’s job more difficult.

Free HIPAA Compliance Software Demo

This HIPAA compliance software is easy to update and doubles as a documentation tool.

Does Your Third Party Vendor Put You At Risk?

The role of the third party is evolving.

The Importance of Log Management

Log management and regular log review could help identify malicious attacks on your system.

Do You Know Where You Store Card Data? Unencrypted Credit Card Data Storage

Unencrypted credit card data is hiding on your network

Making HIPAA Compliance Realistic: Part 2

HIPAA compliance doesn’t have to be unmanageable.

How Do Hackers Hack?

Hackers don’t care who you are. They just care how rich you can make them.