Blog

Making HIPAA Compliance Realistic: Part 1

It’s about maximizing the little time you have.

Infographic: Reduce PCI Scope, Reduce Workload

Learn how to reduce your PCI scope.

How a HIPAA Violation May Have Ruined a Football Star's Career

Hopefully this incident helps both healthcare to remember the fragility of patient data protection.

HIPAA Security Policy Free Download

Policies help ensure workforce member security.

10 Qualities To Look For When Selecting an Approved Scanning Vendor

Not all approved scanning vendors are created equal

3 Steps to Protect ePHI From Malware

It’s simple to protect patient data from malware with the right tools, controls, and people in place.

Most Popular Data Security Articles

Find out the most-read PCI DSS compliance and data security posts.

Infographic: Cybercriminals Love When You Use Remote Access

Remote access technology has been turned against us by cybercriminals.

Cyber Breach Insurance: How Much Does it Cost?

Depending on a few factors, cyber insurance premiums can cost from $650 to easily over $120,000 annually.

Networked Medical Devices: a Data Breach Time Bomb

Healthcare devices have vulnerabilities.

Sending Credit Card Info Over Email

The way you handle emailing credit card info might just change your scope for PCI DSS compliance.

The Cost of HIPAA Breach Insurance

Those exorbitant fines are why cyber breach insurance exists.

EMV Security, Is It Hackable?

It's untrue that any technology is absolutely unhackable.

The Healthcare Threat is Imminent: Secure Remote Access Now!

Healthcare entities must be proactive about protecting sensitive data across their organization.

How Do New Penetration Test Requirements Affect You?

An industry-recognized methodology must be used when conducting a penetration test.

Patient Portals Secure PHI Better Than Email

Portals made specifically for your patients offer data security that email never could.

5 Step HIPAA Risk Analysis Sample

Find out where to start your HIPAA risk analysis process.

Prioritizing HIPAA for Protected Health Information: 101

Taking a prioritized approach to your HIPAA compliance efforts.

Latest SSL Vulnerability: Logjam

If you have any questions, please contact SecurityMetrics support, 801.705.5700.

Pentesting vs Vulnerability Scanning: What's the Difference?

Discover what the difference is between a penetration test and a vulnerability scan.

HIPAA Business Associate Agreement: Who's Really Responsible?

Either manage your business associate security or prepare for a data breach.

10 PCI Security Standards Myths

Having a proactive mindset about PCI compliance will save you a lot of money, and perhaps even your business, in the long run.

10 Crucial HIPAA Reads

Because of its complexity and technicality, there’s never a shortage of questions about HIPAA.

Remote Access Attacks: How to Protect Against Malware

Protect against remote access attacks by employing the following PCI DSS requirements.