Blog

PCI DSS 3.0: 10 Commonly Asked Questions

Because PCI 3.0 introduces more SAQs, SecurityMetrics offers combination SAQs when more than one SAQ applies.

Is Your Business Prepared for the Physical Security Threat?

Train employees to stop and question anyone who does not work for the company, especially if the person tries to enter back office or network areas.

Healthcare's Password Security is Embarrassing

Make the simple change to require unique usernames and passwords on the network level for each one of your staff members.

SSL 3.0: POODLE Vulnerability Update

If you have any questions, please contact SecurityMetrics support, 801.705.5700.

My OCR Audit, and How I Survived: a HIPAA Audit Checklist

Doreen Espinoza answers some tough questions about her audit with the HHS.

Securing Keys and Certificates: A PCI Auditor's Perspective

Businesses must ensure their key servers, certificate authorities, open SSL libraries, and server updates are secure.

Could Your Waiting Room Wi-Fi Be Sabotaged?

The problem is, many offices don’t have their Wi-Fi set up correctly, turning that free patient asset into a liability.

Plug-and-Play POS: Can It Ever Be Secure?

The plug-and-play mindset is ruining Point-of-Sale (POS) security.

Your HIPAA Privacy Requirements Might Not Be Completed

Understand HIPAA Privacy and Security Rules, and how they apply to your organization.

7 Hearty Tips to Avoid Costly Data Breaches

Neglecting the simple security measures is what allows hackers into a business network and allows them to steal your sensitive information.

5 Most Bizarre HIPAA Violation Cases

Choose your vendors wisely and make sure you have a Business Associate Agreement (BAA) in place.

Shellshock: Be Wary, But Don't Panic

Shellshock, also known as the Bash Bug, is a software vulnerability that could make your systems vulnerable.

PCI Compliance Scanning Requirements

Learn about PCI compliance scanning requirements.

5 Minimum Necessary HIPAA PHI Tips

The HIPAA minimum necessary rule helps covered entities manage healthcare information by requiring them to limit access to and disclosure of PHI.

Cross-Site Scripting, Explained

Cross-site scripting allows bad guys to embed malicious code into a legitimate website to ultimately steal user data.

You Can't Hide Behind a HIPAA Business Associate Agreement

Covered entities don’t have the option to hide behind BAA if a Health and Human Services (HHS) auditor comes knocking.

What To Do If Your Business Is Hacked

Learn what to do when you are hacked (or suspect you’ve been hacked).

Security Blunder Case Studies

Businesses around the world call us in a panic, needing to decipher what went wrong with their security.

Role Based Access Control for HIPAA Security

Healthcare providers are responsible to make sure those with access to ePHI require that access to adequately do their jobs.

Unencrypted Data: A Security Plague

Unencrypted payment card data is relatively simple for a hacker to detect, scoop up, and steal.

HHS HIPAA Audit Requirements

Don’t forget to document every HIPAA compliance effort as evidence to present to the OCR if your entity is chosen for auditing.

Current Hacking Trends: Remote Access

To help further the fight against fraudsters and data thieves, the SecurityMetrics Forensic Investigation team has identified several common attack types associated with recent breaches.

Are Patient Sign-In Sheets a HIPAA Violation?

My stance on patient sign-in sheets is that unless there is a valid business reason for having them, don’t do it.

Balancing Mobile Convenience and PHI Security

Some falsely assume because mobile devices are technologically advanced and marketed as ‘secure’, PHI will automatically be protected.