Why do you need to comply with PCI if you’ve already taken care of HIPAA?
My stance on patient sign-in sheets is that unless there is a valid business reason for having them, don’t do it.
Is it your responsibility to ensure that your clinic is HIPAA compliant?
Whether you’re a CIO, the head of IT, or in a non-security-related position, if your data security practices are unclear, your company is at a greater risk to a data breach.
Performing an SAQ A version 4.0 Self-Assessment: Several new requirements, both existing in version 3.2.1 of the standard and some newly created for version 4.0, have been added to increase the security of outsourced ecommerce environments.
Data breaches can be devastating. Here are 5 steps that will help you manage a healthcare data breach.
There are two website prefixes: One shows the site you are on is secure (HTTPS), and the other does not (HTTP).
Tokenization is used for securing sensitive data, such as a credit card number, by exchanging it for non-sensitive data - a token.
A rogue access point is a wireless access point installed on a secure network without the knowledge of the system administrator.
Learn what a forensic investigation accomplishes and how much it might cost.
This blog will cover the three types of HITRUST CSF certifications. It will also cover what you can expect to achieve upon completion of each type of assessment and general guidelines of which assessment is best for your organization.
pci dss compliance for service providers is necessary if your organization provides services to merchants that may affect the security of their merchant payment data.
PCI Requirement 11 discusses vulnnerability scanning and penetration testing.
Do You Need a Web Application Penetration Test? It’s important for your business to find and remediate any vulnerabilities your web applications may have. This is where web application penetration testing comes in.
We outline the penetration testing process in detail and answer some of the most frequently asked questions related to this important security test.
Read this blog to help you determine what type of penetration test is best for your business.
What is it like working with SecurityMetrics? SecurityMetrics’ central objective is to help companies secure their data, not just meet compliance standards. We love working with organizations who have that same vision for security.
Why Partner with SecurityMetrics for Data Security and Compliance?
An Out-of-band XML External Entity attack, CVE-2019-10718, exists on BlogEngine.NET versions 3.3.7 and earlier through the /pingback.axd endpoint.
For many small business owners, cybersecurity budgets can be very limited. Finding a cybersecurity program can help you get the most value for your money.
This blog discusses how the SecurityMetrics HIPAA Portal can help with your HIPAA requirements.
Host and Principal Security Analyst Jen Stone (MCIS, CISSP, CISA, QSA) brings on guests with unique viewpoints that are important to the entire security and payments ecosystem.
This blog discusses ransomware trends and what to do about ransomware.
Here are the top 5 PCI questions we get from franchisers and franchisees about PCI compliance.