Blog

What Is Social Engineering? Social Engineering Examples

Protect sensitive data from social engineering attacks.

Does Your Third Party Vendor Put You At Risk?

The role of the third party is evolving.

HIPAA Security Rule Requirements and Healthcare Security

While most healthcare entities follow the Privacy Rule fairly well, many aren’t compliant in the HIPAA Security Rule.

SecurityMetrics Summit: A Cybersecurity and Compliance Conference

In 2020, we hosted the first annual SecurityMetrics Summit; a virtual data security and compliance conference on September 23rd and 24th.

2021 Forensic Predictions and What Happened in 2020: Part 3

Learn how to maximize security through simple practices and employee training.

How to Choose a Safe and Secure VPN

VPNs are a popular tool that helps businesses make sure outside users are authorized and that transmitted data is encrypted.

2021 Forensic Predictions and What Happened in 2020: Part 1

The year 2020 was surprising in many ways and the digital forensics industry offered some surprises as well as some more predictable outcomes.

Boost Your E-commerce Security Against Eskimming Attacks

With ecommerce attacks on the rise, it's crucial for businesses to learn how to strengthen their ecommerce security.

Performing an SAQ C version 4.0 Merchant Self-Assessment

Merchants using the SAQ C to validate their PCI DSS compliance should be aware of changes that were introduced into this questionnaire during the publication of the SAQ C version 4.0.

How to Prepare for a HIPAA Audit in 3 Steps

Learn the three essential steps to help you effectively prepare for a HIPAA audit.

5 Simple Ways to Get PCI Compliant

Learn 5 basic practices to get PCI compliant, even if you're new to PCI or a compliance veteran.

How Does a Firewall Protect a Business?

Get answers to the most common firewall questions.

PCI 6.6: Why You Need a Web Application Firewall and Network Firewall

Web application firewalls rest in front of public-facing web applications to monitor, detect, and prevent web-based attacks.

A Snapshot of Firewalls, HIPAA, and Healthcare Security

See how healthcare organizations are managing their firewalls.

How to Comply with PCI Requirement 1: Manage Your Firewall

PCI Requirement 1 deals with setting up and configuring firewalls to protect your business data.

Auditor Tips: Requirement 5: Implement And Update Your Anti-Malware

PCI DSS requires anti-malware software to be installed on all systems that are commonly affected by malware (e.g., Windows).

Achieving lift-off with PCI DSS v4.0

With March 31, 2025 as a target destination, managed security service providers and enterprises from across the digital commerce chain are taking a measured approach to implementing PCI DSS version 4.0.

Changes and Updates to the 4.0 SAQ

This blog will discuss changes to the PCI DSS 4.0 SAQ questionnaires and is based on our Webinar "PCI DSS 4.0: What's New and How It Affects You."

Performing an SAQ P2PE version 4.0 Self-Assessment

This blog will discuss changes made to the SAQ P2PE version 4.0 and will review the process of performing a self-assessment using the SAQ P2PE.

PCI DSS 4.0: What is New and How it Affects You Q and A

Here are some questions participants asked in our webinar, “PCI DSS 4.0: What Is New and How It Affects You.”

PCI DSS v4.0: Future of the PCI Security Standard

While the PCI v4 standard is not expected to be finalized and released until the end of 2020 or the beginning of 2021, the PCI Security Standards Council has made some information available to the general public on what some of the changes might be.

5 Tips to HIPAA Compliant Mobile Devices

By following basic security practices and policies, you can make your devices HIPAA compliant and keep your data safe.

5 Blogs to Help You Survive PCI DSS and Prevent Security Breaches This Year

Here are 5 Blogs to Help You Survive PCI DSS and Prevent Security Breaches This Year. We cover formjacking, penetration tests, PCI DSS checklists, PCI DSS audits, as well as preparing for incident response.

Auditor Tips: Monitor Your Business Associates’ Compliance

Every covered entity that uses business associates is required to obtain assurances that their business associates treat patient data the way you and HHS require them to.