Blog

HIPAA vs. PCI DSS Compliance

Why do you need to comply with PCI if you’ve already taken care of HIPAA?

Are Patient Sign-In Sheets a HIPAA Violation?

My stance on patient sign-in sheets is that unless there is a valid business reason for having them, don’t do it.

HIPAA Violations: Who is Responsible?

Is it your responsibility to ensure that your clinic is HIPAA compliant?

5 Tips to Implement Security Awareness at Your Company

Whether you’re a CIO, the head of IT, or in a non-security-related position, if your data security practices are unclear, your company is at a greater risk to a data breach.

How to Perform a PCI v4.0 SAQ A Self-Assessment

Performing an SAQ A version 4.0 Self-Assessment: Several new requirements, both existing in version 3.2.1 of the standard and some newly created for version 4.0, have been added to increase the security of outsourced ecommerce environments.

How to Manage a Healthcare Data Breach

Data breaches can be devastating. Here are 5 steps that will help you manage a healthcare data breach.

Are HTTP Websites Insecure?

There are two website prefixes: One shows the site you are on is secure (HTTPS), and the other does not (HTTP).

What is Tokenization and How Can I Use it for PCI DSS Compliance?

Tokenization is used for securing sensitive data, such as a credit card number, by exchanging it for non-sensitive data - a token.

Wireless Access Point Protection: 5 Steps to Find Rogue Wi-Fi Networks and Comply with PCI DSS Requirement 11.1

A rogue access point is a wireless access point installed on a secure network without the knowledge of the system administrator.

What Does a Cyber Forensic Investigation Do and How Much Does It Cost?

Learn what a forensic investigation accomplishes and how much it might cost.

Your Crash Course To HITRUST CSF Assessment Types

This blog will cover the three types of HITRUST CSF certifications. It will also cover what you can expect to achieve upon completion of each type of assessment and general guidelines of which assessment is best for your organization.

PCI DSS Compliance for Service Providers FAQ

pci dss compliance for service providers is necessary if your organization provides services to merchants that may affect the security of their merchant payment data.

PCI Requirement 11: Vulnerability Scans and Penetration Tests

PCI Requirement 11 discusses vulnnerability scanning and penetration testing.

Do You Need a Web Application Penetration Test?

Do You Need a Web Application Penetration Test? It’s important for your business to find and remediate any vulnerabilities your web applications may have. This is where web application penetration testing comes in.

Penetration Testing FAQs

We outline the penetration testing process in detail and answer some of the most frequently asked questions related to this important security test.

Types of Penetration Testing: The What, The Why, and The How

Read this blog to help you determine what type of penetration test is best for your business.

What is it like working with SecurityMetrics on PCI Compliance?

What is it like working with SecurityMetrics? SecurityMetrics’ central objective is to help companies secure their data, not just meet compliance standards. We love working with organizations who have that same vision for security.

Partner with SecurityMetrics for Data Security and Compliance

Why Partner with SecurityMetrics for Data Security and Compliance?

BlogEngine.NET XML External Entity Attacks

An Out-of-band XML External Entity attack, CVE-2019-10718, exists on BlogEngine.NET versions 3.3.7 and earlier through the /pingback.axd endpoint.

How to Start a Cybersecurity Program For Your Small Business

For many small business owners, cybersecurity budgets can be very limited. Finding a cybersecurity program can help you get the most value for your money.

The SecurityMetrics HIPAA Portal Helps Streamline Your Compliance

This blog discusses how the SecurityMetrics HIPAA Portal can help with your HIPAA requirements.

SecurityMetrics Podcast: Cybersecurity Podcast with Industry Tips

Host and Principal Security Analyst Jen Stone (MCIS, CISSP, CISA, QSA) brings on guests with unique viewpoints that are important to the entire security and payments ecosystem.

Ransomware Trends: Don't Panic, Prepare

This blog discusses ransomware trends and what to do about ransomware.

Responding to 5 Common PCI Questions from Franchisers and Franchisees

Here are the top 5 PCI questions we get from franchisers and franchisees about PCI compliance.