Blog

HIE Insecurity and What One HIE Decided to Do About It

If you’re not sure what your HIE should be doing, have a look at ONC’s health IT security resources.

HIPAA Diagrams: the #1 Way to Help Your HIPAA Audits Go Faster

How can you secure your organization without knowing how patient data travels?

Coding Culture Will Ruin Your Audit…and Your Security

The vast majority of developers do not follow secure coding practices.

Crucial Security Advisory: Patch Windows Immediately Against WinShock

When an exploit for WinShock is released, SecurityMetrics will work to include a check for the vulnerability in its vulnerability scanning engine.

PCI Council Security Awareness Guidance

Teach employees to care about the security at your organization, and you will avoid a lot of potential heartache.

HIPAA Security Tip: Understand Your Data Flow

Fully understanding where PHI resides takes a lot of interdepartmental communication.

Nature's 7 Hacker Defense Mechanisms

Find out how to use nature's defense mechanisms to protect your business.

PCI DSS 3.0: 10 Commonly Asked Questions

Because PCI 3.0 introduces more SAQs, SecurityMetrics offers combination SAQs when more than one SAQ applies.

Is Your Business Prepared for the Physical Security Threat?

Train employees to stop and question anyone who does not work for the company, especially if the person tries to enter back office or network areas.

Healthcare's Password Security is Embarrassing

Make the simple change to require unique usernames and passwords on the network level for each one of your staff members.

SSL 3.0: POODLE Vulnerability Update

If you have any questions, please contact SecurityMetrics support, 801.705.5700.

My OCR Audit, and How I Survived: a HIPAA Audit Checklist

Doreen Espinoza answers some tough questions about her audit with the HHS.

Securing Keys and Certificates: A PCI Auditor's Perspective

Businesses must ensure their key servers, certificate authorities, open SSL libraries, and server updates are secure.

Could Your Waiting Room Wi-Fi Be Sabotaged?

The problem is, many offices don’t have their Wi-Fi set up correctly, turning that free patient asset into a liability.

Plug-and-Play POS: Can It Ever Be Secure?

The plug-and-play mindset is ruining Point-of-Sale (POS) security.

Your HIPAA Privacy Requirements Might Not Be Completed

Understand HIPAA Privacy and Security Rules, and how they apply to your organization.

Seven Tips to Avoid Costly Data Breaches

Neglecting the simple security measures is what allows hackers into a business network and allows them to steal your sensitive information.

5 Most Bizarre HIPAA Violation Cases

Choose your vendors wisely and make sure you have a Business Associate Agreement (BAA) in place.

Shellshock: Be Wary, But Don't Panic

Shellshock, also known as the Bash Bug, is a software vulnerability that could make your systems vulnerable.

PCI Compliance Scanning Requirements

Learn about PCI compliance scanning requirements.

5 Minimum Necessary HIPAA PHI Tips

The HIPAA minimum necessary rule helps covered entities manage healthcare information by requiring them to limit access to and disclosure of PHI.

Cross-Site Scripting, Explained

Cross-site scripting allows bad guys to embed malicious code into a legitimate website to ultimately steal user data.

You Can't Hide Behind a HIPAA Business Associate Agreement

Covered entities don’t have the option to hide behind BAA if a Health and Human Services (HHS) auditor comes knocking.

What To Do If Your Business Is Hacked

Learn what to do when you are hacked (or suspect you’ve been hacked).