Blog

Warbiking: Hacking with Your Helmet On

Hackers bike around the city with their laptops in a discreet backpack (or strapped in a bike trailer) and search for unprotected wireless networks.

Unencrypted Data: A Security Plague

Unencrypted payment card data is relatively simple for a hacker to detect, scoop up, and steal.

What Are My HIPAA Security Requirements?

Given the stated importance and heavy consequences associated with the risk analysis, you may want to consider working with a HIPAA security expert.

What Antivirus Should I Use?

Don’t let your anti-malware be your permeable safety blanket.

The Pros and Cons of Onsite HIPAA Audits

Contracting with an external professional to perform an onsite HIPAA audit might be a good option for you.

The Ultimate Guide to PCI 3.0 Changes

Here’s a list of our most popular PCI DSS 3.0 resources.

Welcome to the SecurityMetrics Blog

Learn to close data security gaps and prevent data breaches at your business.

Visa PCI Enforcement Rules in 2015

What does this new enforcement plan actually mean for noncompliant merchants and service providers?

The 7 Things That Prevent Dental Practice Growth

None of these seven suggestions requires changing or enhancing your clinical expertise.

The Healthcare Threat is Imminent: Secure Remote Access Now!

Healthcare entities must be proactive about protecting sensitive data across their organization.

Two Factor Authentication – Security Beyond Passwords

Is two-factor authentication perfect? No, but it does make a hacker’s job more difficult.

The Hippocratic Oath and Doing No Harm In The Information Age

Each healthcare professional has a responsibility and stewardship over the patients’ PHI they handle.

The Cost of a PCI Security Policy: What You Need to Know

The key to properly using PCI policies is communication.

The Ultimate Cheat Sheet on Making Online PCI Compliance Work for You

Learn some tricks to getting your ecommerce business PCI compliant.

Study on Data Security Auditing

Learn more about the study the FTC is conducting on the PCI DSS assessment process.

Top Ten PCI Requirement Failures: Where is Your Business Struggling?

Learn which areas of the PCI DSS business have the most trouble.

The Dangers of the Dirty Cow Vulnerability: Should You Be Worried?

Learn more about the Dirty Cow vulnerability present in Linux systems and Android phones.

What Healthcare Should Know about HIPAA Penetration Testing

Here are some basic things your organization should know about HIPAA penetration testing.

Top 5 Cybersecurity Vulnerabilities Every Business Should Know

Learn how your business is making itself a target with cybersecurity vulnerabilities.

Takeaways from PCI DSS 2016 Data Breach Trends

Things to remember from this year are password security, securing remote access, and PCI compliant firewalls.

Top 10 PCI SAQ Areas Where Merchants Struggled

See where many merchants still struggle with completing PCI requirements and SAQs.

WannaCrypt Ransomware Attacks: What You Should Do

Here are a few answered questions about the WannaCrypt attack and what your business should do to combat it.

The Beginner's Guide to Combat Phishing

What is phishing? Phishing refers to a type of social engineering that happens primarily through emails. Hackers will send emails that often have links to malware.

Understanding the PCI SSC Multi-Factor Authentication Supplement

An in-depth look at the PCI Security Standard Council’s recent MFA guidance supplement and what it means for your organization.