Blog

SecurityMetrics 2019 PCI Compliance Guide

Compliance with any mandate takes time and planning. But, thousands of customers and readers use PCI Compliance Guide to make the PCI compliance process faster and simpler, as well as better maintain compliance.

WiKID Systems 2FA Enterprise Server SQL injection

A SQL Injection vulnerability, CVE-2019-16917, was identified on WiKID Systems 2FA Enterprise Server through version 4.2.0-b2047.

WiKID Systems 2FA Enterprise Server CSRF

Multiple Cross-Site Request Forgery issues, CVE-2019-17118, were identified on WiKID Systems 2FA Enterprise Server through version 4.2.0-b2053.

What is a Business Continuity Plan?

A business continuity plan (BCP) provides a way for organizations to deal with the business impact of any disruptive event and carry on with business.

What is Vulnerability Scanning?

What is Vulnerability Scanning? Vulnerability scanners are computer programs that search systems for weaknesses.

What is Network Security?

Network security consists of the policies, procedures, programs, hardware, software, and people you use to protect your corporate network.

Sensitive Data Discovery Alert: 61% Don't Protect Customer Cards

Payment card data can easily leak due to poor processes or misconfigured software.

PCI Requirements - You're Not Done Yet!

PCI compliance isn’t an event. It’s an ongoing process!

PCI – You Don't Have to be Perfect

These service guarantees exist to address the financial hardships your business might endure in the aftermath of a compromise.

PCI 3.0: What You Need to Know

This blog covers the important changes from PCI DSS version 2.0 and 3.0.

Stop Looking for a Mobile Phone Security Standard

If businesses are determined to provide mobile solutions, it is their responsibility to educate themselves, ensure the security of the solution, and know the risk they’re taking upon themselves.

Shellshock: Be Wary, But Don't Panic

Shellshock, also known as the Bash Bug, is a software vulnerability that could make your systems vulnerable.

Plug-and-Play POS: Can It Ever Be Secure?

The plug-and-play mindset is ruining Point-of-Sale (POS) security.

SSL 3.0: POODLE Vulnerability Update

If you have any questions, please contact SecurityMetrics support, 801.705.5700.

Nature's 7 Hacker Defense Mechanisms

Find out how to use nature's defense mechanisms to protect your business.

Should I Outsource My E-Commerce Website?

Depending on how you outsource, you may be able to decrease your PCI scope and business risk.

Should You FREAK Out About The Newest SSL/TLS Exploit?

If you have any questions, please contact SecurityMetrics support, 801.705.5700.

PCI 3.1: Stop Using SSL and Outdated TLS Immediately

PCI version 3.1 was primarily released to address the insecurity of SSL and some TLS encryption protocols.

PCI Audit Glossary "Alphabet Soup:" De-Jumbling the Jargon

We define important PCI DSS acronyms and terms in this PCI audit glossary.

Patient Portals Secure PHI Better Than Email

Portals made specifically for your patients offer data security that email never could.

Networked Medical Devices: a Data Breach Time Bomb

Healthcare devices have vulnerabilities.

PHI: It's Literally Everywhere [Infographic]

The unprotected PHI problem is easy to fix, but it must start with you.

Network Inventory, Configuration Management, and Security

Once you have established that your records reflect reality, it is time to monitor to ensure they are accurate.

Payroll Phishing Emails Attack Hospital and Healthcare Security

Essentially, the hackers steal paychecks from right under their noses.