Blog

Healthcare's Password Security is Embarrassing

Make the simple change to require unique usernames and passwords on the network level for each one of your staff members.

HIE Insecurity and What One HIE Decided to Do About It

If you’re not sure what your HIE should be doing, have a look at ONC’s health IT security resources.

HIPAA Business Associate Agreement: Who's Really Responsible?

Either manage your business associate security or prepare for a data breach.

HIPAA Security Policy Free Download

Policies help ensure workforce member security.

HIPAA and the Status of Healthcare: What C-suites Should Know

You can’t afford to be passive anymore; it’s time to be aggressive.

How Long are Businesses Vulnerable Before a Security Breach?

On average, a merchant was vulnerable for 470 days before an attacker was able to compromise the system.

Here Comes PCI DSS 3.2: What Changes You Should Expect

See what changes PCI 3.2 brings and what you’ll need to do.

HIPAA Audits Phase 2: What You Need to Know

Learn what’s involved in the Phase 2 HIPAA Audit Program and how you can prepare.

HIPAA Guidelines Simplified in the 2021 HIPAA Guide

Network security is more crucial than ever for healthcare providers.

HIPAA Compliance: Storage in the Cloud

HIPAA Compliance in “the cloud” Cloud data storage is a common and convenient option for healthcare organizations.

Forensic Files: The Case of the Mistaken Malware

The best way to inspire better security practices is to show examples of true security blunders.

Forensic Files: The Case of the Suspiciously Flawless Investigation

What happens when forensic investigators can’t find evidence of a compromise?

Hacking Trends 2014: Hackers Actually Clean Up After Themselves

Hackers are getting smarter than our automated detection tools.

Forensic Files: The Case of the Stockpiled Credit Cards

Hopefully, you'll realize some actions you should take to ensure your own business’ security.

Auditing Archives: The Case of the Overly Helpful Front Desk Clerk

Front desk clerks are friendly…sometimes to a fault, but friendly doesn’t necessarily equal secure.

Fire, Shred, Pulp: How to Properly Destroy Sensitive Documents

The HHS says shredding, burning, pulping, and pulverizing are the only way these records should be destroyed.

Front Desk Security: Eliminate Internet Browsing on Check-In Machines

Can customer service and front desk security co-exist?

Balancing Mobile Convenience and PHI Security

Some falsely assume because mobile devices are technologically advanced and marketed as ‘secure’, PHI will automatically be protected.

Current Hacking Trends: Remote Access

To help further the fight against fraudsters and data thieves, the SecurityMetrics Forensic Investigation team has identified several common attack types associated with recent breaches.

Cross-Site Scripting, Explained

Cross-site scripting allows bad guys to embed malicious code into a legitimate website to ultimately steal user data.

Crucial Security Advisory: Patch Windows Immediately Against WinShock

When an exploit for WinShock is released, SecurityMetrics will work to include a check for the vulnerability in its vulnerability scanning engine.

Healthcare – Plant Your Feet On the Road to HIPAA Compliance

Please educate yourself and your organization on the technology perils of our day.

GHOST Vulnerability…Not That Scary

If you have any questions, please contact SecurityMetrics support, 801.705.5700.

Does HIPAA Apply to Me? 7 HIPAA Myths and Misunderstandings

Don’t fall prey to these common HIPAA misunderstandings.