To help further the fight against fraudsters and data thieves, the SecurityMetrics Forensic Investigation team has identified several common attack types associated with recent breaches.
My stance on patient sign-in sheets is that unless there is a valid business reason for having them, don’t do it.
Some falsely assume because mobile devices are technologically advanced and marketed as ‘secure’, PHI will automatically be protected.
There are two website prefixes: One shows the site you are on is secure (HTTPS), and the other does not (HTTP).
If businesses are determined to provide mobile solutions, it is their responsibility to educate themselves, ensure the security of the solution, and know the risk they’re taking upon themselves.
An example of insecure credit card number storage comes from one of our PCI assessors, where a company explained how they processed their credit cards.
Can customer service and front desk security co-exist?
Internet browsing on point-of-sale (POS) or property management machines that have the capability to take credit cards is a one-way ticket to data compromise.
The following guidance will help you understand the major steps involved in firewall configuration.
Like a security guard, firewalls control what goes in and what comes out.
Protect sensitive data from social engineering attacks.
This is our third study on stored, unencrypted card data. When compared to last year, the storage has actually decreased.
Front desk clerks are friendly…sometimes to a fault, but friendly doesn’t necessarily equal secure.
The HHS says shredding, burning, pulping, and pulverizing are the only way these records should be destroyed.
HIPAA includes many such acronyms, mostly security-related.
This blog covers the important changes from PCI DSS version 2.0 and 3.0.
Security doesn’t have to be expensive to be effective. Here are 10 tips for effective, reasonable security.
Attackers target organizations that utilize remote access applications.
Hackers bike around the city with their laptops in a discreet backpack (or strapped in a bike trailer) and search for unprotected wireless networks.
Employees who irresponsibly use social media can potentially invite some serious HIPAA violations.
Learn how you can reduce your liability by learning about the hazards of ‘unintended’ credit card storage.
Hackers are getting smarter than our automated detection tools.
These service guarantees exist to address the financial hardships your business might endure in the aftermath of a compromise.
There’s only one way to avoid leaving ten-second holes in security. Encrypt card data at the exact millisecond of collection.