Blog

search
Search...
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
SecurityMetrics Uncovers a Near 700 Site Global Skimming Operation
Forensics

SecurityMetrics forensic experts have identified a near 700 site skimming operation using a sophisticated, multi-channel kit designed to lock out analysts and mimic legitimate payment providers.

The 7 Most Common Mistakes in Small Business Security
SMB

To help you prioritize your security, here are 7 common mistakes that small business owners make and how to fix them.

How to Create (And Remember!) Strong Passwords
Data Security

Moving beyond "P@ssw0rd123" to a safer, simpler digital life.

The Five Step Roadmap for Tackling CMMC
CMMC

CMMC has rolled out, and if you work with the Department of Defense, you need to be CMMC compliant to continue getting contracts. Here's five easy steps to tackle CMMC.

The Risks of Emailing Credit Card Data: 2026 Compliance Standards
Compliance

Did you know that if your server receives, transmits, or stores primary account numbers (PAN), it is officially in scope for PCI security requirements?

2026 Cybersecurity Outlook & Lessons
Data Security Trends

Looking back on the previous year’s cybersecurity lessons isn’t just a nostalgic exercise, it could be a peek into anticipating 2026’s threats.

Common PCI DSS Questions for SMBs
SMB

This blog is intended for small to medium sized-merchant businesses and attempts to answer common PCI DSS questions.

PCI DSS Requirement 12: Policies and Documentation
PCI

Without a formal policy, technical controls are just isolated tools. Requirement 12 ensures those tools are part of a consistent, repeatable, and legal framework.

10 Ways I’m Protecting My Professional Identity in 2026
Ecommerce Security

Your professional identity has never been more exposed. Read this blog to discover ten tips for protecting your identity online in 2026.

How to Manage a Data Breach: 5 Steps to Keep Your Business Safe
Forensics

Here are some steps to take to stop information from being stolen, prevent further damage and restore operations as quickly as possible.

Comparing PCI QSA Firms
PCI Partner

In this blog, I will compare the QSA firms SecurityMetrics, Coalfire, and A-Lign by looking at what you can expect from each QSA’s assessment and what they will cost.

7 Ways to Recognize a Phishing Email: Examples of Phishing Email Scams
Data Security

Here are seven email phishing examples to help you recognize a malicious email and maintain email security.

PCI Requirement 10: Logging and Log Monitoring
PCI

PCI requirement 10 is all about logging and log monitoring.

PCI Requirement 11: Vulnerability Scans and Penetration Tests
Penetration Testing

PCI Requirement 11 discusses vulnnerability scanning and penetration testing.

How to Manage a Healthcare Data Breach
Forensics

Data breaches can be devastating. Here are 5 steps that will help you manage a healthcare data breach.

CMMC Basics: A Practical 2026 Roadmap for CMMC Compliance
Data Security

The time to implement the Cybersecurity Maturity Model Certification (CMMC) has finally arrived. Read to learn the timelines and best practices.

What is Tokenization and How Can I Use it for PCI DSS Compliance?
PCI

There are common pitfalls in implementing tokenization correctly, so it’s critical to partner with a vendor who understands how to implement tokenization across technology, security, compliance, and risk.

You’ve Been Hacked, Now What? A Step-By-Step Guide
Forensics

If you aren't careful, you might destroy the very evidence needed to stop the attacker for good.

PCI Requirement Nine
PCI

PCI DSS Requirement 9 covers all aspects of physical security. Here are a few tips to make sure your physical security is PCI compliant.

7 Common Mistakes to Avoid During Your First PCI Audit
PCI Audit

Drawing on decades of experience in PCI auditing, SecurityMetrics VP, Gary Glover, and Audit Director, Matt Halbleib, share the seven most common pitfalls organizations encounter, and how to navigate them successfully.

PCI Fundamentals for SMBs
PCI

PCI compliance doesn’t have to be a headache. The process can actually be broken down into four manageable steps.

The Top Five PCI Resources for Enterprise Organizations
Compliance

To help your organization stay proactive and ahead of threat trends, I’ve curated the five most critical resources for managing enterprise-level risk in 2026. Read on to discover which PCI resources deserve your attention the most.

PCI Requirement 7: Limiting Employee Access
PCI

PCI requirement 7 requires you to restrict employee access to only the data they absolutely need. It might sound simple, but it’s actually one of the most important requirements for preventing a data breach and commonly overlooked.

PCI Requirement 8: Strengthen Your Passwords and Usernames
PCI

If you’re wondering what this means for PCI requirement eight, this blog will cover key updates, how to strengthen your organization’s passwords and usernames, and how to implement MFA (Multi-Factor Authentication).