Blog

search
Search...
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Patient Portals Secure PHI Better Than Email
HIPAA

Portals made specifically for your patients offer data security that email never could.

Networked Medical Devices: a Data Breach Time Bomb
HIPAA

Healthcare devices have vulnerabilities.

PHI: It's Literally Everywhere [Infographic]
HIPAA

The unprotected PHI problem is easy to fix, but it must start with you.

Network Inventory, Configuration Management, and Security
Data Security

Once you have established that your records reflect reality, it is time to monitor to ensure they are accurate.

Payroll Phishing Emails Attack Hospital and Healthcare Security
HIPAA

Essentially, the hackers steal paychecks from right under their noses.

Preventing Stolen Patient Data Through Remote Access Security
HIPAA

My advice? Decide to take security seriously.

Physical Security: What You Aren't Thinking About
Data Security

How to find the risks you might be missing.

Spotting Vulnerabilities – Is Vulnerability Scanning Antiquated?

Vulnerability scanning is one of the only crucial things that can help companies keep up-to-date on emerging vulnerabilities.

Staying Compliant: Visa's New Level 4 Requirements
PCI Trends

Visa requires annual validation of PCI compliance.

PA-DSS 3.2: The What, The Why, and The When
SSF

See what changes your payment application vendor should make.

Perimeter Scan Vs. PCI ASV Scan

When it comes to finding security weaknesses in your business, vulnerability scanning is a great place to start.

New 3.2 Requirements for Penetration Testing and Segmentation: What You Don't Know
Penetration Testing

PCI 3.2 has come out with new requirements for penetration testing and network segmentation.

Patching the Shoplift Bug: What You Should Be Doing
Forensics

Learn more information about the Shoplift Bug, how it makes your system vulnerable, and what you need to do to combat it.

PCI DSS Supplemental Guide to Scope: Understanding PCI DSS Scope and Segmentation
PCI

Here's what you need to know about the supplemental guide for scoping and network segmentation.

PCI Scope Categories: Keep Your Card Data Separate
PCI

Learn what PCI scope categories your systems fall into.

New Multi-Factor Authentication Clarification and Supplement: The Principles You Should Know
PCI Trends

MFA is an additional layer of security you should apply to all of your sensitive data.

Petya Ransomware Outbreak: What to Know
Data Security

For some preventative measures, back up your files regularly and keep your anti-virus software up to date.

PCI SAQ C: Securing Your Payment Application
SMB

See what’s required for PCI SAQ C.

PCI DSS Requirement 9: Upping Your Physical Security
PCI

PCI requirement 9 is all about physical security.

Our Top 5 Most Popular Blog Posts of 2017
Data Security

Start 2018 with our top blogs to help you with your data security and compliance efforts.

PCI Advice for New ISOs
PCI Partner

PCI advice for new ISOs. Here are three tips to help Independent Sales Organizations (ISOs) better position their PCI program

Employee Security Training Tips: Social Engineering
Training

More often than not, data breaches are the result of an attack that takes advantage of our inattention and naiveté: social engineering.

PIIscan: Find and Secure Unencrypted Personal Data
Data Discovery

SecurityMetrics PIIscan helps you find unencrypted data and comply with security mandates.