Blog

search
Search...
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
How Prepared are UK Businesses for GDPR?
GDPR

The EU General Data Protection Regulation (GDPR) will come into effect on May 25, 2018.

How to Become PCI Compliant: The 2020 Guide to PCI DSS Compliance
PCI Trends

Payment Card Industry (PCI) compliance is required for any organization that takes payment cards.

HIPAA Compliant Passwords
HIPAA

Maintaining HIPAA compliant passwords is a key step towards protecting ePHI.

HIPAA Alphabet Soup: Unjumbling the Jargon
HIPAA

HIPAA includes many such acronyms, mostly security-related.

HHS HIPAA Audit Requirements
HIPAA Audit

Don’t forget to document every HIPAA compliance effort as evidence to present to the OCR if your entity is chosen for auditing.

Healthcare's Password Security is Embarrassing
HIPAA

Make the simple change to require unique usernames and passwords on the network level for each one of your staff members.

HIE Insecurity and What One HIE Decided to Do About It
HIPAA

If you’re not sure what your HIE should be doing, have a look at ONC’s health IT security resources.

HIPAA Business Associate Agreement: Who's Really Responsible?
HIPAA

Either manage your business associate security or prepare for a data breach.

HIPAA Security Policy Free Download
HIPAA

Policies help ensure workforce member security.

HIPAA and the Status of Healthcare: What C-suites Should Know
HIPAA

You can’t afford to be passive anymore; it’s time to be aggressive.

How Long are Businesses Vulnerable Before a Security Breach?
Forensics

On average, a merchant was vulnerable for 470 days before an attacker was able to compromise the system.

Here Comes PCI DSS 3.2: What Changes You Should Expect
PCI Trends

See what changes PCI 3.2 brings and what you’ll need to do.

HIPAA Audits Phase 2: What You Need to Know
HIPAA Audit

Learn what’s involved in the Phase 2 HIPAA Audit Program and how you can prepare.

HIPAA Guidelines Simplified in the 2021 HIPAA Guide
HIPAA Audit

Network security is more crucial than ever for healthcare providers.

HIPAA Compliance: Storage in the Cloud
HIPAA Audit

HIPAA Compliance in “the cloud” Cloud data storage is a common and convenient option for healthcare organizations.

Forensic Files: The Case of the Mistaken Malware
Forensics

The best way to inspire better security practices is to show examples of true security blunders.

Forensic Files: The Case of the Suspiciously Flawless Investigation
Forensics

What happens when forensic investigators can’t find evidence of a compromise?

Hacking Trends 2014: Hackers Actually Clean Up After Themselves
Forensics

Hackers are getting smarter than our automated detection tools.

Forensic Files: The Case of the Stockpiled Credit Cards
Forensics

Hopefully, you'll realize some actions you should take to ensure your own business’ security.

Auditing Archives: The Case of the Overly Helpful Front Desk Clerk
PCI Audit

Front desk clerks are friendly…sometimes to a fault, but friendly doesn’t necessarily equal secure.

Fire, Shred, Pulp: How to Properly Destroy Sensitive Documents
HIPAA

The HHS says shredding, burning, pulping, and pulverizing are the only way these records should be destroyed.

Front Desk Security: Eliminate Internet Browsing on Check-In Machines
Data Security

Can customer service and front desk security co-exist?

Balancing Mobile Convenience and PHI Security
HIPAA

Some falsely assume because mobile devices are technologically advanced and marketed as ‘secure’, PHI will automatically be protected.

Current Hacking Trends: Remote Access
Forensics

To help further the fight against fraudsters and data thieves, the SecurityMetrics Forensic Investigation team has identified several common attack types associated with recent breaches.