Blog

search
Search...
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Biometrics: The Future of Payment Data Security?
PCI

Biometrics more accurately associates a specific individual to a device or system.

The Problem with SHA-1: Updating Your Security Certificate to SHA-2
Data Security

On January 1, 2017, SHA-1 was officially no longer accepted by web browsers.

5 Things Your Incident Response Plan Needs
Forensics

Find out some of the essentials to include in your incident response plan.

PCI Requirement 6: Updating Your Systems
PCI

PCI Requirement 6 is all about regularly updating your systems.

SSL to TLS v1.2: Tips for Migration
PCI

Are you still using SSL encryption or TLS v1.0? If so, you’re putting your business at greater risk.

Everything You Need to Know About How to Manage PHI
HIPAA

Fully understanding all the PHI you have, where it is stored, what processes touch it, and how it is used in your organization is critical to enabling a business to properly manage PHI.

5 Steps to Secure Your Healthcare Organization
HIPAA

Securing your healthcare organization should be a priority. Healthcare organizations are especially vulnerable to attacks because they cannot afford to be shut down.

3 Projects to Get You Into InfoSec
Data Security

This blog will discuss 3 infosec projects that are under $100 to get you started in Cybersecurity or Infosecurity by giving you hands-on experience to develop your skills.

HIPAA Guidelines Simplified in the 2022 HIPAA Guide
HIPAA Audit

HIPAA laws and cybersecurity are not simple. To ensure your institution never has a false sense of security, we created our seventh edition Guide to HIPAA Compliance.

Auditor Tips: Requirement 4: Sending Data Over Open And Public Networks
PCI

Know exactly where CHD is coming from and being sent to, inside and outside of your organization.

Auditor Tips: Requirement 3: Protect Cardholder Data
PCI

It is important to know what data you actually store, process, and/or transmit.

Auditor Tips: PCI DSS Responsibilities and Challenges
PCI

As you implement your cybersecurity program, make sure you understand why a security control is required so you can structure tools and processes around the protection each control offers.

Auditor Tips: Requirement 2: System Configuration
PCI

You are required to use industry-accepted configuration and hardening standards when setting up systems that are part of your PCI scope.

Performing an SAQ B-IP version 4.0 Self-Assessment
PCI Trends

The Self-Assessment Questionnaire (SAQ) B-IP is intended for payment channels where cardholder data is processed using IP-connected PTS-approved point-of-interaction terminals.

2023 Forensic Predictions
Forensics

In 2023, we've got three predictions of cyber attacks that we think will be the most prevalent this year

Who Owns Third-Party Security Risk Management
Data Security

Third-party security risk management (TPRM) is the process of analyzing and addressing risks associated with outsourcing to third-party vendors or service providers.

5 Minimum Necessary HIPAA PHI Tips
HIPAA

The HIPAA minimum necessary rule helps covered entities manage healthcare information by requiring them to limit access to and disclosure of PHI.

How Much Does a HIPAA Risk Management Plan Cost?
Risk Assessment

Many healthcare entities haven’t yet separated the difference between the HIPAA Security Rule and HIPAA Privacy Rule.

10 Qualities To Look For When Selecting an Approved Scanning Vendor
Vulnerability Scanning

Not all approved scanning vendors are created equal

How Do Hackers Hack?
Forensics

Hackers don’t care who you are. They just care how rich you can make them.

SecurityMetrics Vulnerability Scanning Process FAQ

The most commonly asked customer questions about the vulnerability scanning process.

How to Permanently Delete Files with Sensitive Data
Data Security

When delete doesn’t actually delete, it can increase your vulnerability.

What is HIPAA Compliance, and How Long Will It Take?
HIPAA

HIPAA compliance is a process, not a destination . . . but it doesn’t hurt to know your timeframe.