Blog

Auditor Tips: Secure Remote Access

Remote access to tools and data is essential to employees who work from home or are unable to go into the office for health or other logistical reasons.

Auditor Tips: System Configuration

Whenever a system is configured make sure you know exactly what is running and also what is necessary to allow the system to perform its intended function.

Auditor Tips: Practicing Good Cyber Hygiene

While every organization is different, the end goal of practicing good cyber hygiene is to identify vulnerabilities, minimize risk exposure, and reduce the potential for a breach.

Auditor Tips: Know Your PHI’s Lifecycle

Fully understanding all the PHI you have, where it is stored, what processes touch it, and how it is used in your organization is critical to enabling a business to properly handle and secure PHI.

Auditor Tips: Conduct an Accurate and Thorough Risk Analysis

Yet a complete and thorough risk analysis is one of the best ways for you and your organization to make intelligent and informed business decisions

What’s New with the SAQ A-EP

The SAQ A-EP PCI assessment is for merchants who have an e-commerce card data flow that is not entirely outsourced to a PCI validated third-party service provider.

The SecurityMetrics HIPAA Guide Simplifies HIPAA Guidelines

HIPAA laws and cybersecurity are not simple. The 2023 HIPAA Guide breaks down HIPAA guidelines into actionable steps and easy-to-understand information so that your healthcare staff can be fully educated on data privacy and protection.

Guide to HIPAA Compliance Simplifies Data Security and Privacy

We created our Guide to HIPAA compliance to help you close gaps in security and compliance, ultimately helping you avoid a data breach.

Five Ways to Make Security Training Memorable

One of the easiest ways to make cybersecurity training more interesting is by making it fun. Here are five tips for making workforce security training fun and memorable.

The Cost of HIPAA Breach Insurance

Those exorbitant fines are why cyber breach insurance exists.

Updating PCI DSS SAQs from 3.0 to 3.2: The Changes You Should Know

PCI DSS 3.2 has added and removed new requirements to the SAQs.

Stay Off the HHS Naughty List

Brand degradation and patient exodus will likely occur every time an organization shames their name through a data breach.

Warbiking: Hacking with Your Helmet On

Hackers bike around the city with their laptops in a discreet backpack (or strapped in a bike trailer) and search for unprotected wireless networks.

Unencrypted Data: A Security Plague

Unencrypted payment card data is relatively simple for a hacker to detect, scoop up, and steal.

What Are My HIPAA Security Requirements?

Given the stated importance and heavy consequences associated with the risk analysis, you may want to consider working with a HIPAA security expert.

What Antivirus Should I Use?

Don’t let your anti-malware be your permeable safety blanket.

The Pros and Cons of Onsite HIPAA Audits

Contracting with an external professional to perform an onsite HIPAA audit might be a good option for you.

The Ultimate Guide to PCI 3.0 Changes

Here’s a list of our most popular PCI DSS 3.0 resources.

Welcome to the SecurityMetrics Blog

Learn to close data security gaps and prevent data breaches at your business.

Visa PCI Enforcement Rules in 2015

What does this new enforcement plan actually mean for noncompliant merchants and service providers?

The 7 Things That Prevent Dental Practice Growth

None of these seven suggestions requires changing or enhancing your clinical expertise.

The Healthcare Threat is Imminent: Secure Remote Access Now!

Healthcare entities must be proactive about protecting sensitive data across their organization.

Two Factor Authentication – Security Beyond Passwords

Is two-factor authentication perfect? No, but it does make a hacker’s job more difficult.

The Hippocratic Oath and Doing No Harm In The Information Age

Each healthcare professional has a responsibility and stewardship over the patients’ PHI they handle.