The 2018 SecurityMetrics Guide to HIPAA Compliance will help you better understand how to protect patient data from inevitable future attacks. Our guide includes survey results that identify current HIPAA trends and will be helpful for beginners and seasoned experts.
If your organization has ever had a Payment Card Industry Data Security Standard (PCI DSS) assessment, you’ve probably noticed the big emphasis on having documented security policies and procedures.
Holiday Security Tips: While the busyness of the holidays can provide cover for cybercriminal activity, there are a few things your business can do to protect against data breaches this holiday season.
5 Security Best Practices for Protecting Your HIPAA-Compliant Data: encrypt everything, assess your risk, train your people, be vigilant and ready to act, and read buisness associate agreements and find partnerships you trust.
What is network penetration testing? PCI DSS Requirement 11 calls for regular vulnerability scanning and penetration testing.
An in-depth look at the PCI Security Standard Council’s recent MFA guidance supplement and what it means for your organization.
PCI Requirement 11 discusses vulnnerability scanning and penetration testing.
On October 16, 2017, the WPA2 Security Flaw “KRACK” vulnerability was made public.
Learn about the most common questions about HIPAA compliance.
PCI DSS 3.2 replaced 3.1 on October 31 of 2016.
Learn about the fundamentals of PCI DSS Compliance.
Segmentation is important for preventing breaches and hacks, as well as a method to reduce PCI scope.
Find out more about the essentials of HIPAA Business Associate Agreements.
PCI requirement 10 is all about logging and log monitoring.
The most accurate way to know if you’re safe from a hacker is through live penetration testing, also called pen testing, or ethical hacking.
If you are a service provider who stores credit card data, PCI SAQ D likely applies to you.
PCI requirement 9 is all about physical security.
Are you still using SSL encryption or TLS v1.0? If so, you’re putting your business at greater risk.
What is phishing? Phishing refers to a type of social engineering that happens primarily through emails. Hackers will send emails that often have links to malware.
In order to comply with PCI Requirement 8, you need to practice proper password and username management.
See what’s required for PCI SAQ C.
GDPR is regulation that will help unite privacy laws across Europe. Here are some answered questions about GDPR Compliance.
For some preventative measures, back up your files regularly and keep your anti-virus software up to date.