Blog

How to Protect Your Ecommerce Website Against Skimming

This blog is a summary and compendium to the SecurityMetrics’ Webinar “How to Protect Your Ecommerce Website Against Skimming”, hosted by Matt Heffelfinger and Aaron Willis.

Your Guide To Understanding Web Application Penetration Testing

Read this blog to understand the methodology, scope, and best practices for conducting effective web application penetration testing.

CSF HITRUST Breakdown: FAQs & Guidance

In this blog, you’ll learn about the fundamental aspects of HITRUST Certification, as well as receive answers to frequently asked questions about CSF HITRUST.

What to Do If Your Identity is Stolen in 2024: Essential Steps

If you find yourself a victim of identity theft, it’s crucial to act swiftly and systematically to protect yourself and minimize the damage.

How Infosend Became PCI DSS Compliant with SecurityMetrics

Since 2014, Infosend has partnered with SecurityMetrics to meet their PCI compliance needs, ensuring their processes remain secure and their clients’ data is protected.

Top Cybersecurity Data Insights: a Breakdown of Our 2024 PCI DSS Guide

For 2024, our guide remains one of the best resources to use as you achieve PCI DSS compliance for your organization. It covers each requirement with clarity and thoroughness.

Vita Companies HITRUST Certification Journey using SecurityMetrics and Privaxi

About four years ago, Vita Companies decided to pursue HITRUST certification to differentiate themselves in the market.

Updates to Multi-Factor Authentication Requirements in PCI v4.0.1

Learn how to comply with PCI DSS 4.0 Requirement 8, focusing on multi-factor authentication (MFA) and password management.

Is my PCI compliance management hurting my merchant portfolio? How SecurityMetrics makes switching your Acquirer PCI program easy

There’s no need to put up with a PCI program that isn’t meeting your expectations.

6 Common Problems Merchants Face in PCI Compliance Programs

Merchants that rely on a PCI compliance program to stay compliant and protect their business often find themselves dissatisfied or frustrated by all kinds of problems including lack of support, expensive contracts, and many more.

Why You Need to Know About PCI Requirements 6.4.3 & 11.6.1: Eskimming Findings from SecurityMetrics Investigations

SecurityMetrics has seen a dramatic increase in attacks specifically on ecommerce sites using iFrames to host a payment page from a 3rd party service provider.

PCI Compliance & Cybersecurity: Anedot's Journey with SecurityMetrics

In this case study, Anedot works with SecurityMetrics to better secure their cybersecurity infrastructure and to reach PCI DSS 4.0 compliance.

Internal Penetration Testing 101: Where to Start

While there are various types of penetration tests like external, web application, or mobile, this blog will focus on internal tests and why they matter.

Understanding the New PCI SAQ Type: SAQ SPoC

This article covers the Self-Assessment Questionnaire (SAQ) for Software-based PIN entry.

Updates to PCI DSS v4.0.1

The PCI Security Standards Council (PCI SSC) recently published a limited revision to the PCI DSS in the form of v4.0.1.

Artificial Intelligence and Cybersecurity: What Businesses Don't Know

AI or artificial intelligence can be used safely by businesses that are concerned about their cybersecurity.

Navigating AI Safely in Your Small Business: an AI Cybersecurity Perspective

A number of other interesting AI cybersecurity issues are hitting our radar as customers begin taking advantage of new AI tools in their small businesses.

Common PCI DSS Questions for SMBs

This blog is intended for small to medium sized-merchant businesses and attempts to answer common PCI DSS questions.

7 Mistakes in Small Businesses Security

Small businesses often find themselves caught between limited resources and the threat of cybersecurity breaches. To avoid a data breach, here are 7 common Mistakes in small businesses security.

Phishing Types, Tactics, and Techniques

To effectively protect your business, it's crucial to understand the various types of phishing tactics and how to prevent them.

Which Pentest is Right for You?

Determining which type of pentests are best for your organization depends on concerns or needs that are generated from real life security incidents or concerns about security posture for business critical systems or environments.

6 Steps to a Penetration Test

Getting a penetration test can seem overwhelming, but following these steps can help ensure that your penetration test goes as smoothly as possible.

Your Crash Course To HITRUST CSF Assessment Types

This blog will cover the three types of HITRUST CSF certifications. It will also cover what you can expect to achieve upon completion of each type of assessment and general guidelines of which assessment is best for your organization.

HITRUST Assessment Basics

This blog answers common questions about HITRUST Assessments and why a HITRUST assessment might be a good choice for your organization.