Blog

HIPAA Guidelines Simplified in the 2021 HIPAA Guide

Network security is more crucial than ever for healthcare providers.

HIPAA Compliance: Storage in the Cloud

HIPAA Compliance in “the cloud” Cloud data storage is a common and convenient option for healthcare organizations.

Forensic Files: The Case of the Mistaken Malware

The best way to inspire better security practices is to show examples of true security blunders.

Forensic Files: The Case of the Suspiciously Flawless Investigation

What happens when forensic investigators can’t find evidence of a compromise?

Hacking Trends 2014: Hackers Actually Clean Up After Themselves

Hackers are getting smarter than our automated detection tools.

Forensic Files: The Case of the Stockpiled Credit Cards

Hopefully, you'll realize some actions you should take to ensure your own business’ security.

Auditing Archives: The Case of the Overly Helpful Front Desk Clerk

Front desk clerks are friendly…sometimes to a fault, but friendly doesn’t necessarily equal secure.

Fire, Shred, Pulp: How to Properly Destroy Sensitive Documents

The HHS says shredding, burning, pulping, and pulverizing are the only way these records should be destroyed.

Front Desk Security: Eliminate Internet Browsing on Check-In Machines

Can customer service and front desk security co-exist?

Balancing Mobile Convenience and PHI Security

Some falsely assume because mobile devices are technologically advanced and marketed as ‘secure’, PHI will automatically be protected.

Current Hacking Trends: Remote Access

To help further the fight against fraudsters and data thieves, the SecurityMetrics Forensic Investigation team has identified several common attack types associated with recent breaches.

Cross-Site Scripting, Explained

Cross-site scripting allows bad guys to embed malicious code into a legitimate website to ultimately steal user data.

Crucial Security Advisory: Patch Windows Immediately Against WinShock

When an exploit for WinShock is released, SecurityMetrics will work to include a check for the vulnerability in its vulnerability scanning engine.

Healthcare – Plant Your Feet On the Road to HIPAA Compliance

Please educate yourself and your organization on the technology perils of our day.

GHOST Vulnerability…Not That Scary

If you have any questions, please contact SecurityMetrics support, 801.705.5700.

Does HIPAA Apply to Me? 7 HIPAA Myths and Misunderstandings

Don’t fall prey to these common HIPAA misunderstandings.

Free SecurityMetrics PCI Compliance Demo

Learn about changes to our customer PCI validation portal to accommodate for PCI version 3.0

EMV Security, Is It Hackable?

It's untrue that any technology is absolutely unhackable.

Do You Know Where You Store Card Data? Unencrypted Credit Card Data Storage

Unencrypted credit card data is hiding on your network

Free HIPAA Compliance Software Demo

This HIPAA compliance software is easy to update and doubles as a documentation tool.

Healthcare: Recognize Social Engineering Techniques

Don’t let human hackers disorient your employees.

Five Things to Consider When Making a HIPAA Security Budget

Having the proper security budget protects not just your organization, but your patients as well.

Ensuring Cloud Security: What You Might Not Know

Don’t be afraid of the cloud; just be smart with it.

How Much Credit Card Data do You Store? (It's More Than You Think.)

See the unencrypted storage results from SecurityMetrics’ latest PANscan reports.