Blog

How to Prepare for PCI DSS 4.0

Rather than worrying about the new PCI requirements, you can prepare for PCI DSS 4.0 by focusing on your current PCI DSS compliance efforts and choosing to think of 4.0 as a timely addition that will provide more defenses against developing attack methods.

What Are Addressable HIPAA Requirements?

Contrary to popular belief, addressable does NOT mean optional.

Intrusion Detection System: What's Missing in HIPAA Security

The #1 most important piece of a data loss prevention method? An intrusion detection system.

7 Mistakes in Small Businesses Security

Small businesses often find themselves caught between limited resources and the threat of cybersecurity breaches. To avoid a data breach, here are 7 common Mistakes in small businesses security.

Phishing Types, Tactics, and Techniques

To effectively protect your business, it's crucial to understand the various types of phishing tactics and how to prevent them.

HIPAA Diagrams: the #1 Way to Help Your HIPAA Audits Go Faster

How can you secure your organization without knowing how patient data travels?

PCI Requirement 7: 5 Reasons You Should Limit Employee Access to Your Data

Learn why restricting employee access to data helps protect your business.

Limiting Employee Access: A Look at PCI DSS Requirement 7

See why you should comply with PCI DSS Requirement 7 and restrict employee access to sensitive data.

Cyber Breach Insurance: How Much Does it Cost?

Depending on a few factors, cyber insurance premiums can cost from $650 to easily over $120,000 annually.

GDPR and CCPA Overview: Your Role in Data Protection

This post covers the General Data Protection Regulation (GDPR) and the California Consumer Protection Act (CCPA), as well as fees for data breaches, changes in privacy attitudes, and the future of the standards.

Vendor-Supplied Defaults Are a Serious Threat

When those defaults aren’t changed, you give hackers Wonka’s Golden Ticket into your system.

PCI Consultants Say: Reduce PCI DSS Scope

If you don’t have a compelling business need to store PAN, don’t store it!

9 Ways to Social Engineer a Hospital

Fight against social engineering by providing proper regular staff training.

Top 10 Network Security Audit Fails

The top PCI DSS assessment failures haven’t changed in years.

How to Meet HIPAA Documentation Requirements

A HIPAA document is more than a policy: it's proof you care about protecting patient data.

Biometrics: The Future of Payment Data Security?

Biometrics more accurately associates a specific individual to a device or system.

The Problem with SHA-1: Updating Your Security Certificate to SHA-2

On January 1, 2017, SHA-1 was officially no longer accepted by web browsers.

5 Things Your Incident Response Plan Needs

Find out some of the essentials to include in your incident response plan.

PCI Requirement 5: Protecting Your System with Anti-Virus

PCI Requirement 5 deals primarily with installing and maintaining an anti-malware software.

PCI Requirement 6: Updating Your Systems

PCI Requirement 6 is all about regularly updating your systems.

SSL to TLS v1.2: Tips for Migration

Are you still using SSL encryption or TLS v1.0? If so, you’re putting your business at greater risk.

HIPAA Business Associate Agreements 101

Find out more about the essentials of HIPAA Business Associate Agreements.

Everything You Need to Know About How to Manage PHI

Fully understanding all the PHI you have, where it is stored, what processes touch it, and how it is used in your organization is critical to enabling a business to properly manage PHI.