Blog

5 Steps to Secure Your Healthcare Organization

Securing your healthcare organization should be a priority. Healthcare organizations are especially vulnerable to attacks because they cannot afford to be shut down.

3 Projects to Get You Into InfoSec

This blog will discuss 3 infosec projects that are under $100 to get you started in Cybersecurity or Infosecurity by giving you hands-on experience to develop your skills.

HIPAA Guidelines Simplified in the 2022 HIPAA Guide

HIPAA laws and cybersecurity are not simple. To ensure your institution never has a false sense of security, we created our seventh edition Guide to HIPAA Compliance.

5 Steps of a PCI DSS Audit

PCI DSS assessments, also called PCI audits, may seem daunting for you and your business. But, we’ve broken down the process into 5 steps to help you understand what the process will be like and how you can better optimize your time.

Auditor Tips: Requirement 4: Sending Data Over Open And Public Networks

Know exactly where CHD is coming from and being sent to, inside and outside of your organization.

Auditor Tips: Requirement 3: Protect Cardholder Data

It is important to know what data you actually store, process, and/or transmit.

Auditor Tips: PCI DSS Responsibilities and Challenges

As you implement your cybersecurity program, make sure you understand why a security control is required so you can structure tools and processes around the protection each control offers.

Auditor Tips: Requirement 2: System Configuration

You are required to use industry-accepted configuration and hardening standards when setting up systems that are part of your PCI scope.

Requirement 1: Establish Secure Firewall Rules

Make sure to choose firewalls that support the necessary configuration options to protect critical systems and provide segmentation between the CDE and other internal and external networks specific to your organization.

Performing an SAQ B-IP version 4.0 Self-Assessment

The Self-Assessment Questionnaire (SAQ) B-IP is intended for payment channels where cardholder data is processed using IP-connected PTS-approved point-of-interaction terminals.

2023 Forensic Predictions

In 2023, we've got three predictions of cyber attacks that we think will be the most prevalent this year

Who Owns Third-Party Security Risk Management

Third-party security risk management (TPRM) is the process of analyzing and addressing risks associated with outsourcing to third-party vendors or service providers.

5 Minimum Necessary HIPAA PHI Tips

The HIPAA minimum necessary rule helps covered entities manage healthcare information by requiring them to limit access to and disclosure of PHI.

How Much Does a HIPAA Risk Management Plan Cost?

Many healthcare entities haven’t yet separated the difference between the HIPAA Security Rule and HIPAA Privacy Rule.

10 Qualities To Look For When Selecting an Approved Scanning Vendor

Not all approved scanning vendors are created equal

How Do Hackers Hack?

Hackers don’t care who you are. They just care how rich you can make them.

SecurityMetrics Vulnerability Scanning Process FAQ

The most commonly asked customer questions about the vulnerability scanning process.

How to Permanently Delete Files with Sensitive Data

When delete doesn’t actually delete, it can increase your vulnerability.

What is HIPAA Compliance, and How Long Will It Take?

HIPAA compliance is a process, not a destination . . . but it doesn’t hurt to know your timeframe.

Vulnerability Scanners 101: What, Why, and How to Comply

Learn the fundamentals of vulnerability scanning, especially for PCI compliance requirements.

Configure and Maintain Your Firewall

Learn why your firewall may make you vulnerable and how SecurityMetrics Managed Firewall can help.

PCI Requirement 8: Combatting Weak Passwords and Usernames

In order to comply with PCI Requirement 8, you need to practice proper password and username management.

SAQ D: What's Required for Service Providers

If you are a service provider who stores credit card data, PCI SAQ D likely applies to you.