Blog

Auditor Tips: Requirement 7: Restrict Access

Cardholder data and card systems should only be accessible to those that need that information to do their jobs. Once you’ve implemented access privileges, make sure to document it.

Auditor Tips: Requirement 6: System Updating And Software Development

System administrators have the responsibility to ensure that all system components (e.g., servers, firewalls, routers, workstations) and software are updated with critical security patches within 30 days of public release.

Auditor Tips: Requirement 4: Sending Data Over Open And Public Networks

Know exactly where CHD is coming from and being sent to, inside and outside of your organization.

Auditor Tips: Requirement 3: Protect Cardholder Data

It is important to know what data you actually store, process, and/or transmit.

Auditor Tips: PCI DSS Responsibilities and Challenges

As you implement your cybersecurity program, make sure you understand why a security control is required so you can structure tools and processes around the protection each control offers.

Auditor Tips: Requirement 2: System Configuration

You are required to use industry-accepted configuration and hardening standards when setting up systems that are part of your PCI scope.

Requirement 1: Establish Secure Firewall Rules

Make sure to choose firewalls that support the necessary configuration options to protect critical systems and provide segmentation between the CDE and other internal and external networks specific to your organization.

Auditor Tips: PCI DSS Scope

To discover your PCI scope and what must be included for yourPCI compliance, you need to identify anything that processes, stores, or transmits cardholder data, and then evaluate what people and systems are communicating with your systems.

Performing an SAQ-B Version 4.0 Self-Assessment

The SAQ B is designed for merchant environments where all cardholder data is processed using standalone Point-of-Interaction (POI) terminals connected via an analog phone line.

Performing an SAQ B-IP version 4.0 Self-Assessment

The Self-Assessment Questionnaire (SAQ) B-IP is intended for payment channels where cardholder data is processed using IP-connected PTS-approved point-of-interaction terminals.

5 Steps to Secure Your Healthcare Organization

Securing your healthcare organization should be a priority. Healthcare organizations are especially vulnerable to attacks because they cannot afford to be shut down.

Everything You Need to Know About How to Manage PHI

Fully understanding all the PHI you have, where it is stored, what processes touch it, and how it is used in your organization is critical to enabling a business to properly manage PHI.

HIPAA Compliance Best Practices

With over 20 years in the industry, we have found that these HIPAA compliance best practices are most helpful in securing your organization.

2023 Forensic Predictions

In 2023, we've got three predictions of cyber attacks that we think will be the most prevalent this year

3 Projects to Get You Into InfoSec

This blog will discuss 3 infosec projects that are under $100 to get you started in Cybersecurity or Infosecurity by giving you hands-on experience to develop your skills.

How to Maintain HIPAA Compliant Firewalls

Simply installing a firewall on your organization’s network perimeter doesn’t secure your network or make you HIPAA compliant. Proper configuration is critical for HIPAA compliant firewalls.

Auditor Tips: Monitor Your Business Associates’ Compliance

Every covered entity that uses business associates is required to obtain assurances that their business associates treat patient data the way you and HHS require them to.

Auditor Tips: System Updating and Software Development

System administrators have the responsibility to ensure all system components (e.g., servers, firewalls, routers, workstations) and software are updated with critical security patches within 30 days of when they are released to the public.

Auditor Tips: Overcome Management’s Budget Concerns

If you are having problems communicating budgetary needs to management, conduct a risk analysis before starting the HIPAA process.

Auditor Tips: HIPAA Training Best Practices

Workforce members need to be given specific rules and regular training to know how to protect PHI. Regular training will remind them of the importance of security and keep them up to date with current security policies and practices.

Auditor Tips: Healthcare Security And Best Practices

Healthcare security gaps often stem from communication issues. It’s common to see executives and practice leads who aren’t listening to their staff about their current state of compliance and security.

Auditor Tips: Penetration Testing Best Practices

A penetration test will give you a holistic view of what your security system truly looks like. Organizations with poor security practices across their environment leave themselves vulnerable.

Auditor Tips: Minimum Necessary Best Practices

The minimum necessary requirement is a key part of the HIPAA Privacy Rule. The goal of this requirement isn’t to encourage organizations to perform the minimum necessary, but rather for organizations to only use and disclose the minimum amount of PHI necessary

Auditor Tips: Regularly Conduct Vulnerability Scans

Regular vulnerability scans are a critical preventative security control as they detect and assess known weaknesses that may be opening up your systems, applications and networks to undue risk of intrusion. Vulnerability scanning is not penetration testing.