Blog

PCI PIN Assessment FAQs

PCI PIN refers to the security requirements and assessment for merchants that accept, process or transmit payment card personal identification numbers (PIN).

COVID-19 Cyber Attacks Security Update Center

Amid the chaos and uncertainty, SecurityMetrics remains steadfast in our mission to help you close compliance gaps and prevent data breaches. We stand ready to help with your security concerns, education, and content needs at this time.

Performing an SAQ-D version 4.0 Merchant Self-Assessment

Merchants who do not qualify to assess their PCI DSS compliance using any of the simpler self-assessment questionnaires are required to use the SAQ D to validate their compliance.

Sending Credit Card Info Over Email

The way you handle emailing credit card info might just change your scope for PCI DSS compliance.

Healthcare Reception Desks: Breeding Ground for HIPAA Compromise

Your reception desk might be one of the most vulnerable locations in your entire organization for a data breach. W

A Hacking Scenario: How Hackers Choose Their Victims

See the step-by-step ways the average hacker looks for valuable data and what hacking victims should do in response to an attack.

The Importance of the PCI DSS: Why You Should Get Compliant

All businesses that handle payment card data, no matter their size or processing methods, must follow these requirements and be PCI compliant.

How Much Does a Data Breach Cost Your Organization?

Let’s take a look at some of the different costs your business could incur as a result of a data breach.

PCI vs. GDPR: What’s the Difference?

GDPR applies to any organization that processes or holds the personal data of persons residing in the European Union. PCI applies to organizations that handle credit cards from the major card brands.

Forensic FAQs

If you've experienced a data breach, you will probably need a forensic investigation to determine the cause of the breach. Here are some forensic faqs to help you understand the process of a forensic investigation.

PCI Program FAQs: What is a PCI Program?

A PCI program is a system that acquirers use to keep track of their merchants PCI compliance, and for merchants to receive the training and tools they need to achieve PCI compliance and remain PCI compliant.

How to Implement and Maintain HIPAA Compliant Firewalls

Simply installing a firewall on your organization’s network perimeter doesn’t secure your network or make you HIPAA compliant. Proper configuration is critical for HIPAA compliant firewalls.

SecurityMetrics vs. Other PCI Program Providers

What should you look for in a PCI program and how will you know which PCI program is right for you?

Securing Mobile Devices with Mobile Encryption

How do you secure data on mobile devices? Physical security and mobile device policies are good at protecting the device itself, but another way to protect the data on the device is mobile encryption.

Auditor Tips: PCI DSS Scope

To discover your PCI scope and what must be included for yourPCI compliance, you need to identify anything that processes, stores, or transmits cardholder data, and then evaluate what people and systems are communicating with your systems.

HITRUST vs. HIPAA

The difference: HITRUST vs. HIPAA HITRUST is a compliance framework created by a private alliance of security industry experts and includes many aspects of HIPAA Security and Privacy Rules.

What are the HITRUST Requirements? 3 Steps To Get HITRUST Certified

Specific HITRUST requirements are available through HITRUST’s MyCSF portal and will include various implementations of foundational security measures and controls depending on your organization and the type of HITRUST assessment you are performing.

The Dos and Don'ts of Storing Credit Card Information

An example of insecure credit card number storage comes from one of our PCI assessors, where a company explained how they processed their credit cards.

What is a Managed Firewall and Do You Need One?

What is a Managed Firewall and Do You Need One?

What’s changed in CIS Controls (v8)?

Overview of key changes in the CIS controls update. See what’s new in the CIS Controls (v8) and how this free resource can help maximize your security.

Improve Your Security Posture with NIST Cybersecurity Framework

The NIST cybersecurity framework can help guide small-to-medium sized organizations improve their cybersecurity posture.

Top 10 Types of Phishing Emails

Criminals have countless methods and types of phishing emails to trick email users.

Why You Need Both a Hardware and Software Firewall

How do you block access to your systems (and sensitive data) from hackers in the outside world?