9 Ways to Social Engineer a Hospital
Your workforce members are your weakest link; here’s what you can do to help them.By: Brand BarneyWant to know a secret? Most hackers are lazy. That means they’ll try to steal data in the easiest way...
View ArticleHow Long are Businesses Vulnerable Before a Security Breach?
Most businesses don’t realize they are vulnerable…until it’s too late.By: David EllisBusinesses and organizations fear that dreaded data breach that could cost them millions, but how long are their...
View ArticleHIPAA and the Status of Healthcare: What C-suites Should Know
While C-suites seem to think their organization is doing well regarding HIPAA, the evidence suggests otherwise. When it comes to HIPAA, do you really know what’s going on in your organization’s...
View ArticleEnsuring Cloud Security: What You Might Not Know
When it comes to cloud security, there are a few things that slip our minds. By: George MateakiIn recent years, cloud storage has become more popular with companies. Cloud applications, software, and...
View ArticleHIPAA Security Rule: Fulfilling Requirements and Addressing Healthcare...
Most healthcare organizations follow the Privacy Rule, but tend to struggle with fulfilling the Security Rule’s requirements. Did you know that only 77% of healthcare organizations require both...
View ArticlePicking Your Vulnerability Scanner: The Questions You Should Ask
What you need to know about picking the right vulnerability scan tool for your organization. Not all vulnerability scanners are created equal, and despite what many think, there isn’t a “one size fits...
View ArticleFive Things to Consider When Making a HIPAA Security Budget
When it comes to security, many healthcare entities are at a loss on what to budget. By: Brand BarneyHow much do you budget for data security? $1,000? $30,000 . . . more? Unfortunately, many healthcare...
View ArticleHow to Prepare for a PCI DSS Audit
When it comes to PCI audits, being prepared is the key, but what should you do before your auditor shows up? Let’s face it, does anybody like doing audits? They can be a headache for anyone involved....
View ArticlePhysical Security: What You Aren’t Thinking About
Often it’s the little security issues we overlook that hurt us the most. By: Brand BarneySecurity cameras? Check. Guards? Check. Locked doors? Check. Privacy monitors? Umm . . .When it comes to data...
View ArticleCase Studies for PCI Compliance Solutions
SecurityMetrics PCI solution testimonials from real businesses like you. Many businesses have experienced difficulty understanding what to do to reach compliance with the PCI DSS. Consumer payment data...
View Article10 Tips for Increasing IT Budget and Security Buy-In
Is your security budget constantly challenged? Let’s change that. By: Joe RivestThe problem with IT security is getting people to understand IT security. It’s not that people don’t care about...
View ArticleWhat is HIPAA Compliance, and How Long Will It Take?
HIPAA is a process, not a destination . . . but it doesn’t hurt to know your timeframe.By: Thomas McCroryHIPAA, or the Health Insurance Portability and Accountability Act, is a set of guidelines...
View ArticleTop 10 Network Security Audit Fails
PCI DSS assessment issues haven’t changed in years. By: Gary GloverBack in 2011, I gave a presentation on the top 10 security issues I saw during hundreds of PCI DSS network security audits. Guess...
View ArticleHow to Confront Hospital Ransomware
Don’t let your patients’ medical records be taken hostage.By David EllisRansomware is one of the fastest growing malware versions to grab the attention of cybercriminals worldwide (attacks grew 113% in...
View ArticleSpotting Vulnerabilities – Is Vulnerability Scanning Antiquated?
Just how helpful is vulnerability scanning today? This blog was originally featured as an article in Hospitality Upgrade. By: Brand BarneyI often hear, “Isn’t vulnerability scanning outdated?” from my...
View ArticleHow to Prepare for a HIPAA Audit
Preparing some documents beforehand will make your HIPAA audit much more pleasant.Check out the infographic here. By: Brand BarneyThe OCR has scheduled you for a HIPAA audit, and you’re panicking. What...
View Article6 Ways to Make Data Security Consistent in Your Business
When it comes to data security, your company should be on the same page.By: Mike ReisenSo you get it; data security is important. You’ve addressed many elements of security, like install firewalls and...
View ArticleIntrusion Detection System: The Missing Component in Healthcare Data Security
The #1 most important piece of a data loss prevention method? An intrusion detection system.By: Brand BarneyLet’s face it. It’s an absolute struggle to protect patient data in today’s healthcare...
View ArticleStaying Compliant: Visa’s New Level 4 Requirements
It’s not just the large merchants that need to be compliant. By: David MeyersAccording to a recent announcement, Visa will now require all Level 4 merchants in the US and Canada to validate PCI DSS...
View ArticleHow to Meet HIPAA Documentation Requirements
A HIPAA document is more than a policy. It’s proof you care to safeguard patient data.By: Brand BarneyA massive chunk of your HIPAA compliance process should be spent recording what you’ve completed....
View Article