Quantcast
Channel: SecurityMetrics Blog
Browsing all 384 articles
Browse latest View live

Image may be NSFW.
Clik here to view.


9 Ways to Social Engineer a Hospital

Your workforce members are your weakest link; here’s what you can do to help them.By: Brand BarneyWant to know a secret? Most hackers are lazy. That means they’ll try to steal data in the easiest way...

View Article


Image may be NSFW.
Clik here to view.

How Long are Businesses Vulnerable Before a Security Breach?

Most businesses don’t realize they are vulnerable…until it’s too late.By: David EllisBusinesses and organizations fear that dreaded data breach that could cost them millions, but how long are their...

View Article


Image may be NSFW.
Clik here to view.

HIPAA and the Status of Healthcare: What C-suites Should Know

While C-suites seem to think their organization is doing well regarding HIPAA, the evidence suggests otherwise.  When it comes to HIPAA, do you really know what’s going on in your organization’s...

View Article

Image may be NSFW.
Clik here to view.

Ensuring Cloud Security: What You Might Not Know

When it comes to cloud security, there are a few things that slip our minds.  By: George MateakiIn recent years, cloud storage has become more popular with companies. Cloud applications, software, and...

View Article

Image may be NSFW.
Clik here to view.

HIPAA Security Rule: Fulfilling Requirements and Addressing Healthcare...

Most healthcare organizations follow the Privacy Rule, but tend to struggle with fulfilling the Security Rule’s requirements.   Did you know that only 77% of healthcare organizations require both...

View Article


Image may be NSFW.
Clik here to view.

Picking Your Vulnerability Scanner: The Questions You Should Ask

What you need to know about picking the right vulnerability scan tool for your organization.  Not all vulnerability scanners are created equal, and despite what many think, there isn’t a “one size fits...

View Article

Image may be NSFW.
Clik here to view.

Five Things to Consider When Making a HIPAA Security Budget

When it comes to security, many healthcare entities are at a loss on what to budget. By: Brand BarneyHow much do you budget for data security? $1,000? $30,000 . . . more? Unfortunately, many healthcare...

View Article

Image may be NSFW.
Clik here to view.

How to Prepare for a PCI DSS Audit

When it comes to PCI audits, being prepared is the key, but what should you do before your auditor shows up? Let’s face it, does anybody like doing audits? They can be a headache for anyone involved....

View Article


Image may be NSFW.
Clik here to view.

Physical Security: What You Aren’t Thinking About

Often it’s the little security issues we overlook that hurt us the most.    By: Brand BarneySecurity cameras? Check. Guards? Check. Locked doors? Check. Privacy monitors? Umm . . .When it comes to data...

View Article


Image may be NSFW.
Clik here to view.

Case Studies for PCI Compliance Solutions

SecurityMetrics PCI solution testimonials from real businesses like you. Many businesses have experienced difficulty understanding what to do to reach compliance with the PCI DSS. Consumer payment data...

View Article

Image may be NSFW.
Clik here to view.

10 Tips for Increasing IT Budget and Security Buy-In

Is your security budget constantly challenged? Let’s change that. By: Joe RivestThe problem with IT security is getting people to understand IT security. It’s not that people don’t care about...

View Article

Image may be NSFW.
Clik here to view.

What is HIPAA Compliance, and How Long Will It Take?

HIPAA is a process, not a destination . . . but it doesn’t hurt to know your timeframe.By: Thomas McCroryHIPAA, or the Health Insurance Portability and Accountability Act, is a set of guidelines...

View Article

Image may be NSFW.
Clik here to view.

Top 10 Network Security Audit Fails

PCI DSS assessment issues haven’t changed in years. By: Gary GloverBack in 2011, I gave a presentation on the top 10 security issues I saw during hundreds of PCI DSS network security audits. Guess...

View Article


Image may be NSFW.
Clik here to view.

How to Confront Hospital Ransomware

Don’t let your patients’ medical records be taken hostage.By David EllisRansomware is one of the fastest growing malware versions to grab the attention of cybercriminals worldwide (attacks grew 113% in...

View Article

Image may be NSFW.
Clik here to view.

Spotting Vulnerabilities – Is Vulnerability Scanning Antiquated?

Just how helpful is vulnerability scanning today?  This blog was originally featured as an article in Hospitality Upgrade. By: Brand BarneyI often hear, “Isn’t vulnerability scanning outdated?” from my...

View Article


Image may be NSFW.
Clik here to view.

How to Prepare for a HIPAA Audit

Preparing some documents beforehand will make your HIPAA audit much more pleasant.Check out the infographic here. By: Brand BarneyThe OCR has scheduled you for a HIPAA audit, and you’re panicking. What...

View Article

Image may be NSFW.
Clik here to view.

6 Ways to Make Data Security Consistent in Your Business

When it comes to data security, your company should be on the same page.By: Mike ReisenSo you get it; data security is important. You’ve addressed many elements of security, like install firewalls and...

View Article


Image may be NSFW.
Clik here to view.

Intrusion Detection System: The Missing Component in Healthcare Data Security

The #1 most important piece of a data loss prevention method? An intrusion detection system.By: Brand BarneyLet’s face it. It’s an absolute struggle to protect patient data in today’s healthcare...

View Article

Image may be NSFW.
Clik here to view.

Staying Compliant: Visa’s New Level 4 Requirements

It’s not just the large merchants that need to be compliant. By: David MeyersAccording to a recent announcement, Visa will now require all Level 4 merchants in the US and Canada to validate PCI DSS...

View Article

Image may be NSFW.
Clik here to view.

How to Meet HIPAA Documentation Requirements

A HIPAA document is more than a policy. It’s proof you care to safeguard patient data.By: Brand BarneyA massive chunk of your HIPAA compliance process should be spent recording what you’ve completed....

View Article
Browsing all 384 articles
Browse latest View live