5 Tips to Boost Your Business’s Physical Security
Learn how you can improve your business’s physical security to protect your data. By: Michael MaughanWhat’s the first thing you think of when you hear the word data security? You may think of...
View Article5 Things Your Incident Response Plan Needs
Find out some of the essentials to include in your incident response plan. By: David EllisDirector of Forensic InvestigationsCISSP, QSA, PFIPreviously, we outlined 6 first-steps in creating an...
View ArticlePCI DSS Supplemental Guide to Scope: Understanding PCI DSS Scope and...
Learn how the PCI SSC's guidance helps define scope and segmentation. By: Jen StoneSecurity AnalystCISSP, QSAIn December, 2016, the PCI Security Standards Council (SSC) released a supplemental guide...
View ArticleSAQ B: What Your Business Needs to Do
Learn who qualifies for the SAQ B, and tips to filling it out. By: George MateakiSecurity AnalystCISSP, QSASAQ B was developed to address requirements for merchants who process cardholder data through...
View ArticleHow Healthcare Security Complacency is Killing Your Organization
Healthcare is in serious security trouble if something isn’t done soon. By: Brand BarneySecurity AnalystCISSP, QSAWhen you think of the biggest threat to healthcare security, what do you picture? Do...
View ArticlePCI Requirement 4: Securing Your Networks
Learn how to protect stored and transmitted card data. By: George MateakiSecurity AnalystCISSP, QSAWhat do you do with your card data once you receive it? How is it transmitted to other areas? Are you...
View Article6 Phases in the Incident Response Plan
Learn the 6 phases to managing a data breach. By: David EllisDirector of Forensic InvestigationsQSA, CISSP, PFIAn incident response plan should be set up to address a suspected data breach in a series...
View ArticleSecure Data Deletion: Permanently Deleting PHI in Healthcare
Learn how to dispose of sensitive data securely.By: Ryan MarshallHIPAA Fulfillment ManagerHCISPPDid you know hackers can often find data that you’ve “deleted,” and exploit it? Not properly deleting...
View ArticleTop 10 PCI SAQ Areas Where Merchants Struggled
See where merchants had the most trouble with PCI compliance in 2016. By: George MateakiSecurity AnalystCISSP, QSATo learn more about PCI compliance, read the 2017 SecurityMetrics Guide to PCI...
View ArticlePCI Scope Categories: Keeping Your Card Data Separate
Learn what scope categories your systems fall into. By: Michael SimpsonPrincipal Security AnalystQSA, CISSPWhen it comes to PCI DSS scope, many businesses can feel a little confused about what to...
View ArticleSAQ B-IP: Protecting Your Card Data
Learn who qualifies for SAQ B-IP and what you need to do get compliant. By: Michael SimpsonPrincipal Security AnalystQSA, CISSPSAQ B-IP addresses merchants that don’t store card data in electronic...
View ArticlePCI Requirement 5: Protecting Your System with Anti-Virus
Learn what you need to know about anti-virus software. By: George MateakiSecurity AnalystCISSP, QSANeed help with PCI compliance? Read the SecurityMetrics 2017 Guide to PCI DSS ComplianceDo your...
View ArticlePCI Done Right: Talk about PCI at TRANSACT17!
Win a DJI Phantom 3 Drone, get some sweet SecurityMetrics swag, and get questions answered by our QSAs and security experts!Who’s excited for TRANSACT this year? We definitely are! This year, we...
View Article2017 PANscan Study: How to Better Protect Your Card Data
See how much unencrypted card data PANscan found on business networks in 2016. By: George MateakiSecurity AnalystCISSP, QSAWant to see how businesses did with card data in 2016? Check out our...
View ArticleNew 3.2 Requirements for Service Providers: What You Should Know
Learn what new requirements service providers will need to fulfill. By: Christopher SkardaSecurity AnalystCISSP, QSAPCI DSS 3.2 introduced several new requirements for service providers. Until January...
View ArticleSAQ C-VT: The Basics You Should Know
Learn who qualifies for SAQ C-VT and what requirements apply.By: Michael SimpsonPrincipal Security AnalystQSA, CISSPSAQ C-VT addresses requirements applicable to merchants who process cardholder data...
View ArticleWannaCrypt Ransomware Attacks: What You Should Do
Learn more about the recent ransomware attacks and how you should respond. By: Steve SnelgroveSecurity AnalystCISSPYou may have heard about the massive cyber-attack that happened on Friday, involving...
View ArticleTRANSACT17 Conference: Wrap-up
Successful show, awesome people, great discussions!Once again, TRANSACT17 was a remarkable conference! We met some fantastic people, saw some awesome booths, attended some inspirational presentations,...
View ArticlePCI Requirement 6: Updating Your Systems
See why updating and patching your systems is crucial to security. George MateakiSecurity AnalystCISSP, QSARequirement 6 deals with consistently updating your systems and patching any vulnerabilities...
View ArticleNew Multi-Factor Authentication Clarification and Supplement: The Principles...
Learn more about the multi-factor authentication that is required of your business operations. By: Christopher SkardaSecurity AnalystQSA, CISSPMulti-factor authentication (MFA) can be used to enhance...
View Article