Quantcast
Channel: SecurityMetrics Blog
Browsing all 384 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

5 Tips to Boost Your Business’s Physical Security

Learn how you can improve your business’s physical security to protect your data.  By: Michael MaughanWhat’s the first thing you think of when you hear the word data security? You may think of...

View Article


Image may be NSFW.
Clik here to view.

5 Things Your Incident Response Plan Needs

Find out some of the essentials to include in your incident response plan.  By: David EllisDirector of Forensic InvestigationsCISSP, QSA, PFIPreviously, we outlined 6 first-steps in creating an...

View Article


Image may be NSFW.
Clik here to view.

PCI DSS Supplemental Guide to Scope: Understanding PCI DSS Scope and...

Learn how the PCI SSC's guidance helps define scope and segmentation.  By: Jen StoneSecurity AnalystCISSP, QSAIn December, 2016, the PCI Security Standards Council (SSC) released a supplemental guide...

View Article

Image may be NSFW.
Clik here to view.

SAQ B: What Your Business Needs to Do

Learn who qualifies for the SAQ B, and tips to filling it out.  By: George MateakiSecurity AnalystCISSP, QSASAQ B was developed to address requirements for merchants who process cardholder data through...

View Article

Image may be NSFW.
Clik here to view.

How Healthcare Security Complacency is Killing Your Organization

Healthcare is in serious security trouble if something isn’t done soon. By: Brand BarneySecurity AnalystCISSP, QSAWhen you think of the biggest threat to healthcare security, what do you picture? Do...

View Article


Image may be NSFW.
Clik here to view.

PCI Requirement 4: Securing Your Networks

Learn how to protect stored and transmitted card data. By: George MateakiSecurity AnalystCISSP, QSAWhat do you do with your card data once you receive it? How is it transmitted to other areas? Are you...

View Article

Image may be NSFW.
Clik here to view.

6 Phases in the Incident Response Plan

Learn the 6 phases to managing a data breach. By: David EllisDirector of Forensic InvestigationsQSA, CISSP, PFIAn incident response plan should be set up to address a suspected data breach in a series...

View Article

Image may be NSFW.
Clik here to view.

Secure Data Deletion: Permanently Deleting PHI in Healthcare

Learn how to dispose of sensitive data securely.By: Ryan MarshallHIPAA Fulfillment ManagerHCISPPDid you know hackers can often find data that you’ve “deleted,” and exploit it? Not properly deleting...

View Article


Image may be NSFW.
Clik here to view.

Top 10 PCI SAQ Areas Where Merchants Struggled

See where merchants had the most trouble with PCI compliance in 2016. By: George MateakiSecurity AnalystCISSP, QSATo learn more about PCI compliance, read the 2017 SecurityMetrics Guide to PCI...

View Article


Image may be NSFW.
Clik here to view.

PCI Scope Categories: Keeping Your Card Data Separate

Learn what scope categories your systems fall into. By: Michael SimpsonPrincipal Security AnalystQSA, CISSPWhen it comes to PCI DSS scope, many businesses can feel a little confused about what to...

View Article

Image may be NSFW.
Clik here to view.

SAQ B-IP: Protecting Your Card Data

Learn who qualifies for SAQ B-IP and what you need to do get compliant. By: Michael SimpsonPrincipal Security AnalystQSA, CISSPSAQ B-IP addresses merchants that don’t store card data in electronic...

View Article

Image may be NSFW.
Clik here to view.

PCI Requirement 5: Protecting Your System with Anti-Virus

Learn what you need to know about anti-virus software. By: George MateakiSecurity AnalystCISSP, QSANeed help with PCI compliance? Read the SecurityMetrics 2017 Guide to PCI DSS ComplianceDo your...

View Article

Image may be NSFW.
Clik here to view.

PCI Done Right: Talk about PCI at TRANSACT17!

Win a DJI Phantom 3 Drone, get some sweet SecurityMetrics swag, and get questions answered by our QSAs and security experts!Who’s excited for TRANSACT this year? We definitely are! This year, we...

View Article


Image may be NSFW.
Clik here to view.

2017 PANscan Study: How to Better Protect Your Card Data

See how much unencrypted card data PANscan found on business networks in 2016. By: George MateakiSecurity AnalystCISSP, QSAWant to see how businesses did with card data in 2016? Check out our...

View Article

Image may be NSFW.
Clik here to view.

New 3.2 Requirements for Service Providers: What You Should Know

Learn what new requirements service providers will need to fulfill.  By: Christopher SkardaSecurity AnalystCISSP, QSAPCI DSS 3.2 introduced several new requirements for service providers. Until January...

View Article


Image may be NSFW.
Clik here to view.

SAQ C-VT: The Basics You Should Know

Learn who qualifies for SAQ C-VT and what requirements apply.By: Michael SimpsonPrincipal Security AnalystQSA, CISSPSAQ C-VT addresses requirements applicable to merchants who process cardholder data...

View Article

Image may be NSFW.
Clik here to view.

WannaCrypt Ransomware Attacks: What You Should Do

Learn more about the recent ransomware attacks and how you should respond. By: Steve SnelgroveSecurity AnalystCISSPYou may have heard about the massive cyber-attack that happened on Friday, involving...

View Article


Image may be NSFW.
Clik here to view.

TRANSACT17 Conference: Wrap-up

Successful show, awesome people, great discussions!Once again, TRANSACT17 was a remarkable conference! We met some fantastic people, saw some awesome booths, attended some inspirational presentations,...

View Article

Image may be NSFW.
Clik here to view.

PCI Requirement 6: Updating Your Systems

See why updating and patching your systems is crucial to security.  George MateakiSecurity AnalystCISSP, QSARequirement 6 deals with consistently updating your systems and patching any vulnerabilities...

View Article

Image may be NSFW.
Clik here to view.

New Multi-Factor Authentication Clarification and Supplement: The Principles...

Learn more about the multi-factor authentication that is required of your business operations. By: Christopher SkardaSecurity AnalystQSA, CISSPMulti-factor authentication (MFA) can be used to enhance...

View Article
Browsing all 384 articles
Browse latest View live