Shellshock: Be Wary, But Don’t Panic
Hundreds of millions are vulnerable. The questions is, how many are actually exploitable? On September 24, a new bug was reported that you may have heard about. Shellshock, also known as the Bash Bug,...
View ArticleHIMSS Privacy and Security Forum Takeaways
A successful security program is all about managing risk. By: Tod FerranI had the opportunity to attend the Healthcare IT News/HIMSS Media Privacy & Security Forum in Boston. The speakers presented...
View Article5 Most Bizarre HIPAA Breaches of 2013
Learn simple security protocols to protect patient data. This article is an excerpt from our ebook, 5 Most Bizarre HIPAA Breaches. Download your free copy of the complete ebook.As one of the industry’s...
View Article7 Hearty Tips to Avoid Costly Data Breaches
Deterring hackers with simple security precautions. By: Brand BarneySmall to midsize merchants often trust that their modest size will allow them to slip below hacker radar. Sadly, trends show hackers...
View ArticleYou May Not Be Done With Your HIPAA Requirements
Understand HIPAA Privacy and Security Rules, and how they apply to your organization. By: Tod FerranWhen you think about Health Insurance Portability and Accountability Act (HIPAA) compliance, you may...
View ArticlePlug-and-Play POS: Can It Ever Be Secure?
Tackling the microwave nation mentality. By: Brand BarneyAs a microwave nation, we have a very plug-and-play mentality when it comes to electronics and devices. When my morning coffee takes longer than...
View ArticleA 21-Day Plan for HIPAA Compliance
Spend 10 minutes a day to increase your security. By: Tod FerranThis article was also featured in PAHCOM Journal: Finding Time for HIPAA: A 21 Day PlanAfter being tasked with making sure your office...
View Article7 Security Questions to Ask Your POS Installer
Don’t let a sloppy job ruin your business security. By: Brand BarneyPoint of sale (POS) companies, while very skilled at installing systems, are generally not well versed in security. This can lead to...
View ArticleWhat Are My HIPAA Security Requirements?
A guide to help healthcare organizations understand the HIPAA Security Rule. This article is an excerpt from our ebook, Diagnosing HIPAA Security. To download your free copy of the complete ebook,...
View ArticleHow Much Does a HIPAA Risk Management Plan Cost?
Clarifying misconceptions about healthcare RMPs. By: Tod FerranThis article was also featured in BC Advantage: “Lessons Learned About HIPAA Risk Management Plans"Many healthcare entities haven’t yet...
View ArticleThe Ineffectiveness of Antivirus
Don’t let antivirus be your permeable safety blanket. By: Gary GloverAntivirus is the safety blanket computer users and businesses have used for decades. They trust it. They swear by it. Gartner...
View Article2014 HIPAA Compliance Trends
What do survey statistics say about healthcare’s attitude toward HIPAA? By: Tod FerranNot many studies have been done on HIPAA and how it’s been applied in healthcare. Especially among smaller...
View ArticleThe Ultimate Guide to PCI DSS 3.0
A List of Our Most-Viewed PCI 3.0 Resources. Now that the PCI DSS standard has changed with new Self-Assessment Questionnaire (SAQ) questions and clarifications, merchants may no longer be in...
View ArticleHow HIPAA Compliance Applies to Mental Health Professionals
A conversation about HIPAA compliance.By: Tod FerranI had the pleasure of being interviewed by Kathleen Mills of Life Tree Counseling on her podcast, It’s Just Coffee. We discussed an overview of...
View ArticleHIPAA Workforce Member Training for Healthcare Staff: Why It’s Essential
Employees are forgetful. Training helps them remember important security practices. By: Tod FerranIf you think your workforce members know how to secure patient data, you are sadly mistaken. Just take...
View ArticleAuditing Archives: The Case of the File-Sharing Franchisee
Linking 100 restaurants through one insecure server connection is a bad idea. By: Gary GloverThe following post is a segment in the Auditing Archives series. Hopefully the security failures I’ve seen...
View ArticleWelcome to SecurityMetrics Blog!
Learn to secure your business on this blog. Welcome readers! Fancy meeting you here! You’ve reached SecurityMetrics Blog, the data security educational center of SecurityMetrics, a company focused on...
View ArticleResolved: Does HIPAA Compliance Satisfy Meaningful Use?
How do Meaningful Use requirements overlap with HIPAA compliance requirements?By: Tod FerranCan you tell the difference between HIPAA and Meaningful Use regulations? You’re not the only one struggling...
View Article3 PCI DSS 3.0 Themes
The main security topics to lead us into 2015. By GilesWitherspoon-BoydThis article was also featured in Multi-Unit Franchisee.Hopefully you’ve heard that the Payment Card Industry Data Security...
View ArticleGHOST Vulnerability…Not That Scary
Who it affects, how hackers could use it, and what you should do about it. The recently discovered GHOST vulnerability is a bug that could potentially allow a buffer overflow in Linux systems. Sounds...
View Article