Quantcast
Channel: SecurityMetrics Blog
Browsing all 384 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Shellshock: Be Wary, But Don’t Panic

Hundreds of millions are vulnerable. The questions is, how many are actually exploitable? On September 24, a new bug was reported that you may have heard about. Shellshock, also known as the Bash Bug,...

View Article


Image may be NSFW.
Clik here to view.

HIMSS Privacy and Security Forum Takeaways

A successful security program is all about managing risk. By: Tod FerranI had the opportunity to attend the Healthcare IT News/HIMSS Media Privacy & Security Forum in Boston. The speakers presented...

View Article


Image may be NSFW.
Clik here to view.

5 Most Bizarre HIPAA Breaches of 2013

Learn simple security protocols to protect patient data. This article is an excerpt from our ebook, 5 Most Bizarre HIPAA Breaches. Download your free copy of the complete ebook.As one of the industry’s...

View Article

Image may be NSFW.
Clik here to view.

7 Hearty Tips to Avoid Costly Data Breaches

Deterring hackers with simple security precautions. By: Brand BarneySmall to midsize merchants often trust that their modest size will allow them to slip below hacker radar. Sadly, trends show hackers...

View Article

Image may be NSFW.
Clik here to view.

You May Not Be Done With Your HIPAA Requirements

Understand HIPAA Privacy and Security Rules, and how they apply to your organization. By: Tod FerranWhen you think about Health Insurance Portability and Accountability Act (HIPAA) compliance, you may...

View Article


Image may be NSFW.
Clik here to view.

Plug-and-Play POS: Can It Ever Be Secure?

Tackling the microwave nation mentality. By: Brand BarneyAs a microwave nation, we have a very plug-and-play mentality when it comes to electronics and devices. When my morning coffee takes longer than...

View Article

Image may be NSFW.
Clik here to view.

A 21-Day Plan for HIPAA Compliance

Spend 10 minutes a day to increase your security. By: Tod FerranThis article was also featured in PAHCOM Journal: Finding Time for HIPAA: A 21 Day PlanAfter being tasked with making sure your office...

View Article

Image may be NSFW.
Clik here to view.

7 Security Questions to Ask Your POS Installer

Don’t let a sloppy job ruin your business security. By: Brand BarneyPoint of sale (POS) companies, while very skilled at installing systems, are generally not well versed in security. This can lead to...

View Article


Image may be NSFW.
Clik here to view.

What Are My HIPAA Security Requirements?

A guide to help healthcare organizations understand the HIPAA Security Rule. This article is an excerpt from our ebook, Diagnosing HIPAA Security. To download your free copy of the complete ebook,...

View Article


Image may be NSFW.
Clik here to view.

How Much Does a HIPAA Risk Management Plan Cost?

Clarifying misconceptions about healthcare RMPs. By: Tod FerranThis article was also featured in BC Advantage: “Lessons Learned About HIPAA Risk Management Plans"Many healthcare entities haven’t yet...

View Article

Image may be NSFW.
Clik here to view.

The Ineffectiveness of Antivirus

Don’t let antivirus be your permeable safety blanket. By: Gary GloverAntivirus is the safety blanket computer users and businesses have used for decades. They trust it. They swear by it. Gartner...

View Article

Image may be NSFW.
Clik here to view.

2014 HIPAA Compliance Trends

What do survey statistics say about healthcare’s attitude toward HIPAA? By: Tod FerranNot many studies have been done on HIPAA and how it’s been applied in healthcare. Especially among smaller...

View Article

Image may be NSFW.
Clik here to view.

The Ultimate Guide to PCI DSS 3.0

A List of Our Most-Viewed PCI 3.0 Resources. Now that the PCI DSS standard has changed with new Self-Assessment Questionnaire (SAQ) questions and clarifications, merchants may no longer be in...

View Article


Image may be NSFW.
Clik here to view.

How HIPAA Compliance Applies to Mental Health Professionals

A conversation about HIPAA compliance.By: Tod FerranI had the pleasure of being interviewed by Kathleen Mills of Life Tree Counseling on her podcast, It’s Just Coffee. We discussed an overview of...

View Article

Image may be NSFW.
Clik here to view.

HIPAA Workforce Member Training for Healthcare Staff: Why It’s Essential

Employees are forgetful. Training helps them remember important security practices. By: Tod FerranIf you think your workforce members know how to secure patient data, you are sadly mistaken. Just take...

View Article


Image may be NSFW.
Clik here to view.

Auditing Archives: The Case of the File-Sharing Franchisee

Linking 100 restaurants through one insecure server connection is a bad idea. By: Gary GloverThe following post is a segment in the Auditing Archives series. Hopefully the security failures I’ve seen...

View Article

Image may be NSFW.
Clik here to view.

Welcome to SecurityMetrics Blog!

Learn to secure your business on this blog. Welcome readers! Fancy meeting you here! You’ve reached SecurityMetrics Blog, the data security educational center of SecurityMetrics, a company focused on...

View Article


Image may be NSFW.
Clik here to view.

Resolved: Does HIPAA Compliance Satisfy Meaningful Use?

How do Meaningful Use requirements overlap with HIPAA compliance requirements?By: Tod FerranCan you tell the difference between HIPAA and Meaningful Use regulations? You’re not the only one struggling...

View Article

Image may be NSFW.
Clik here to view.

3 PCI DSS 3.0 Themes

The main security topics to lead us into 2015. By GilesWitherspoon-BoydThis article was also featured in Multi-Unit Franchisee.Hopefully you’ve heard that the Payment Card Industry Data Security...

View Article

Image may be NSFW.
Clik here to view.

GHOST Vulnerability…Not That Scary

Who it affects, how hackers could use it, and what you should do about it. The recently discovered GHOST vulnerability is a bug that could potentially allow a buffer overflow in Linux systems. Sounds...

View Article
Browsing all 384 articles
Browse latest View live