Healthcare – Plant Your Feet On the Road to HIPAA Compliance
If your compliance program is based solely on privacy, your program is severely lacking. By: Tod FerranWho’s to blame for healthcare’s security disaster? The fact is, most healthcare entities know...
View Article5 Things The Payments Industry Should Watch For in 2015
Emerging threats that will shape the future of the payments industry. This post is a sampling from our ebook, 5 Things the Payments Industry Should Watch For in 2015. Download your free copy of the...
View ArticleThe 7 Things That Prevent Dental Practice Growth
Why are certain dental practices more successful than others? By: Dr. Mayer LevittIn October of 2014, my wife and I went on a bucket list trip to Berlin and Normandy to view the city’s transformation...
View ArticleVisa PCI Enforcement Rules in 2015
More breaches indicate it’s time to crack down on big merchant security. By: Gary GloverVisa released a bulletin in October announcing their PCI DSS validation enforcement plan for merchants and...
View ArticleProviders Should Work Toward Increased Data Security in 2015
Don’t let security take a backseat to other major initiatives like ICD-10 and Meaningful Use. By: Caleb ClarkeOver the past decade, healthcare providers across the country have steadily adopted...
View Article5 P2PE Trends in 2015
How big will P2PE’s wings grow this year? By: Brandon BensonPoint-to-Point-Encryption (P2PE) is a crucial part of payment security that the PCI Council recommends for all merchants. For more...
View ArticleWhat Are HIPAA Compliant System Logs?
Audit logs make it easier to detect problems in organizational security. By: Tod FerranSystem logs are part of HIPAA compliance and specifically mentioned in two different requirements. System event...
View ArticleFree SecurityMetrics PCI Compliance Demo
SecurityMetrics PCI 3.0 solution simplifies, syndicates, and standardizes. We made a bunch of great changes to our customer PCI validation portal to accommodate for PCI version 3.0. Even though PCI 3.0...
View Article7 HIPAA Myths and Misunderstandings, Debunked
Don’t fall prey to these common HIPAA misunderstandings. By: Tod FerranWhen was the last time you researched HIPAA compliance? You may have seen the latest HIPAA news on the HHS website, heard...
View Article7 Internal Communication Best Practices for IT Security
Hurt feelings, techspeak, and process errors all lead to compromise.By: Brand BarneyLack of interdepartmental communication is ruining your security. And not just yours. Everyone’s. This problem spans...
View ArticleThe Pros and Cons of an Onsite HIPAA Audit
Is a HIPAA audit right for your organization? By: Tod FerranEver wondered how HIPAA compliant your organization actually is? Are you struggling with the implementation of certain HIPAA requirements?...
View ArticleCommon HIPAA Violations Quiz Shows You Where You Stand
A short look into your organization’s PHI security. By: Tod FerranThis article was also featured in Compliance Today: “How Group Health Plans can ensure HIPAA Compliance"HIPAA security auditors like me...
View ArticleShould You FREAK Out About The Newest SSL/TLS Exploit?
Who it affects, how hackers could use it, and what you should do about it. On March 3, 2015, a new exploit related to an old SSL/TLS vulnerability was discovered and dubbed FREAK (CVE-2015-0204). It’s...
View ArticleHow Does Network Segmentation Affect PCI DSS Scope?
Isolating your network can increase your security. By: Gary GloverA key way to limit your exposure to hackers is to segment your network so credit card data and the systems that process, transmit, and...
View ArticleSecurityMetrics Customer Reviews
What do our customers have to say about us? Over the years, we’ve had the chance to work with a lot of cool companies. Here’s what they have to say about working with us.Jump to Data Security...
View ArticleMemory Scrapers, Keyloggers, and Sniffers Oh My!
All sorts of malware cause all sorts of trouble.By: Brand BarneyMalware is any type of software that tries to gather your sensitive data or maliciously gain complete access. There are all sorts of...
View ArticleWorkload Overlap Between HIPAA and Meaningful Use
Can you kill two birds with one stone? This article is an excerpt from our downloadable ebook, How to Leverage HIPAA for Meaningful Use.As most of you know, covered entities that handle protected...
View ArticleElevate Your Data Security at TRANSACT15!
Win a mini-quadcopter, get a sweet t-shirt, and get questions answered by our security experts! Who’s excited for TRANSACT this year? SecurityMetrics is! You’re probably all wondering what crazy game...
View ArticleWhat To Do When You Get Hacked, Step-By-Step
The step-by-step process if you suspect a breach. By: David EllisYou will typically learn you’ve been breached in one of three ways. You find out about it internally (via IDS logs, event logs, alerting...
View Article7 Steps to Win Your HIPAA Security Marathon
Whipping healthcare’s patient data security into shape.By: Brand BarneyMost people trying to get in shape don’t like looking in the mirror because all they see is an impossible task ahead of them. Some...
View Article