Quantcast
Channel: SecurityMetrics Blog
Browsing all 384 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Danger Will Robinson! 61% of Businesses Don’t Protect Customer Cards

Annual report shows customer payment card data still not protected. Businesses continue to struggle with their unencrypted storage of customer credit and debit cards. In SecurityMetrics’ fourth annual...

View Article


Image may be NSFW.
Clik here to view.

HIPAA Security vs. EHR Security

Your EHR HIPAA compliance doesn’t cover your entity’s entire security strategy. By: Tod FerranThe article was originally featured by Healthcare IT News.Electronic health record (EHR) systems are...

View Article


Image may be NSFW.
Clik here to view.

How Much Does HIPAA Compliance Cost?

Realistic HIPAA security budgets vs. wishful thinking. By: Tod FerranHIPAA is not nearly given the budget it requires to be adequately implemented for complete patient data security. And I’m not just...

View Article

Image may be NSFW.
Clik here to view.

TRANSACT15 Conference: Wrapup

Successful show, awesome people, fun games! Once again, TRANSACT15 was a remarkable conference! We met some great people, saw some awesome booths, attended some inspirational presentations, and had a...

View Article

Image may be NSFW.
Clik here to view.

PCI Audit Alphabet Soup: De-Jumbling the Jargon

What do all those acronyms stand for anyway? By: Gary GloverAcronyms in the payment card industry are pervasive, to say the least. You may come across them in actual PCI DSS documents created by the...

View Article


Image may be NSFW.
Clik here to view.

How to Start a HIPAA Risk Analysis

A step-by-step process and template to help you start along your risk analysis journey. By: Tod FerranLooking for the HIPAA risk analysis template? A risk analysis is the first step in an...

View Article

Image may be NSFW.
Clik here to view.

How Much Does Penetration Testing (Pen Test) Cost?

Ethical hacking. It’s a great way to discover where your business security fails. By: Gary GloverYour company may have the technology in place to prevent data theft, but is it enough? How do you prove...

View Article

Image may be NSFW.
Clik here to view.

PCI 3.1: Stop Using SSL and Outdated TLS Immediately

“SSL has been removed as an example of strong cryptography in the PCI DSS, and can no longer be used as a security control after June 30, 2016.” By: Gary GloverThe PCI DSS has released an unscheduled...

View Article


Image may be NSFW.
Clik here to view.

How to Find Time for HIPAA Compliance

Simple patient data security doesn’t have to be time consuming. Time-wise, HIPAA compliance is about maximizing the little time you have. Here are a few things you can do at your organization that will...

View Article


Image may be NSFW.
Clik here to view.

A Buyer’s Guide to HIPAA Compliance

Which HIPAA compliance company is right for you? By: Tod FerranGetting a third party’s assistance is often less work and cost than trying to comply with HIPAA yourself. The question is…how do you...

View Article

Image may be NSFW.
Clik here to view.

How to Reduce PCI DSS Scope

Scope reduction often implies work and cost reduction. By: Matt HalbleibTo view this post in its original format, watch the Reduce Your PCI Scope webinarSo, you want to reduce your PCI scope? Perhaps...

View Article

Image may be NSFW.
Clik here to view.

Remote Access: The Culprit Behind POS Malware

Free password cracking tools make it easy for hackers to break remote access applications. By: Brandon BensonThis article was originally featured by MasterCard Security Matters.According to the U.S....

View Article

Image may be NSFW.
Clik here to view.

10 Crucial HIPAA Reads

Content our readers love to read. Because of its complexity and technicality, there’s never a shortage of questions about HIPAA. That’s why we started this blog; to answer the most confusing parts of...

View Article


Image may be NSFW.
Clik here to view.

10 PCI Myths and Misunderstandings

The underlying security principles of PCI are alive and well. By: Brand BarneyThere is a lot of great information about PCI out there. But there are also a lot of misconceptions. Here are the 10 worst...

View Article

Image may be NSFW.
Clik here to view.

Business Associates and HIPAA: Who’s Really Responsible?

Either manage your business associate security, or prepare for a data breach. By: Tod FerranWith new Health Insurance Portability and Accountability Act (HIPAA) regulations in place, healthcare...

View Article


Image may be NSFW.
Clik here to view.

Pentesting vs Vulnerability Scanning: What’s the Difference?

Two very different ways to test your systems for vulnerabilities. By: Gary GloverPenetration testing and vulnerability scanning are often confused for the same service. The problem is, business owners...

View Article

Image may be NSFW.
Clik here to view.

Prioritizing HIPAA: 101

Prioritization: the best HIPAA security strategy. By: Tod FerranThis article was originally written for, and distributed to the members of AAPC.Taking a prioritized approach to HIPAA compliance is the...

View Article


Image may be NSFW.
Clik here to view.

Latest SSL Vulnerability: Logjam

What does Logjam mean for your business?Follow up investigations on the FREAK vulnerability have led to the discovery of yet another SSL encryption protocol vulnerability: Logjam. According to...

View Article

Image may be NSFW.
Clik here to view.

5 Step HIPAA Risk Analysis Sample

Learn the simplest way to conduct a risk analysis. Most healthcare entities understand they are required to conduct an accurate and thorough assessment of their potential risks and vulnerabilities in...

View Article

Image may be NSFW.
Clik here to view.

Patient Portals Secure PHI Better Than Email

Security isn’t the only benefit of a robust patient portal.By: Caleb ClarkeAs the healthcare industry continues to implement new technology, security will remain a major concern. Whether it’s due to...

View Article
Browsing all 384 articles
Browse latest View live