Danger Will Robinson! 61% of Businesses Don’t Protect Customer Cards
Annual report shows customer payment card data still not protected. Businesses continue to struggle with their unencrypted storage of customer credit and debit cards. In SecurityMetrics’ fourth annual...
View ArticleHIPAA Security vs. EHR Security
Your EHR HIPAA compliance doesn’t cover your entity’s entire security strategy. By: Tod FerranThe article was originally featured by Healthcare IT News.Electronic health record (EHR) systems are...
View ArticleHow Much Does HIPAA Compliance Cost?
Realistic HIPAA security budgets vs. wishful thinking. By: Tod FerranHIPAA is not nearly given the budget it requires to be adequately implemented for complete patient data security. And I’m not just...
View ArticleTRANSACT15 Conference: Wrapup
Successful show, awesome people, fun games! Once again, TRANSACT15 was a remarkable conference! We met some great people, saw some awesome booths, attended some inspirational presentations, and had a...
View ArticlePCI Audit Alphabet Soup: De-Jumbling the Jargon
What do all those acronyms stand for anyway? By: Gary GloverAcronyms in the payment card industry are pervasive, to say the least. You may come across them in actual PCI DSS documents created by the...
View ArticleHow to Start a HIPAA Risk Analysis
A step-by-step process and template to help you start along your risk analysis journey. By: Tod FerranLooking for the HIPAA risk analysis template? A risk analysis is the first step in an...
View ArticleHow Much Does Penetration Testing (Pen Test) Cost?
Ethical hacking. It’s a great way to discover where your business security fails. By: Gary GloverYour company may have the technology in place to prevent data theft, but is it enough? How do you prove...
View ArticlePCI 3.1: Stop Using SSL and Outdated TLS Immediately
“SSL has been removed as an example of strong cryptography in the PCI DSS, and can no longer be used as a security control after June 30, 2016.” By: Gary GloverThe PCI DSS has released an unscheduled...
View ArticleHow to Find Time for HIPAA Compliance
Simple patient data security doesn’t have to be time consuming. Time-wise, HIPAA compliance is about maximizing the little time you have. Here are a few things you can do at your organization that will...
View ArticleA Buyer’s Guide to HIPAA Compliance
Which HIPAA compliance company is right for you? By: Tod FerranGetting a third party’s assistance is often less work and cost than trying to comply with HIPAA yourself. The question is…how do you...
View ArticleHow to Reduce PCI DSS Scope
Scope reduction often implies work and cost reduction. By: Matt HalbleibTo view this post in its original format, watch the Reduce Your PCI Scope webinarSo, you want to reduce your PCI scope? Perhaps...
View ArticleRemote Access: The Culprit Behind POS Malware
Free password cracking tools make it easy for hackers to break remote access applications. By: Brandon BensonThis article was originally featured by MasterCard Security Matters.According to the U.S....
View Article10 Crucial HIPAA Reads
Content our readers love to read. Because of its complexity and technicality, there’s never a shortage of questions about HIPAA. That’s why we started this blog; to answer the most confusing parts of...
View Article10 PCI Myths and Misunderstandings
The underlying security principles of PCI are alive and well. By: Brand BarneyThere is a lot of great information about PCI out there. But there are also a lot of misconceptions. Here are the 10 worst...
View ArticleBusiness Associates and HIPAA: Who’s Really Responsible?
Either manage your business associate security, or prepare for a data breach. By: Tod FerranWith new Health Insurance Portability and Accountability Act (HIPAA) regulations in place, healthcare...
View ArticlePentesting vs Vulnerability Scanning: What’s the Difference?
Two very different ways to test your systems for vulnerabilities. By: Gary GloverPenetration testing and vulnerability scanning are often confused for the same service. The problem is, business owners...
View ArticlePrioritizing HIPAA: 101
Prioritization: the best HIPAA security strategy. By: Tod FerranThis article was originally written for, and distributed to the members of AAPC.Taking a prioritized approach to HIPAA compliance is the...
View ArticleLatest SSL Vulnerability: Logjam
What does Logjam mean for your business?Follow up investigations on the FREAK vulnerability have led to the discovery of yet another SSL encryption protocol vulnerability: Logjam. According to...
View Article5 Step HIPAA Risk Analysis Sample
Learn the simplest way to conduct a risk analysis. Most healthcare entities understand they are required to conduct an accurate and thorough assessment of their potential risks and vulnerabilities in...
View ArticlePatient Portals Secure PHI Better Than Email
Security isn’t the only benefit of a robust patient portal.By: Caleb ClarkeAs the healthcare industry continues to implement new technology, security will remain a major concern. Whether it’s due to...
View Article