Blog

The 2021 Guide to PCI DSS Compliance Has Launched

The PCI Guide includes interactive and printable IT checklists for every requirement, stories and tips from our security analysts (QSAs), forensic data breach research data, as well as the latest updates on PCI DSS compliance.

SecurityMetrics Podcast: The Latest in Cybersecurity and Compliance

The SecurityMetrics Podcast is a weekly podcast with regular host and Principal Security Analyst Jen Stone (MCIS, CISSP, CISA, QSA), along with a variety of experts in the data security and compliance space.

SecurityMetrics' 2020 Guide to HIPAA Compliance Has Launched

We create and publish our HIPAA Guide each year: to give healthcare IT and HIPAA leaders an up-to-date resource to direct and focus their HIPAA compliance efforts to the areas that are quick and impactful.

Something from Nothing; a Pentest Story

While performing an external network layer penetration test I encountered a host that presented a single page that was essentially blank...

SecurityMetrics' Top Blogs of 2018

These top SecurityMetrics blog posts help you understand and implement some of the most foundational data protection principles. Our goal it to help you close gaps in security and avoid a data breach in 2019.

The Importance of Cybersecurity: SecurityMetrics' Free Academy

The importance of cybersecurity: SecurityMetrics Academy is a free educational course designed for anyone who wants to learn about data security.

SecurityMetrics Customer Reviews

Here’s what our customers have to say about working with us.

Why Encryption is (Sometimes) Not Enough

There’s only one way to avoid leaving ten-second holes in security. Encrypt card data at the exact millisecond of collection.

You Can't Hide Behind a HIPAA Business Associate Agreement

Covered entities don’t have the option to hide behind BAA if a Health and Human Services (HHS) auditor comes knocking.

Security Blunder Case Studies

Businesses around the world call us in a panic, needing to decipher what went wrong with their security.

What To Do If Your Business Is Hacked

Learn what to do when you are hacked (or suspect you’ve been hacked).

Your HIPAA Privacy Requirements Might Not Be Completed

Understand HIPAA Privacy and Security Rules, and how they apply to your organization.

Resolved: Does HIPAA Compliance Satisfy Meaningful Use?

Many healthcare professionals don’t completely understand how the specific requirements of HIPAA and Meaningful Use relate.

Providers Should Work Toward Increased Data Security in 2015

The first step in preparing for a HIPAA audit is to create a detailed compliance plan.

Workload Overlap Between HIPAA and Meaningful Use

All stages of Meaningful Use include some element of a risk analysis and data security.

Win Your Healthcare Security Marathon in 7 Steps

Getting HIPAA compliant is kind of like training to run a marathon.

Remote Access Attacks: How to Protect Against Malware

Protect against remote access attacks by employing the following PCI DSS requirements.

Prioritizing HIPAA for Protected Health Information: 101

Taking a prioritized approach to your HIPAA compliance efforts.

SecurityMetrics PCI Support FAQ

The most commonly PCI support asked questions about our PCI compliance product.

Printer Security: Does Your Device Let Hackers In?

Network-enabled printers may contain very sensitive information about your internal network.

Picking Your Vulnerability Scanner: The Questions You Should Ask

Here are some questions you need to ask about your business and about your potential vulnerability scanner.

Where Did that Request Come From? CVE-2020-11682 (CSRF)

What is CSRF? Cross site request forgery, commonly referred to as CSRF (pronounced sea-surf), is an attack in which a user who is authenticated to an application is tricked into unintentionally performing a state-changing action.

Recording Your QIR: SecurityMetrics' New QIR Feature

Here’s what you need to know about QIRs and how SecurityMetrics is addressing Visa’s mandate.