Blog

Forensic Files: The Case of the Stockpiled Credit Cards

Hopefully, you'll realize some actions you should take to ensure your own business’ security.

Auditing Archives: The Case of the Overly Helpful Front Desk Clerk

Front desk clerks are friendly…sometimes to a fault, but friendly doesn’t necessarily equal secure.

Fire, Shred, Pulp: How to Properly Destroy Sensitive Documents

The HHS says shredding, burning, pulping, and pulverizing are the only way these records should be destroyed.

Front Desk Security: Eliminate Internet Browsing on Check-In Machines

Can customer service and front desk security co-exist?

Balancing Mobile Convenience and PHI Security

Some falsely assume because mobile devices are technologically advanced and marketed as ‘secure’, PHI will automatically be protected.

Current Hacking Trends: Remote Access

To help further the fight against fraudsters and data thieves, the SecurityMetrics Forensic Investigation team has identified several common attack types associated with recent breaches.

Cross-Site Scripting, Explained

Cross-site scripting allows bad guys to embed malicious code into a legitimate website to ultimately steal user data.

Crucial Security Advisory: Patch Windows Immediately Against WinShock

When an exploit for WinShock is released, SecurityMetrics will work to include a check for the vulnerability in its vulnerability scanning engine.

Healthcare – Plant Your Feet On the Road to HIPAA Compliance

Please educate yourself and your organization on the technology perils of our day.

GHOST Vulnerability…Not That Scary

If you have any questions, please contact SecurityMetrics support, 801.705.5700.

Does HIPAA Apply to Me? 7 HIPAA Myths and Misunderstandings

Don’t fall prey to these common HIPAA misunderstandings.

Free SecurityMetrics PCI Compliance Demo

Learn about changes to our customer PCI validation portal to accommodate for PCI version 3.0

EMV Security, Is It Hackable?

It's untrue that any technology is absolutely unhackable.

Do You Know Where You Store Card Data? Unencrypted Credit Card Data Storage

Unencrypted credit card data is hiding on your network

Free HIPAA Compliance Software Demo

This HIPAA compliance software is easy to update and doubles as a documentation tool.

Healthcare: Recognize Social Engineering Techniques

Don’t let human hackers disorient your employees.

Five Things to Consider When Making a HIPAA Security Budget

Having the proper security budget protects not just your organization, but your patients as well.

Ensuring Cloud Security: What You Might Not Know

Don’t be afraid of the cloud; just be smart with it.

How Much Credit Card Data do You Store? (It's More Than You Think.)

See the unencrypted storage results from SecurityMetrics’ latest PANscan reports.

Ditch Typical Anti Virus for True PCI Requirement 5 Compliance

Anti virus doesn’t protect; it cleans up malware infections after the fact.

DROWN Attack and SSL: What You Need to Know

Here’s what you need to know about DROWN.

Four Steps to Securing Your Medical Devices

Unfortunately, many healthcare organizations aren’t properly securing their medical devices, leaving them open to cyber attacks.

Badlock: Combatting the New Samba Vulnerability

The New Samba vulnerability could expose companies to man-in-the-middle attacks.

Healthcare Compliance Case Studies for HIPAA Solutions

SecurityMetrics HIPAA solution testimonials from real healthcare entities like you.