Blog

Close Security Gaps in 2019: 5 Blog Topics to Help You Avoid Data Breach

We’ve rounded up some of the most helpful topics from our blog to help set you on the right course for 2019. Prepare now, so you’ll have less hassle later.

10 Misconceptions About Security Audits

10 misconceptions about security audits and questions you should ask when getting audited. The focus of this blog will be how to have better data security and compliance technology so that you can avoid data breaches, costly fines, slow downs, and hindrances to your business.

5 Most Bizarre HIPAA Violation Cases

Choose your vendors wisely and make sure you have a Business Associate Agreement (BAA) in place.

5 Things The Payments Industry Should Watch For in 2015

Here are 5 trends in payments that every business should watch out for this year.

5 P2PE Trends in 2015

If you truly lived by everything PCI DSS requires, implementing a P2PE solution would very possibly cost you less money, no matter your size.

5 Step HIPAA Risk Analysis Sample

Find out where to start your HIPAA risk analysis process.

3 Steps to Protect ePHI From Malware

It’s simple to protect patient data from malware with the right tools, controls, and people in place.

6 Ways to Make Data Security Consistent in Your Business

Depending on the size and environment of your company, security consistency can be a real challenge.

3 Tips to Light a PCI Fire Under Your Merchants

Take a look at three methods you can use them to get merchants excited about PCI DSS.

5 PCI Compliance Tips for Enterprise Organizations

Here are 5 tips for enterprise organizations to get PCI compliant more efficiently.

5 Security Best Practices for Protecting Your HIPAA-Compliant Data

5 Security Best Practices for Protecting Your HIPAA-Compliant Data: encrypt everything, assess your risk, train your people, be vigilant and ready to act, and read buisness associate agreements and find partnerships you trust.

What is Network Penetration Testing?

What is network penetration testing? PCI DSS Requirement 11 calls for regular vulnerability scanning and penetration testing.

5 Tips to Improve HIPAA Compliance in 2018

The FBI has reported an increase in discovered and reported attacks against all organizations, with 83% of ransomware attacks against healthcare.

5 Acquirer Tips for PCI DSS Program Success

PCI DSS compliance is not only a great tool for protecting payment data, but overall data security.

2022 Forensic Predictions

2022 Forensic Predictions: SecurityMetrics Forensic Investigators have witnessed the rise and fall of popular attack trends over 20 consecutive years.

5 Steps on Your Journey Toward Data Privacy and Protection (DPP)

Data privacy and protection (DPP) laws aren’t entirely new to the security and compliance landscape, but the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) are prompting many organizations to take a more formal approach to DPP.

How Can You Tell if an App is Secure?

This blog explains how to do a quick risk assessment on an app in the app store or one that you’ve downloaded on your phone to determine if an app is secure.

Securing Keys and Certificates: A PCI Auditor's Perspective

Businesses must ensure their key servers, certificate authorities, open SSL libraries, and server updates are secure.

2021 Cyber Security Year Review

2021 security year review and our predictions of things that we think will be forefront in cybersecurity this year.

Fighting Phishing Email Scams: What You Should Know

Phishing Email Scams remain one of the top threats to companies.

Top 5 Blogs to Prepare for 2022

To help you focus your cybersecurity efforts, we've compiled our top 5 blogs to help you prepare for 2022.

Prepare and Train for Cybersecurity in 2021 With These 5 Blogs

How to prepare for cybersecurity in 2021. We outline the top five blogs to help you train employees, understand the threat landscape, avoid malware, and support compliance efforts as you head into 2021.

Different Types of Penetration Tests for Your Business Needs

What area of your business would benefit the most from a penetration test?

Increasing Satisfaction in PCI DSS Programs for Acquirers and ISOs

Increasing Satisfaction in PCI DSS Programs for Acquirers and ISOs: Learn why PCI DSS programs are beneficial to businesses and how to manage expectations around PCI programs.