Blog

Ten Mistakes in HIPAA Security Rule Compliance

The HIPAA Security Rule requirements are vast. To help you prioritize your security, we’ve put together the ten mistakes that organizations make when it comes to HIPAA security compliance.

What is it like working with SecurityMetrics on PCI Compliance?

What is it like working with SecurityMetrics? SecurityMetrics’ central objective is to help companies secure their data, not just meet compliance standards. We love working with organizations who have that same vision for security.

How to Start a Cybersecurity Program For Your Small Business

For many small business owners, cybersecurity budgets can be very limited. Finding a cybersecurity program can help you get the most value for your money.

The SecurityMetrics HIPAA Portal Helps Streamline Your Compliance

This blog discusses how the SecurityMetrics HIPAA Portal can help with your HIPAA requirements.

Ransomware Trends: Don't Panic, Prepare

This blog discusses ransomware trends and what to do about ransomware.

Responding to 5 Common PCI Questions from Franchisers and Franchisees

Here are the top 5 PCI questions we get from franchisers and franchisees about PCI compliance.

Cost Effective Data Security Best Practices in the Workplace

Don't let cyber threats compromise your sensitive information. Follow these simple, cost-effective data security best practices for a secure workplace.

Partner with SecurityMetrics for Data Security and Compliance

Why Partner with SecurityMetrics for Data Security and Compliance?

Performing an SAQ C version 4.0 Merchant Self-Assessment

Merchants using the SAQ C to validate their PCI DSS compliance should be aware of changes that were introduced into this questionnaire during the publication of the SAQ C version 4.0.

Performing an SAQ-D version 4.0 Merchant Self-Assessment

Merchants who do not qualify to assess their PCI DSS compliance using any of the simpler self-assessment questionnaires are required to use the SAQ D to validate their compliance.

External Vulnerability Scanning FAQ: What is External Vulnerability Scanning?

External vulnerability scanning is a security practice that involves scanning and assessing the external-facing network infrastructure, systems, and applications of an organization for potential vulnerabilities.

Forensic FAQs

If you've experienced a data breach, you will probably need a forensic investigation to determine the cause of the breach. Here are some forensic faqs to help you understand the process of a forensic investigation.

PCI Program FAQs: What is a PCI Program?

A PCI program is a system that acquirers use to keep track of their merchants PCI compliance, and for merchants to receive the training and tools they need to achieve PCI compliance and remain PCI compliant.

PCI DSS 4.0 SAQ Questionnaires Q&A

PCI DSS 4.0 SAQ Questionnaires Q&A: While future-dated requirements are not mandatory until March 31, 2025, it's recommended to implement them early for enhanced security.

PCI 4.0 Summary of Changes

PCI 4.0 summary of changes including new requirements that have been added to the standard.

What To Include In An Incident Response Plan

Creating an incident response plan can seem overwhelming. To simplify the process, develop your incident response plan in smaller, more manageable procedures.

How to Test Your Incident Response Plan

How to test your incident response plan and conduct tabletop exercises.

Scoping for PCI Compliance: What You Need To Know

Scoping is determining what systems are covered or need to be assessed or included as part of your PCI compliance.

Auditor Tips: Requirement 10: Audit Logs and Log Monitoring

It’s critical that you configure the log monitoring solution correctly so that the appropriate directories, files, security controls, and events are being monitored.

Auditor Tips: Requirement 11: Testing Security

If your organization is required to be PCI compliant, don’t procrastinate beginning the penetration test process.

Auditor Tips: Requirement 12: PCI Compliance Basics

a risk assessment can be the most important part of your overall security and compliance program, since it helps you identify systems, third parties, business processes, and people that are in scope for PCI compliance.

Auditor Tips: Requirement 9: Improve Your Physical Security

Once you know what systems you need to protect, put controls in place that can log and restrict access to them.

Auditor Tips: Requirement 8: Use Unique ID Credentials

Requirement 8 is all about using unique ID credentials.

Auditor Tips: Requirement 5: Implement And Update Your Anti-Malware

PCI DSS requires anti-malware software to be installed on all systems that are commonly affected by malware (e.g., Windows).