Blog

What To Do When You Get Hacked, Step-By-Step

Here’s what to do when you get hacked, step-by-step.

What to Do If Your Identity is Stolen in 2025: Essential Steps

If you find yourself a victim of identity theft, it’s crucial to act swiftly and systematically to protect yourself and minimize the damage.

You’ve Been Breached. What Should You Do Now?

A breach doesn’t have to be the end of the world—or your business. How you respond matters more than what happened.

Four Cybersecurity Practices That Stop Most Breaches Before They Start

Let’s discuss four data security best practices and how to correctly implement them in your organization.

What You Need to Know About HITRUST Assessments, According to an Assessor

We understand that pursuing HITRUST validation can seem daunting, but with the right approach and the right partners, it's entirely achievable.

What is HITRUST Compliance?

What is HITRUST? HITRUST stands for the Health Information Trust Alliance. It was founded in 2007 and uses the “HITRUST approach” to help organizations from all sectors–but especially healthcare–effectively manage data, information risk, and compliance.

Top HITRUST Providers and Who Should You Choose

Here’s my definitive ranking of top HITRUST providers, what they offer, who they’re best for, and projected costs.

Calculating your HITRUST Cost

Read this blog to discover how you can use the new HITRUST Price Range Calculator to get an estimate of your HITRUST cost.

Seven Tips to Avoid Costly Data Breaches

Neglecting the simple security measures is what allows hackers into a business network and allows them to steal your sensitive information.

A Guide to New Requirements in PCI DSS 4.0.1

As of March 31, 2025, PCI DSS v4.0.1 is live with new, updated, and altered requirements.

HITRUST vs. HIPAA

The difference: HITRUST vs. HIPAA HITRUST is a compliance framework created by a private alliance of security industry experts and includes many aspects of HIPAA Security and Privacy Rules.

PCI Requirement 4: Securing Your Networks

PCI DSS Requirement 4 focuses on protecting stored and transmitted card data.

The Best Online Cybersecurity Courses of 2025

Read this blog to discover which cybersecurity training course you should take in 2025 to level up your cybersecurity know-how.

What is a Brushing Scam and Why Should I Care?

A brushing scam is when you receive a package you didn’t order, because a bad actor has gotten your personal information.

AI Acceptable Use Policy: How to Use AI Safely (According to a Cybersecurity Professional)

Artificial intelligence (AI) is an exceptional tool for increasing productivity and innovating at work. However, if you don’t set specific parameters for how to use AI safely in the workplace, you risk your sensitive business data becoming public information.

The 2025 SecurityMetrics Guide to PCI DSS Compliance Has Launched

In the face of current cybersecurity challenges, PCI DSS compliance is more important for merchants than ever.

6 Steps to a Penetration Test

Getting a penetration test can seem overwhelming, but following these steps can help ensure that your penetration test goes as smoothly as possible.

Requirement 1: Establish Secure Firewall Rules

Make sure to choose firewalls that support the necessary configuration options to protect critical systems and provide segmentation between the CDE and other internal and external networks specific to your organization.

GDPR and CCPA Overview: Your Role in Data Protection

This post covers the General Data Protection Regulation (GDPR) and the California Consumer Protection Act (CCPA), as well as fees for data breaches, changes in privacy attitudes, and the future of the standards.

How to Send a HIPAA Compliant Email

You can send ePHI via email, but you have to do it securely, according to HHS.

PCI Requirement 2: How to Get Compliant

PCI Requirement 2 involves securing your systems.

HIPAA Business Associate Agreements 101

Find out more about the essentials of HIPAA Business Associate Agreements.

GDPR 101 Part 2: What are the Requirements of GDPR?

Learn the bases about the EU's General Data Protection Regulation.

Cloud Security: What Businesses Need to Know

In this post, we’ll review an incident from last year to demonstrate the breadth of controls that should be established, as well as the difficult position in which any security event can place you.