Blog

Wireless Access Point Protection: 5 Steps to Find Rogue Wi-Fi Networks and Comply with PCI DSS Requirement 11.1

A rogue access point is a wireless access point installed on a secure network without the knowledge of the system administrator.

What Does a Cyber Forensic Investigation Do and How Much Does It Cost?

Learn what a forensic investigation accomplishes and how much it might cost.

Your Crash Course To HITRUST CSF Assessment Types

This blog will cover the three types of HITRUST CSF certifications. It will also cover what you can expect to achieve upon completion of each type of assessment and general guidelines of which assessment is best for your organization.

PCI DSS Compliance for Service Providers FAQ

pci dss compliance for service providers is necessary if your organization provides services to merchants that may affect the security of their merchant payment data.

PCI Requirement 11: Vulnerability Scans and Penetration Tests

PCI Requirement 11 discusses vulnnerability scanning and penetration testing.

Do You Need a Web Application Penetration Test?

Do You Need a Web Application Penetration Test? It’s important for your business to find and remediate any vulnerabilities your web applications may have. This is where web application penetration testing comes in.

Penetration Testing FAQs

We outline the penetration testing process in detail and answer some of the most frequently asked questions related to this important security test.

Types of Penetration Testing: The What, The Why, and The How

Read this blog to help you determine what type of penetration test is best for your business.

What is it like working with SecurityMetrics on PCI Compliance?

What is it like working with SecurityMetrics? SecurityMetrics’ central objective is to help companies secure their data, not just meet compliance standards. We love working with organizations who have that same vision for security.

Partner with SecurityMetrics for Data Security and Compliance

Why Partner with SecurityMetrics for Data Security and Compliance?

BlogEngine.NET XML External Entity Attacks

An Out-of-band XML External Entity attack, CVE-2019-10718, exists on BlogEngine.NET versions 3.3.7 and earlier through the /pingback.axd endpoint.

How to Start a Cybersecurity Program For Your Small Business

For many small business owners, cybersecurity budgets can be very limited. Finding a cybersecurity program can help you get the most value for your money.

The SecurityMetrics HIPAA Portal Helps Streamline Your Compliance

This blog discusses how the SecurityMetrics HIPAA Portal can help with your HIPAA requirements.

SecurityMetrics Podcast: Cybersecurity Podcast with Industry Tips

Host and Principal Security Analyst Jen Stone (MCIS, CISSP, CISA, QSA) brings on guests with unique viewpoints that are important to the entire security and payments ecosystem.

Ransomware Trends: Don't Panic, Prepare

This blog discusses ransomware trends and what to do about ransomware.

Responding to 5 Common PCI Questions from Franchisers and Franchisees

Here are the top 5 PCI questions we get from franchisers and franchisees about PCI compliance.

The DDoS Threat Landscape is Evolving, Are You Ready?

The DDoS Threat Landscape is evolving at a record pace. So how can you be prepared for this risk in your business?

How to Configure a Firewall in 5 Steps

The following guidance will help you understand the major steps involved in firewall configuration.

Ten Mistakes in HIPAA Security Rule Compliance

The HIPAA Security Rule requirements are vast. To help you prioritize your security, we’ve put together the ten mistakes that organizations make when it comes to HIPAA security compliance.

What is CCPA (California Consumer Privacy Act) Compliance?

Like other privacy laws, CCPA includes some basic tenets of data protection as well as provisions to notify data subjects about the uses of their data, like who is going to see their data and when.

2020 Data Breach Predictions and What We Learned in 2019

It’s important to note that the number of victims in each reported breach is not cumulative, these are each individual incidences, bringing the total between these three breaches to upwards of 1.4 billion victims.

Data Breach Statistics from 2018 and Predictions for 2019

Data Breach Statistics from 2018 and Predictions for 2019. How did our predictions from 2018 turn out and what you can do in 2019 to avoid a data breach.

Google Privacy Update - PII Can Now be Removed from Searches

Google Privacy Update - PII Can Now be Removed from Searches.

How to Know if an App is Secure

Heff and Forrest discuss how to know if an app is secure in this week's news.