Blog

Auditor Tips: Regularly Conduct Vulnerability Scans

Regular vulnerability scans are a critical preventative security control as they detect and assess known weaknesses that may be opening up your systems, applications and networks to undue risk of intrusion. Vulnerability scanning is not penetration testing.

Auditor Tips: Set Up Your Intrusion Detection/Prevention System

You need a team to choose and manage an IDS/IPS. Whether it’s the responsibility of your IT Security Team,Data Loss Prevention Team, a managed service provider, or a designated co-managed team consisting of security-related department heads.

Auditor Tips: Unique ID, Passwords, and Passphrases

More recently, password length, in the form of longer, memorable word strings have proven to be a more important security practice than the use of shorter complex passwords.

Auditor Tips: Implement Encryption

You should implement encryption to protect PHI any time it is stored.

Auditor Tips: Audit Logs and Log Monitoring

Monitoring audit logs for all critical systems and devices in your environment is key to understanding what types of events and actions occur on a daily basis, allowing you to establish a baseline of what is considered normal system activity.

Auditor Tips: Secure Remote Access

Remote access to tools and data is essential to employees who work from home or are unable to go into the office for health or other logistical reasons.

Auditor Tips: System Configuration

Whenever a system is configured make sure you know exactly what is running and also what is necessary to allow the system to perform its intended function.

Auditor Tips: Practicing Good Cyber Hygiene

While every organization is different, the end goal of practicing good cyber hygiene is to identify vulnerabilities, minimize risk exposure, and reduce the potential for a breach.

Auditor Tips: Know Your PHI’s Lifecycle

Fully understanding all the PHI you have, where it is stored, what processes touch it, and how it is used in your organization is critical to enabling a business to properly handle and secure PHI.

Auditor Tips: Conduct an Accurate and Thorough Risk Analysis

Yet a complete and thorough risk analysis is one of the best ways for you and your organization to make intelligent and informed business decisions

What’s New with the SAQ A-EP

The SAQ A-EP PCI assessment is for merchants who have an e-commerce card data flow that is not entirely outsourced to a PCI validated third-party service provider.

The SecurityMetrics HIPAA Guide Simplifies HIPAA Guidelines

HIPAA laws and cybersecurity are not simple. The 2023 HIPAA Guide breaks down HIPAA guidelines into actionable steps and easy-to-understand information so that your healthcare staff can be fully educated on data privacy and protection.

Guide to HIPAA Compliance Simplifies Data Security and Privacy

We created our Guide to HIPAA compliance to help you close gaps in security and compliance, ultimately helping you avoid a data breach.

Five Ways to Make Security Training Memorable

One of the easiest ways to make cybersecurity training more interesting is by making it fun. Here are five tips for making workforce security training fun and memorable.

The Cost of HIPAA Breach Insurance

Those exorbitant fines are why cyber breach insurance exists.

Updating PCI DSS SAQs from 3.0 to 3.2: The Changes You Should Know

PCI DSS 3.2 has added and removed new requirements to the SAQs.

Stay Off the HHS Naughty List

Brand degradation and patient exodus will likely occur every time an organization shames their name through a data breach.

Warbiking: Hacking with Your Helmet On

Hackers bike around the city with their laptops in a discreet backpack (or strapped in a bike trailer) and search for unprotected wireless networks.

Unencrypted Data: A Security Plague

Unencrypted payment card data is relatively simple for a hacker to detect, scoop up, and steal.

What Are My HIPAA Security Requirements?

Given the stated importance and heavy consequences associated with the risk analysis, you may want to consider working with a HIPAA security expert.

What Antivirus Should I Use?

Don’t let your anti-malware be your permeable safety blanket.

The Pros and Cons of Onsite HIPAA Audits

Contracting with an external professional to perform an onsite HIPAA audit might be a good option for you.

The Ultimate Guide to PCI 3.0 Changes

Here’s a list of our most popular PCI DSS 3.0 resources.

Welcome to the SecurityMetrics Blog

Learn to close data security gaps and prevent data breaches at your business.