Blog

External Vulnerability Scanning FAQ: What is External Vulnerability Scanning?

External vulnerability scanning is a security practice that involves scanning and assessing the external-facing network infrastructure, systems, and applications of an organization for potential vulnerabilities.

Why Partner with SecurityMetrics for Data Security and Compliance?

We want to remove you from being the low-hanging fruit to hackers by improving your overall security posture. Our mission statement is to “close data security and compliance gaps to avoid a data breach.”

10 Misconceptions about Endpoint Security and Why You Need It

Endpoint security generally refers to cybersecurity tools or services that can help alert you on devices that may be compromised.

Artificial Intelligence and Cybersecurity: What Businesses Don't Know

AI or artificial intelligence can be used safely by businesses that are concerned about their cybersecurity.

Navigating AI Safely in Your Small Business: an AI Cybersecurity Perspective

A number of other interesting AI cybersecurity issues are hitting our radar as customers begin taking advantage of new AI tools in their small businesses.

How Much Does a Pentest Cost?

The most accurate way to know if you’re safe from a hacker is through live penetration testing, also called pen testing, or ethical hacking.

Common PCI DSS Questions for SMBs

This blog is intended for small to medium sized-merchant businesses and attempts to answer common PCI DSS questions.

New Ecommerce Security Tool: Shopping Cart Monitor

Shopping Cart Monitor has the potential to save online retailers a significant amount of money and frustration since content providers can be held liable for damages—damages that can cost retailers hundreds of millions of dollars every year.

Cost Effective Data Security Best Practices in the Workplace

Don't let cyber threats compromise your sensitive information. Follow these simple, cost-effective data security best practices for a secure workplace.

7 Ways to Recognize a Phishing Email: Examples of Phishing Email Scams

Here are seven email phishing examples to help you recognize a malicious email and maintain email security.

GDPR FAQs

Find out the most commonly asked questions about GDPR.

Understanding the HIPAA Application of Firewalls

Like a security guard, firewalls control what goes in and what comes out.

HIPAA Compliance Best Practices

With over 20 years in the industry, we have found that these HIPAA compliance best practices are most helpful in securing your organization.

Blogengine.net Directory Traversal & Listing; Login Page Unvalidated Redirect

A directory traversal, CVE-2019-10717, was identified on BlogEngine.NET applications versions 3.3.7 and earlier through the /api/filemanager endpoint.

PCI Requirement 10: Logging and Log Monitoring

PCI requirement 10 is all about logging and log monitoring.

Authorization Bypass: CVE (2020-11679, 2020-11680, 2020-11681)

Attackers: Known or Unknown? That is the question.

Performing an SAQ C-VT version 4.0 Self-Assessment

This post will highlight changes made to the SAQ C-VT version 4.0 and provide guidance on how to comply with newly added requirements.

How to Prepare for PCI DSS 4.0

Rather than worrying about the new PCI requirements, you can prepare for PCI DSS 4.0 by focusing on your current PCI DSS compliance efforts and choosing to think of 4.0 as a timely addition that will provide more defenses against developing attack methods.

What Are Addressable HIPAA Requirements?

Contrary to popular belief, addressable does NOT mean optional.

Intrusion Detection System: What's Missing in HIPAA Security

The #1 most important piece of a data loss prevention method? An intrusion detection system.

7 Mistakes in Small Businesses Security

Small businesses often find themselves caught between limited resources and the threat of cybersecurity breaches. To avoid a data breach, here are 7 common Mistakes in small businesses security.

Phishing Types, Tactics, and Techniques

To effectively protect your business, it's crucial to understand the various types of phishing tactics and how to prevent them.

HIPAA Diagrams: the #1 Way to Help Your HIPAA Audits Go Faster

How can you secure your organization without knowing how patient data travels?

PCI Requirement 7: 5 Reasons You Should Limit Employee Access to Your Data

Learn why restricting employee access to data helps protect your business.