Blog

Limiting Employee Access: A Look at PCI DSS Requirement 7

See why you should comply with PCI DSS Requirement 7 and restrict employee access to sensitive data.

Cyber Breach Insurance: How Much Does it Cost?

Depending on a few factors, cyber insurance premiums can cost from $650 to easily over $120,000 annually.

Vendor-Supplied Defaults Are a Serious Threat

When those defaults aren’t changed, you give hackers Wonka’s Golden Ticket into your system.

PCI Consultants Say: Reduce PCI DSS Scope

If you don’t have a compelling business need to store PAN, don’t store it!

9 Ways to Social Engineer a Hospital

Fight against social engineering by providing proper regular staff training.

Top 10 Network Security Audit Fails

The top PCI DSS assessment failures haven’t changed in years.

How to Meet HIPAA Documentation Requirements

A HIPAA document is more than a policy: it's proof you care about protecting patient data.

Biometrics: The Future of Payment Data Security?

Biometrics more accurately associates a specific individual to a device or system.

The Problem with SHA-1: Updating Your Security Certificate to SHA-2

On January 1, 2017, SHA-1 was officially no longer accepted by web browsers.

5 Things Your Incident Response Plan Needs

Find out some of the essentials to include in your incident response plan.

PCI Requirement 5: Protecting Your System with Anti-Virus

PCI Requirement 5 deals primarily with installing and maintaining an anti-malware software.

PCI Requirement 6: Updating Your Systems

PCI Requirement 6 is all about regularly updating your systems.

SSL to TLS v1.2: Tips for Migration

Are you still using SSL encryption or TLS v1.0? If so, you’re putting your business at greater risk.

Everything You Need to Know About How to Manage PHI

Fully understanding all the PHI you have, where it is stored, what processes touch it, and how it is used in your organization is critical to enabling a business to properly manage PHI.

5 Steps to Secure Your Healthcare Organization

Securing your healthcare organization should be a priority. Healthcare organizations are especially vulnerable to attacks because they cannot afford to be shut down.

3 Projects to Get You Into InfoSec

This blog will discuss 3 infosec projects that are under $100 to get you started in Cybersecurity or Infosecurity by giving you hands-on experience to develop your skills.

HIPAA Guidelines Simplified in the 2022 HIPAA Guide

HIPAA laws and cybersecurity are not simple. To ensure your institution never has a false sense of security, we created our seventh edition Guide to HIPAA Compliance.

Auditor Tips: Requirement 4: Sending Data Over Open And Public Networks

Know exactly where CHD is coming from and being sent to, inside and outside of your organization.

Auditor Tips: Requirement 3: Protect Cardholder Data

It is important to know what data you actually store, process, and/or transmit.

Auditor Tips: PCI DSS Responsibilities and Challenges

As you implement your cybersecurity program, make sure you understand why a security control is required so you can structure tools and processes around the protection each control offers.

Auditor Tips: Requirement 2: System Configuration

You are required to use industry-accepted configuration and hardening standards when setting up systems that are part of your PCI scope.

Performing an SAQ B-IP version 4.0 Self-Assessment

The Self-Assessment Questionnaire (SAQ) B-IP is intended for payment channels where cardholder data is processed using IP-connected PTS-approved point-of-interaction terminals.

2023 Forensic Predictions

In 2023, we've got three predictions of cyber attacks that we think will be the most prevalent this year