Blog

Who Owns Third-Party Security Risk Management

Third-party security risk management (TPRM) is the process of analyzing and addressing risks associated with outsourcing to third-party vendors or service providers.

5 Minimum Necessary HIPAA PHI Tips

The HIPAA minimum necessary rule helps covered entities manage healthcare information by requiring them to limit access to and disclosure of PHI.

How Much Does a HIPAA Risk Management Plan Cost?

Many healthcare entities haven’t yet separated the difference between the HIPAA Security Rule and HIPAA Privacy Rule.

10 Qualities To Look For When Selecting an Approved Scanning Vendor

Not all approved scanning vendors are created equal

How Do Hackers Hack?

Hackers don’t care who you are. They just care how rich you can make them.

SecurityMetrics Vulnerability Scanning Process FAQ

The most commonly asked customer questions about the vulnerability scanning process.

How to Permanently Delete Files with Sensitive Data

When delete doesn’t actually delete, it can increase your vulnerability.

What is HIPAA Compliance, and How Long Will It Take?

HIPAA compliance is a process, not a destination . . . but it doesn’t hurt to know your timeframe.

Vulnerability Scanners 101: What, Why, and How to Comply

Learn the fundamentals of vulnerability scanning, especially for PCI compliance requirements.

Configure and Maintain Your Firewall

Learn why your firewall may make you vulnerable and how SecurityMetrics Managed Firewall can help.

PCI Requirement 8: Combatting Weak Passwords and Usernames

In order to comply with PCI Requirement 8, you need to practice proper password and username management.

SAQ D: What's Required for Service Providers

If you are a service provider who stores credit card data, PCI SAQ D likely applies to you.

How Does Network Segmentation Affect PCI Scope?

Segmentation is important for preventing breaches and hacks, as well as a method to reduce PCI scope.

Kaseya VSA Software SecurityMetrics Response

We are strongly encouraging all SecurityMetrics clients that use Kaseya VSA software in their environment to follow the recommended guidance provided by CISA and the FBI provided below.

What is the HIPAA Privacy Rule?

The HIPAA Privacy Rule is crucial for protecting PHI and ensuring patient privacy. Learn about HIPAA PHI compliance with our free guide.

What is Formjacking?

Formjacking is a type of cyber attack where hackers inject malicious JavaScript code into a webpage form–most often a payment page form.

SAQ A: What to Know, and What to Do

Learn what’s required to fill out SAQ A.

Incident Response: 10 Things to Do if You Have a Data Breach

Learn how to effectively respond to security breaches and prevent future attacks.

PCI Compliance in the Cloud

Learn how PCI compliance in the cloud affects your organization. "The cloud" brings up an idea of something mysterious and far away, but in reality, “the cloud” is a third-party-managed physical server.

Role Based Access Control for HIPAA Security

Healthcare providers are responsible to make sure those with access to ePHI require that access to adequately do their jobs.

5 Steps to Making a Risk Assessment

Making a risk Assessment, or Risk Analysis, is the first step in the Security Rule compliance.

Firewalls 101: 5 Things You Should Know

What are firewalls and how do they help protect your business?

5 Tips to Boost Your Business's Physical Security

Many businesses don’t often realize how physical security can help protect their card data.