Blog

What are the HITRUST Requirements? 3 Steps To Get HITRUST Certified

Specific HITRUST requirements are available through HITRUST’s MyCSF portal and will include various implementations of foundational security measures and controls depending on your organization and the type of HITRUST assessment you are performing.

The Dos and Don'ts of Storing Credit Card Information

An example of insecure credit card number storage comes from one of our PCI assessors, where a company explained how they processed their credit cards.

What is a Managed Firewall and Do You Need One?

What is a Managed Firewall and Do You Need One?

What’s changed in CIS Controls (v8)?

Overview of key changes in the CIS controls update. See what’s new in the CIS Controls (v8) and how this free resource can help maximize your security.

Improve Your Security Posture with NIST Cybersecurity Framework

The NIST cybersecurity framework can help guide small-to-medium sized organizations improve their cybersecurity posture.

Top 10 Types of Phishing Emails

Criminals have countless methods and types of phishing emails to trick email users.

Why You Need Both a Hardware and Software Firewall

How do you block access to your systems (and sensitive data) from hackers in the outside world?

What Are HIPAA Compliant System Logs?

System logs are part of HIPAA compliance and specifically mentioned in two different requirements.

The Importance of Log Management

Log management and regular log review could help identify malicious attacks on your system.

System Hardening Standards: How to Comply with PCI Requirement 2.2

Merchants must “address all known security vulnerabilities and [be] consistent with industry-accepted system hardening standards.”

Social Engineering Training: What Your Employees Should Know

Learn how to help your employees be better prepared to fight against social engineering tactics.

What are Service Provider Levels and How Do They Affect PCI Compliance?

If you’re a service provider, you may have some different PCI requirements based on what level you are.

SAQ A-EP: The What and the How

The biggest difference between SAQ A and SAQ A-EP is based on how cardholder data is handled.

PCI DSS Version 4.0 SAQ Changes

There are some key changes to the PCI DSS 4.0 SAQ questionnaires you will want to be aware of.

Key PCI DSS 4.0 Requirement Updates

You will need to be compliant with PCI DSS 4.0 by March 31, 2025. We recommend starting your transition to 4.0 by reading the documents that explain the new PCI standard, including the executive summary, which has a lot of good information in it.

How Much Does HIPAA Compliance Cost?

Lack of budget is a plague that affects risk and compliance officers at health organizations of all sizes. This post will give you the information you need to more accurately plan your HIPAA budget.

HIPAA vs. PCI DSS Compliance

Why do you need to comply with PCI if you’ve already taken care of HIPAA?

Are Patient Sign-In Sheets a HIPAA Violation?

My stance on patient sign-in sheets is that unless there is a valid business reason for having them, don’t do it.

HIPAA Violations: Who is Responsible?

Is it your responsibility to ensure that your clinic is HIPAA compliant?

5 Tips to Implement Security Awareness at Your Company

Whether you’re a CIO, the head of IT, or in a non-security-related position, if your data security practices are unclear, your company is at a greater risk to a data breach.

How to Perform a PCI v4.0 SAQ A Self-Assessment

Performing an SAQ A version 4.0 Self-Assessment: Several new requirements, both existing in version 3.2.1 of the standard and some newly created for version 4.0, have been added to increase the security of outsourced ecommerce environments.

How to Manage a Healthcare Data Breach

Data breaches can be devastating. Here are 5 steps that will help you manage a healthcare data breach.

Are HTTP Websites Insecure?

There are two website prefixes: One shows the site you are on is secure (HTTPS), and the other does not (HTTP).

What is Tokenization and How Can I Use it for PCI DSS Compliance?

Tokenization is used for securing sensitive data, such as a credit card number, by exchanging it for non-sensitive data - a token.