Blog

New (And Old) Apache Struts Flaw: CVE-2016-1000031

Apache Struts developers released another security announcement on November 5, 2018

SolarWinds Data Breach and SecurityMetrics Response

The SolarWinds breach affects SolarWinds’ Orion products and is rapidly evolving. SecurityMetrics does NOT use SolarWinds Orion’s Network Management System tools (NMS) products.

Small Business Cybersecurity Tools

We have compiled these small business cybersecurity tools to help you maintain PCI compliance.

Prevent IoT Ransomware: Best Practices from the SecurityMetrics SOC

Prevent IoT Ransomware: Threat Report and Best Practices from the SecurityMetrics SOC. The Internet of Things, also known as IoT, refers to physical objects that are connected to and send data across the Internet.

Infographic: Reduce PCI Scope, Reduce Workload

Learn how to reduce your PCI scope.

Infographic: Cybercriminals Love When You Use Remote Access

Remote access technology has been turned against us by cybercriminals.

Is Your Credit Card Data Leaking?

Learn how you can reduce your liability by learning about the hazards of ‘unintended’ credit card storage.

Is Working From Home HIPAA Compliant?

Attackers target organizations that utilize remote access applications.

PCI Compliance Scanning Requirements

Learn about PCI compliance scanning requirements.

Is Your Business Prepared for the Physical Security Threat?

Train employees to stop and question anyone who does not work for the company, especially if the person tries to enter back office or network areas.

PCI DSS 3.0: 10 Commonly Asked Questions

Because PCI 3.0 introduces more SAQs, SecurityMetrics offers combination SAQs when more than one SAQ applies.

My OCR Audit, and How I Survived: a HIPAA Audit Checklist

Doreen Espinoza answers some tough questions about her audit with the HHS.

PCI Council Security Awareness Guidance

Teach employees to care about the security at your organization, and you will avoid a lot of potential heartache.

Malware Types: Memory Scrapers, Keyloggers, and Sniffers

All types of malware cause all sorts of trouble for organizations

Latest SSL Vulnerability: Logjam

If you have any questions, please contact SecurityMetrics support, 801.705.5700.

Most Popular Data Security Articles

Find out the most-read PCI DSS compliance and data security posts.

Making HIPAA Compliance Realistic: Part 2

HIPAA compliance doesn’t have to be unmanageable.

Making HIPAA Compliance Realistic: Part 1

It’s about maximizing the little time you have.

Make Your Auditor Happy: Follow These PCI Audit Requirements

Similar problems materialize before or during an audit that ultimately slow audit progress.

Tips to Prepare for a PCI Audit

Here are some tips on how to prepare for a PCI DSS audit:

PCI DSS 3: Agent Training Isn't Enough for Contact Center Compliance

Learn how to secure telephone payments and reduce PCI DSS scope through DTMF payment technology.

Medical Data Encryption: Keeping Your PHI Secure

Add another layer of security to your organization’s PHI with encryption.

Integrate 2fa Tech To Correctly Comply with PCI Req. 8.3

Understand how to integrate 2fa technology to comply with PCI req. 8.3. It's easier to incorporate than you think.

Implementing HIPAA: A 12-Month HIPAA Plan to Get Compliant

Getting HIPAA compliant doesn't have to be overwhelming.