Blog

Top 15 ASV Scan Vulnerabilities and How to Fix Them

Vulnerability scans search your network and provide a logged summary of alerts you can review and act on. Here are the top 15 ASV scan vulnerabilities and how to fix them.

Auditor Tips: Requirement 12: PCI Compliance Basics

a risk assessment can be the most important part of your overall security and compliance program, since it helps you identify systems, third parties, business processes, and people that are in scope for PCI compliance.

Auditor Tips: Firewall Best Practices

Healthcare organizations of all sizes use firewalls to protect the perimeter of their sensitive networks. Here are some firewall best practices to get you started.

Which Pentest is Right for You?

Determining which type of pentests are best for your organization depends on concerns or needs that are generated from real life security incidents or concerns about security posture for business critical systems or environments.

Performing an SAQ D Service Provider version 4.0 Self-Assessment

Performing an SAQ D Service Provider version 4.0 Self-Assessment: Updates and changes in the new 4.0 standard.

Apache Struts Vulnerability: What You Should Do

The Apache Struts project has just released a security bulletin about a new critical vulnerability in the Apache Struts web application framework. Here's how to protect yourself.

Performing an SAQ-B Version 4.0 Self-Assessment

The SAQ B is designed for merchant environments where all cardholder data is processed using standalone Point-of-Interaction (POI) terminals connected via an analog phone line.

5 Ways Your Mobile Device Can Get Malware

While convenient, mobile devices on your network can pose a risk to your business.

A Quick Look at SAQ P2PE: Reducing Your PCI Workload

Learn more about SAQ P2PE and who qualifies for it.

How to Start a Career in Cybersecurity

If you have a knack for solving problems, good organizational skills, and attention to detail, cybersecurity might be a good fit for you.

How to Manage a Data Breach: 5 Steps to Keep Your Business Safe

Here are some steps to take to stop information from being stolen, prevent further damage and restore operations as quickly as possible.

HIPAA FAQ: What is HIPAA?

Learn about the most common questions about HIPAA compliance.

PCI DSS Compliance FAQ: What is PCI Compliance?

Learn about the fundamentals of PCI DSS Compliance.

PCI PIN Assessment FAQs

PCI PIN refers to the security requirements and assessment for merchants that accept, process or transmit payment card personal identification numbers (PIN).

COVID-19 Cyber Attacks Security Update Center

Amid the chaos and uncertainty, SecurityMetrics remains steadfast in our mission to help you close compliance gaps and prevent data breaches. We stand ready to help with your security concerns, education, and content needs at this time.

Performing an SAQ-D version 4.0 Merchant Self-Assessment

Merchants who do not qualify to assess their PCI DSS compliance using any of the simpler self-assessment questionnaires are required to use the SAQ D to validate their compliance.

Sending Credit Card Info Over Email

The way you handle emailing credit card info might just change your scope for PCI DSS compliance.

Healthcare Reception Desks: Breeding Ground for HIPAA Compromise

Your reception desk might be one of the most vulnerable locations in your entire organization for a data breach. W

A Hacking Scenario: How Hackers Choose Their Victims

See the step-by-step ways the average hacker looks for valuable data and what hacking victims should do in response to an attack.

The Importance of the PCI DSS: Why You Should Get Compliant

All businesses that handle payment card data, no matter their size or processing methods, must follow these requirements and be PCI compliant.

How Much Does a Data Breach Cost Your Organization?

Let’s take a look at some of the different costs your business could incur as a result of a data breach.

PCI vs. GDPR: What’s the Difference?

GDPR applies to any organization that processes or holds the personal data of persons residing in the European Union. PCI applies to organizations that handle credit cards from the major card brands.

Forensic FAQs

If you've experienced a data breach, you will probably need a forensic investigation to determine the cause of the breach. Here are some forensic faqs to help you understand the process of a forensic investigation.