<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-2476227841670103833</id><updated>2025-02-14T17:19:32.450-08:00</updated><category term="PCI DSS"/><category term="PCI compliance"/><category term="PCI DSS 3.2"/><category term="HIPAA"/><category term="HIPAA compliance"/><category term="PCI requirements"/><category term="data breach"/><category term="penetration testing"/><category term="GDPR"/><category term="GDPR compliance"/><category term="encryption"/><category term="hacking trends"/><category term="social engineering"/><category term="EU GDPR"/><category term="Electronic transactions association"/><category term="Penetration test"/><category term="business security"/><category term="ecommerce security"/><category term="eta conference"/><category term="incident response plan"/><category term="pen test"/><category term="security tips"/><category term="Firewall"/><category term="HIPAA security"/><category term="data security"/><category term="electronic transaction association"/><category term="healthcare security"/><category term="pci 3.2"/><category term="vulnerability scanning"/><category term="what is GDPR"/><category term="Guide to PCI Compliance"/><category term="HIPAA guide"/><category term="HIPAA requirements"/><category term="PCI 3.0"/><category term="PCI case study"/><category term="employee training"/><category term="hospitality security"/><category term="pci dss 3.0"/><category term="pci scope"/><category term="remote access"/><category term="service provider"/><category term="small business security"/><category term="vulnerability scan"/><category term="HIPAA IT compliance"/><category term="HIPAA violation examples"/><category term="P2PE"/><category term="PANscan"/><category term="PCI SSC"/><category term="PCI requirement 3"/><category term="Phishing"/><category term="SAQ"/><category term="SAQ requirements"/><category term="SSL"/><category term="cost of a data breach"/><category term="credit card data security"/><category term="hipaa audits"/><category term="hipaa firewall"/><category term="incident response"/><category term="malware"/><category term="multi-factor authentication"/><category term="network security"/><category term="pci dss compliance"/><category term="pci firewall"/><category term="pci saq"/><category term="pci saq d"/><category term="pen tester"/><category term="pentest"/><category term="physical security"/><category term="ransomware"/><category term="remote access security"/><category term="risk assessment"/><category term="security training"/><category term="service provider security"/><category term="small business security tips"/><category term="2017 data breach trends"/><category term="2fa"/><category term="3.2 SAQs"/><category term="3.2 requirements"/><category term="Cost of HIPAA"/><category term="Credit card data"/><category term="Credit card data storage"/><category term="ETA"/><category term="HIPAA compliance program"/><category term="HIPAA compliant"/><category term="HIPAA data security"/><category term="HIPAA plan"/><category term="HIPAA remote access"/><category term="HIPAA risk analysis"/><category term="HIPAA security risk assessment"/><category term="HIPAA security rule"/><category term="HIPAA security series"/><category term="Hipaa compliance software"/><category term="IT budget"/><category term="IT security"/><category term="KRACK"/><category term="KRACKAttack"/><category term="Linux vulnerability"/><category term="Log management"/><category term="Medical devices"/><category term="Microsoft vulnerability"/><category term="PANscan data"/><category term="PCI DSS scope"/><category term="PCI Requirement 1"/><category term="PCI auditor"/><category term="PCI compliance violations"/><category term="PCI forensic investigator"/><category term="PCI policy"/><category term="PCI scoping"/><category term="PCI security"/><category term="PCI tips"/><category term="POS installer"/><category term="POS malware"/><category term="Role based access control"/><category term="Security metrics"/><category term="Self-assessment questionnaire"/><category term="Social engineer"/><category term="TRANSACT 16"/><category term="TRANSACT15"/><category term="TRANSACT17"/><category term="Transact 15"/><category term="Unencrypted data"/><category term="business associate HIPAA"/><category term="business associate agreement"/><category term="card data discovery tool"/><category term="cloud data"/><category term="cloud providers"/><category term="cloud security"/><category term="compromise stories"/><category term="computer security"/><category term="cyber security tips"/><category term="data breach insurance cost"/><category term="data breach predictions"/><category term="data encryption"/><category term="data flow diagram"/><category term="email security"/><category term="firewall configuration"/><category term="firewall port"/><category term="forensic investigation"/><category term="guide to hipaa compliance"/><category term="hacking attacks"/><category term="healthcare mobile devices"/><category term="hipaa articles"/><category term="hipaa blog"/><category term="hipaa compliance cost"/><category term="hipaa compliance manual"/><category term="hotel security"/><category term="hotel segmentation"/><category term="how do I become HIPAA compliant"/><category term="how hackers hack"/><category term="log monitoring"/><category term="logging"/><category term="malware protection"/><category term="meaningful use and HIPAA"/><category term="network segmentation"/><category term="password management"/><category term="payment data security"/><category term="pci compliance company"/><category term="pci dss 3.0 release date"/><category term="pci saq c"/><category term="pci scope reduction"/><category term="pci ssc approved scanning vendor"/><category term="pci standards"/><category term="penetration tests"/><category term="physical data security"/><category term="piiscan"/><category term="risk management plan"/><category term="role-based access"/><category term="secure remote access"/><category term="security breach"/><category term="security budget"/><category term="security failures"/><category term="security policy"/><category term="security trends"/><category term="securitymetrics pci compliance"/><category term="securitymetrics review"/><category term="self assessment questionnaire"/><category term="sensitive data discovery"/><category term="sensitive data discovery tools"/><category term="small business IT security"/><category term="small business cyber security"/><category term="small business pci compliance"/><category term="social engineering definition"/><category term="social engineering examples"/><category term="software updates"/><category term="system event log"/><category term="vulnerability scanners"/><category term="what is a firewall"/><category term="what is hipaa"/><category term="what to do if hacked"/><category term="wifi security"/><category term="12-month HIPAA plan"/><category term="2 factor authentication"/><category term="2015 business trends"/><category term="2015 security trends"/><category term="2015 technology trends"/><category term="2016 PANscan study"/><category term="2016 data breach trends"/><category term="2016 data breaches"/><category term="2016 malware trends"/><category term="2018 PANscan study"/><category term="3.2 multi-factor authentication"/><category term="Approved scanning vendor"/><category term="Asv scan"/><category term="CVE-2015-0235"/><category term="Change default password"/><category term="Critical security controls"/><category term="DROWN"/><category term="Data discovery"/><category term="Data security best practices"/><category term="Data security blog"/><category term="Dental practice management"/><category term="EHR HIPAA Compliance"/><category term="EHR security"/><category term="EMV"/><category term="EMV card security"/><category term="EMV chip security"/><category term="EMV security"/><category term="Ephi security"/><category term="FTC"/><category term="FTC ruling"/><category term="Freak vulnerability"/><category term="HHS"/><category term="HIE health information exchange"/><category term="HIE security"/><category term="HIMSS"/><category term="HIPAA 2015"/><category term="HIPAA PHI"/><category term="HIPAA and meaningful use"/><category term="HIPAA and mobile devices"/><category term="HIPAA audit"/><category term="HIPAA audit requirements"/><category term="HIPAA byod"/><category term="HIPAA compliance audit"/><category term="HIPAA compliant firewall"/><category term="HIPAA data"/><category term="HIPAA firewalls"/><category term="HIPAA guidelines"/><category term="HIPAA meaningful use"/><category term="HIPAA meaningful use definition"/><category term="HIPAA password policy"/><category term="HIPAA password requirements"/><category term="HIPAA pen test"/><category term="HIPAA plans"/><category term="HIPAA privacy rule"/><category term="HIPAA report"/><category term="HIPAA risk assessment"/><category term="HIPAA risk assessment software"/><category term="HIPAA risk management plan"/><category term="HIPAA security budget"/><category term="HIPAA security plan"/><category term="HIPAA tips"/><category term="HIPAA tools"/><category term="HIPAA two factor authentication"/><category term="HIPAA wall of shame"/><category term="HIPPA"/><category term="Health information exchange"/><category term="Healthcare byod"/><category term="Hipaa compliance solutions"/><category term="Hipaa insurance coverage"/><category term="Hipaa myths"/><category term="Hipaa quiz"/><category term="Hipaa risk analysis sample"/><category term="Hipaa security policy"/><category term="Hipaa security policy template"/><category term="Hippocratic oath"/><category term="How do hackers hack"/><category term="How to become hipaa compliant"/><category term="ISO"/><category term="IT"/><category term="Information security metrics"/><category term="JavaScript security"/><category term="Level 4"/><category term="Level 4 merchant requirements"/><category term="MFA"/><category term="Managed Firewall"/><category term="Microsoft patches"/><category term="Microsoft updates"/><category term="NIST 800-30"/><category term="NIST 800-30 risk assessment"/><category term="National Cyber Security Awareness Month"/><category term="Network Inventory"/><category term="OCR"/><category term="OCR HIPAA audit protocol"/><category term="OCR audit protocol"/><category term="OS X vulnerability"/><category term="PA-DSS"/><category term="PA-DSS 3.2"/><category term="PA-DSS 3.2 changes"/><category term="PAN"/><category term="PANscan 2016"/><category term="PCI"/><category term="PCI 2.2"/><category term="PCI 3.0 changes"/><category term="PCI 3.1"/><category term="PCI 3.2 changes"/><category term="PCI 6.1"/><category term="PCI 6.6"/><category term="PCI DSS 3"/><category term="PCI DSS 3.2 SAQ"/><category term="PCI DSS 3.2.1"/><category term="PCI DSS Guide"/><category term="PCI DSS SAQs"/><category term="PCI DSS auditors"/><category term="PCI DSS audits"/><category term="PCI DSS data breach"/><category term="PCI DSS enforcement"/><category term="PCI DSS level 1"/><category term="PCI Guide"/><category term="PCI audit checklist"/><category term="PCI compliance cost"/><category term="PCI compliant firewalls"/><category term="PCI data breach"/><category term="PCI program"/><category term="PCI requirement 11"/><category term="PCI requirement 12"/><category term="PCI requirement 2"/><category term="PCI requirement 4"/><category term="PCI requirement 5"/><category term="PCI requirement 6"/><category term="PCI requirement 7"/><category term="PCI requirement 8"/><category term="PCI requirement 9"/><category term="PCI requirement failures"/><category term="PCI scope categories"/><category term="PFI"/><category term="PHI breach"/><category term="PHI deletion"/><category term="PHI diagram"/><category term="PHI encryption"/><category term="PII"/><category term="POODLE vulnerability"/><category term="POS guys"/><category term="POS installation"/><category term="POS security"/><category term="Password"/><category term="Patient data security"/><category term="Patient portal security"/><category term="Pci fines"/><category term="Pci self assessment questionnaire"/><category term="Perimeter Scan"/><category term="Petya"/><category term="Petya ransomware"/><category term="Privacy and security"/><category term="Protected health information"/><category term="QIR integrator"/><category term="QIR reseller"/><category term="RBAC"/><category term="Remote computer access"/><category term="Requirement 6"/><category term="SANS top 20 CSC"/><category term="SAQ A"/><category term="SAQ A-EP"/><category term="SAQ B"/><category term="SAQ B requirements"/><category term="SAQ B-IP"/><category term="SAQ C"/><category term="SAQ C-VT"/><category term="SAQ D"/><category term="SAQ P2PE"/><category term="SAQs"/><category term="SMB security"/><category term="SQL injection"/><category term="SSL security"/><category term="SSL vulnerability"/><category term="SSL/TLS security"/><category term="SSLv2"/><category term="Secure coding guidelines"/><category term="Security patches"/><category term="Security rule"/><category term="SecurityMetrics audit"/><category term="Securitymetrics complaints"/><category term="Sha-1"/><category term="Sha-1 vs Sha-2"/><category term="Shellshock"/><category term="Social engineering techniques"/><category term="Stage 2 meaningful use"/><category term="TLS"/><category term="TRANSACT16"/><category term="Third party vendor"/><category term="Two factor authentication"/><category term="Visa pci compliance mandate"/><category term="WannaCrypt"/><category term="Warbiking"/><category term="What is a hipaa violation"/><category term="What is two factor authentication"/><category term="What to do when hacked"/><category term="WiFi"/><category term="Windows patch management"/><category term="Windows schannel"/><category term="Winshock"/><category term="accept credit cards online"/><category term="addressable requirements"/><category term="algorithm"/><category term="android vulnerability"/><category term="anti virus"/><category term="antivirus and internet security"/><category term="antivirus security"/><category term="bad password examples"/><category term="badlock"/><category term="bash bug"/><category term="best healthcare blogs"/><category term="biometrics"/><category term="breach insurance"/><category term="breach protection"/><category term="buffer overflow"/><category term="business associate"/><category term="business associate agreement hipaa"/><category term="business associates hipaa"/><category term="business communication problems"/><category term="business email"/><category term="business email security"/><category term="business hacked"/><category term="business hacks"/><category term="business physical security"/><category term="business security solutions"/><category term="business security system"/><category term="code review"/><category term="code review tools"/><category term="coding guidelines"/><category term="completing SAQ A-EP"/><category term="compliance guide"/><category term="computer compromised what to do"/><category term="computer hacked what to do"/><category term="computer security tips"/><category term="contact center compliance"/><category term="cpu bug"/><category term="credit card compliance"/><category term="credit card finder tool"/><category term="credit card search"/><category term="credit card storage"/><category term="credit card tokenization"/><category term="credit card track data"/><category term="cross site scripting vulnerability"/><category term="cross-site scripting"/><category term="cve-2014"/><category term="cyber breach insurance"/><category term="cyber insurance"/><category term="cyber risk insurance"/><category term="cyber security insurance"/><category term="cyber security tabletop exercise"/><category term="cyberattack"/><category term="data breach insurance"/><category term="data breach plan"/><category term="data breach trends"/><category term="data loss prevention"/><category term="data security articles"/><category term="data security companies"/><category term="data security solutions"/><category term="data security tips"/><category term="data security training"/><category term="data security vulnerabilities"/><category term="data theft"/><category term="dental consulting"/><category term="dental practice business plan"/><category term="dental practice marketing"/><category term="destroying medical records"/><category term="device security"/><category term="dirty cow vulnerability"/><category term="do I have a firewall"/><category term="e-commerce"/><category term="e-commerce guidance"/><category term="e-commerce malware"/><category term="ecommerce compliance"/><category term="ecommerce payment processing"/><category term="ecommerce processing"/><category term="ecommerce shopping cart"/><category term="ecommerce solutions"/><category term="effective communication in the workplace"/><category term="electronic health record security"/><category term="email PHI"/><category term="email phishing scams"/><category term="employee data security"/><category term="encrypting email"/><category term="enterprise organizations"/><category term="event log"/><category term="event viewer"/><category term="examples of computer hacking"/><category term="filling out SAQ B"/><category term="firewall interface"/><category term="firewall logs"/><category term="firewall maintenance"/><category term="firewall management"/><category term="firewall protection"/><category term="firewall security"/><category term="firewall settings"/><category term="formal risk management"/><category term="franchise security company"/><category term="free hipaa security policy template"/><category term="full-disk encryption"/><category term="ghost bug"/><category term="ghost vulnerability"/><category term="glibc vulnerability"/><category term="good password examples"/><category term="hacker techniques tools and"/><category term="hacking examples"/><category term="hacking process"/><category term="hardware firewall"/><category term="health information technology"/><category term="health network"/><category term="healthcare acronyms"/><category term="healthcare compliance"/><category term="healthcare compliance training"/><category term="healthcare data breaches"/><category term="healthcare data security"/><category term="healthcare it security"/><category term="healthcare reception"/><category term="healthcare risk analysis"/><category term="healthcare risk management"/><category term="healthcare risk management plan"/><category term="healthcare security services"/><category term="healthcare wifi security"/><category term="heartbleed"/><category term="hipaa and electronic health records"/><category term="hipaa and mental health records"/><category term="hipaa articles 2014"/><category term="hipaa assistance"/><category term="hipaa audit checklist"/><category term="hipaa audit cost"/><category term="hipaa audit protocol"/><category term="hipaa breach insurance"/><category term="hipaa certification"/><category term="hipaa checklist"/><category term="hipaa compliance certification"/><category term="hipaa compliance consulting"/><category term="hipaa compliance requirements"/><category term="hipaa compliant email"/><category term="hipaa compliant emails"/><category term="hipaa cost"/><category term="hipaa covered entity"/><category term="hipaa document"/><category term="hipaa documentation requirements"/><category term="hipaa documents"/><category term="hipaa encryption"/><category term="hipaa facebook"/><category term="hipaa information security"/><category term="hipaa it security"/><category term="hipaa law"/><category term="hipaa logs"/><category term="hipaa mental health"/><category term="hipaa mental health records"/><category term="hipaa mobile devices"/><category term="hipaa penetration testing"/><category term="hipaa phi email"/><category term="hipaa privacy"/><category term="hipaa privacy and security"/><category term="hipaa privacy and security training"/><category term="hipaa process"/><category term="hipaa regulations"/><category term="hipaa remote access policy"/><category term="hipaa risk analysis checklist"/><category term="hipaa risk analysis software"/><category term="hipaa rules and regulations"/><category term="hipaa security compliance"/><category term="hipaa security risk analysis worksheet"/><category term="hipaa social media"/><category term="hipaa social media policy"/><category term="hipaa software"/><category term="hipaa solutions"/><category term="hipaa statistics"/><category term="hipaa survey"/><category term="hipaa test"/><category term="hipaa timeframes"/><category term="hipaa training video"/><category term="hipaa vendor"/><category term="hipaa violation"/><category term="hipaa violation cases"/><category term="hipaa vpn"/><category term="hipaa wifi rules"/><category term="hippa compliant"/><category term="hippocratic oath do no harm"/><category term="holiday security"/><category term="hospital and healthcare security"/><category term="hospitality IT"/><category term="hotel front desk technology"/><category term="hotel hack"/><category term="how much does a data breach cost"/><category term="how to be hipaa compliant"/><category term="how to delete"/><category term="how to destroy medical records"/><category term="how to grow a dental practice"/><category term="how to know if hacked"/><category term="how to permanently delete files"/><category term="how to prevent malware"/><category term="how to protect against malware"/><category term="http https"/><category term="https certificate"/><category term="incident response plan stages"/><category term="independent sales organization"/><category term="information technology"/><category term="infotech"/><category term="internal communication problems"/><category term="internal communications best practices"/><category term="intrusion detection system"/><category term="is it safe to email credit card information"/><category term="it security tips"/><category term="limited access"/><category term="linux security bug"/><category term="malware trends"/><category term="managing a data breach"/><category term="managing data breach"/><category term="managing firewalls"/><category term="mass pci compliance program"/><category term="meaningful use risk analysis"/><category term="meaningful use security risk analysis"/><category term="medical record disposal"/><category term="medjacking"/><category term="meltdown"/><category term="meltdown vulnerability"/><category term="merchant compliance"/><category term="merchant levels"/><category term="merchant security"/><category term="migrating from SSL and early TLS"/><category term="mobile device security"/><category term="mobile encryption"/><category term="mobile malware"/><category term="mobile phone security"/><category term="mobile security"/><category term="ms updates"/><category term="multi factor authentication"/><category term="multi-factor authentication requirements"/><category term="my website got hacked"/><category term="netmail"/><category term="network diagram"/><category term="network encryption"/><category term="network firewall"/><category term="network penetration test"/><category term="network scan"/><category term="network security audit"/><category term="network segmentation definition"/><category term="network segmentation security"/><category term="network segmentation strategy"/><category term="networked medical devices"/><category term="nurse responsibility"/><category term="online security"/><category term="online social engineers"/><category term="password best practices"/><category term="password security"/><category term="password tips"/><category term="patient data breach"/><category term="patient sign in sheets"/><category term="patient wifi"/><category term="payment card data"/><category term="payment card industry data security standard"/><category term="payments industry trends"/><category term="pci 3.0 compliance"/><category term="pci 3.0 penetration testing"/><category term="pci approved scanning vendor"/><category term="pci assessment"/><category term="pci auditing"/><category term="pci awareness training"/><category term="pci blog"/><category term="pci charge"/><category term="pci compliance 3.0"/><category term="pci compliance audit"/><category term="pci compliance checklist"/><category term="pci compliance email credit card information"/><category term="pci compliance requirements"/><category term="pci compliance service"/><category term="pci compliant"/><category term="pci consultants"/><category term="pci cost"/><category term="pci council"/><category term="pci definition"/><category term="pci dss 3.1"/><category term="pci dss assessment"/><category term="pci dss cost"/><category term="pci dss insurance"/><category term="pci dss network segmentation"/><category term="pci email"/><category term="pci fee merchant services"/><category term="pci insurance"/><category term="pci network segmentation"/><category term="pci questionnaire"/><category term="pci requirement"/><category term="pci scanning"/><category term="pci security standards"/><category term="pci segmentation"/><category term="pcidss"/><category term="penetration testing methodology"/><category term="penetration testing types"/><category term="pentesting"/><category term="permanently delete files"/><category term="permanently deleting PHI"/><category term="phi mobile"/><category term="phishers"/><category term="phishing campaigns"/><category term="phishing definition"/><category term="phishing email scams"/><category term="phishing emails"/><category term="phishing examples"/><category term="phishing scam"/><category term="phishing scams"/><category term="physical security best practices"/><category term="physical security policy"/><category term="point of sale companies"/><category term="point of sale equipment"/><category term="point of sale vendor"/><category term="point of sale vendors"/><category term="point to point encryption"/><category term="point to point encryption PCI"/><category term="point to point encryption solutions"/><category term="point to point security"/><category term="port scanning"/><category term="pos malware attacks"/><category term="pos vendor"/><category term="presentation"/><category term="prevent cross site scripting"/><category term="prevent vulnerabilities"/><category term="printer security"/><category term="ransomware removal"/><category term="remote access attacks"/><category term="remote desktop connection"/><category term="requirement 2"/><category term="requirement 3"/><category term="requirement 4"/><category term="requirement 5"/><category term="requirement 7"/><category term="requirement 8"/><category term="restaurant point of sale"/><category term="restricted access"/><category term="risk analysis"/><category term="risk management"/><category term="rogue access point"/><category term="router security"/><category term="router security settings"/><category term="samba vulnerability"/><category term="sample hipaa security policy"/><category term="schannel vulnerability"/><category term="scoping"/><category term="secure coding"/><category term="secure coding practice"/><category term="secure coding practices"/><category term="secure coding standards"/><category term="secure data deletion"/><category term="secure passwords"/><category term="secure programming"/><category term="security blogs"/><category term="security breach insurance"/><category term="security buy-in"/><category term="security complacency"/><category term="security consistency"/><category term="security drills"/><category term="security flaws"/><category term="security for wireless networks"/><category term="security holes"/><category term="security issues"/><category term="security metrics review"/><category term="security metrics reviews"/><category term="security metrics scam"/><category term="security requirements"/><category term="security risk analysis meaningful use"/><category term="security scan"/><category term="security updates"/><category term="security vulnerabilities"/><category term="securitymetrics scam"/><category term="segmentation checks"/><category term="segmenting networks"/><category term="service provider requirements"/><category term="sha-1 hash"/><category term="shoplift bug"/><category term="social engineering training"/><category term="social engineers"/><category term="social media policy"/><category term="software bug"/><category term="software firewall"/><category term="spear phishing"/><category term="spectre"/><category term="ssl 3.0"/><category term="ssl 3.0 vulnerability"/><category term="storing credit card information"/><category term="system hardening"/><category term="system hardening standards"/><category term="system logs"/><category term="system vulnerability"/><category term="tabletop exercise"/><category term="third party security"/><category term="third party security assessment"/><category term="tokenization"/><category term="tokenize"/><category term="training"/><category term="transact"/><category term="transact 17"/><category term="two-factor authentication"/><category term="types of penetration testing"/><category term="types of penetration tests"/><category term="vulnerabilities"/><category term="vulnerability"/><category term="vulnerability management"/><category term="vulnerability scanner"/><category term="vulnerability scanning tools"/><category term="vulnerability scans"/><category term="wardriving"/><category term="web app"/><category term="web application"/><category term="web application firewall"/><category term="web application penetration test"/><category term="website hacked"/><category term="website security certificates"/><category term="what antivirus should I use"/><category term="what are service provider levels"/><category term="what is PCI DSS"/><category term="what is TLS security"/><category term="what is a business associate agreement"/><category term="what is a pci fee"/><category term="what is cross site scripting"/><category term="what is hipaa compliance"/><category term="what is http"/><category term="what is https"/><category term="what is pci"/><category term="what is pci 3.0"/><category term="what is penetration test methodology"/><category term="what is penetration testing"/><category term="what is physical security"/><category term="what is point to point encryption"/><category term="what is remote access"/><category term="what is shellshock"/><category term="what is social engineering"/><category term="what is ssl"/><category term="what should my password be"/><category term="why is EMV more secure"/><category term="wireless access point"/><category term="wireless router security"/><category term="wireless security"/><title type='text'>SecurityMetrics Blog</title><subtitle type='html'>Get network security tips, HIPAA information, PCI videos, and general data security news to help your organization keep data safe from hackers.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://blog.securitymetrics.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default?start-index=26&amp;max-results=25'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12284549656822058893</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>340</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-8104962395513455641</id><published>2018-07-17T15:16:00.001-07:00</published><updated>2018-08-16T15:09:07.274-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cloud data"/><category scheme="http://www.blogger.com/atom/ns#" term="cloud providers"/><category scheme="http://www.blogger.com/atom/ns#" term="cloud security"/><category scheme="http://www.blogger.com/atom/ns#" term="service provider"/><category scheme="http://www.blogger.com/atom/ns#" term="service provider security"/><title type='text'>Cloud Security: What Businesses Need to Know</title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/cloud-security-what-businesses-need-know&#39; /&gt;

&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;113&quot; src=&quot;https://1.bp.blogspot.com/-4P8q4kzHEFg/W05pL6q7w7I/AAAAAAAABqs/8s8_X4w16P4AUw5wy-rtfSaVbchAE-dlgCLcBGAs/s200/Top%2BCloud%2BSecurity%2BControls_Image_Blog.png&quot; style=&quot;display: none;&quot; width=&quot;200&quot; /&gt;

&lt;br /&gt;
&lt;h3&gt;
Top Cloud Security Controls Organizations Should Be Using.&lt;/h3&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-rhAzGhKw5CU/WgxwjnhZQtI/AAAAAAAAANs/fCA-6JV2IjUZMWvbeiBM6g3JU8PAm2WjQCPcBGAYYCw/s1600/adnan.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;200&quot; data-original-width=&quot;200&quot; height=&quot;100&quot; src=&quot;https://2.bp.blogspot.com/-rhAzGhKw5CU/WgxwjnhZQtI/AAAAAAAAANs/fCA-6JV2IjUZMWvbeiBM6g3JU8PAm2WjQCPcBGAYYCw/s200/adnan.png&quot; width=&quot;100&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Adnan Raja&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
Because securing data within the Cloud is complex, having a standard set of protective controls is pivotal to keep your customers safe and avoid expensive data breaches.&lt;br /&gt;
&lt;br /&gt;
In this post, we’ll review an incident from last year to demonstrate the breadth of controls that should be established, as well as the difficult position in which any security event can place you. Reviewing key controls gives you a specific path forward to secure your critical Cloud data.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Human error exposes personal data&lt;/h4&gt;
&lt;br /&gt;
&lt;a href=&quot;https://money.cnn.com/2017/07/12/technology/verizon-data-leaked-online/index.html&quot;&gt;In July 2017&lt;/a&gt;, Verizon experienced a security incident that made national headlines in the United States. While no hack took place and no customer information was taken, the data was publicly exposed. A partner of the organization was using a data set from the telecommunications company to test and suggest changes to a self-service portal. A member of the third party&#39;s staff mistakenly set up the data’s cloud storage to permit external access.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://4.bp.blogspot.com/-0su1aqhxpX4/W05pLzy6x8I/AAAAAAAABqw/Xl25QuOtyyIQxQ_-q-QDRSOmDytjUBvpgCLcBGAs/s1600/Top%2BCloud%2BSecurity%2BControls_Image.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;292&quot; data-original-width=&quot;273&quot; height=&quot;200&quot; src=&quot;https://4.bp.blogspot.com/-0su1aqhxpX4/W05pLzy6x8I/AAAAAAAABqw/Xl25QuOtyyIQxQ_-q-QDRSOmDytjUBvpgCLcBGAs/s200/Top%2BCloud%2BSecurity%2BControls_Image.png&quot; width=&quot;186&quot; /&gt;&lt;/a&gt;As far as security events go, this one may not seem important. Forensic analysis determined that only one unauthorized user viewed it – a researcher at UpGuard, who immediately alerted someone to the problem. However, Verizon still had to spend time and resources responding to the incident. Plus, thrust into the security news spotlight, Verizon may have lost some credibility by reporting that &quot;&lt;a href=&quot;https://www.verizon.com/about/news/verizon-responds-report-confirms-no-loss-or-theft-customer-information&quot;&gt;there was a limited amount of personal data included&lt;/a&gt;.&quot; The notion of the personal data as “limited” was also used by the third-party provider, NICE systems, which &lt;a href=&quot;https://www.forbes.com/sites/leemathews/2017/07/13/millions-of-verizon-customers-exposed-by-third-party-leak/#2d40b5312836&quot;&gt;called the data&lt;/a&gt; “limited information for a specific project.&quot;&lt;br /&gt;
&lt;br /&gt;
Despite these descriptions, the data was that of 6 million unique customers, including their names, phone numbers, addresses, and account PINs. UpGuard noted that this information would’ve enabled a nefarious party to transfer a phone number to a new SIM card, among other possibilities.&lt;br /&gt;
&lt;br /&gt;
This story is important because it demonstrates the effects of security incidents, regardless of whether the information is taken or not. Plus, as indicated by &lt;a href=&quot;https://www.csoonline.com/article/3208905/cloud-security/top-cloud-security-controls-you-should-be-using.html&quot;&gt;Fahmida Y. Rashid&lt;/a&gt;, the incident highlighted the fact that both cloud service providers (CSP) and companies must hold themselves accountable for &lt;a href=&quot;http://blog.securitymetrics.com/2015/10/ensuring-cloud-security-not-know.html&quot;&gt;cloud security&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Key cloud security controls&lt;/h4&gt;
&lt;br /&gt;
Misconfiguration is not the only issue that can arise when attempting to &lt;a href=&quot;https://www.atlantic.net/cloud-hosting/how-secure-is-the-cloud/&quot;&gt;keep cloud systems secure&lt;/a&gt;. These six controls are key to protecting your customer data, as well as any other information, in cloud environments:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;#1. Understand your responsibilities.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
One initial concern is that organizations don’t understand their role in protecting customer data. For example, most infrastructure cloud service environments place responsibility on the customer to properly safeguard the information, configure the operating system, and manage apps. Ask your cloud hosting provider what your responsibility is related to each of these security controls.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;#2. Audit business and operational processes.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Audits are critical to ensuring compliance with standards from your own policies and procedures, as well as those from government regulators and industry groups (think &lt;a href=&quot;https://www.securitymetrics.com/pci&quot;&gt;PCI compliance&lt;/a&gt; or &lt;a href=&quot;https://www.atlantic.net/hipaa-compliant-hosting/what-is-healthcare-hosting-hipaa/&quot;&gt;HIPAA-compliant Hosting&lt;/a&gt;). You want to see a third-party auditor&#39;s report from your cloud provider; a typical report is a “Statement on Standards for Attestation Engagements 18” (SSAE 18, formerly SSAE 16) from the American Institute of Certified Public Accountants (AICPA).&lt;br /&gt;
&lt;br /&gt;
The &lt;a href=&quot;http://www.cloud-council.org/deliverables/CSCC-Security-for-Cloud-Computing-10-Steps-to-Ensure-Success.pdf&quot;&gt;Cloud Standards Customer Council&lt;/a&gt; noted that &quot;the level of access to essential audit information is a key consideration of contracts and SLA terms with any cloud service provider.&quot; Your expectation should be that you can quickly get access to audit logs, events, and documentation pertaining to your apps and data.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;#3. Set up access controls.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Use the identity and access control mechanisms that are available through your CSP.&lt;br /&gt;
&lt;br /&gt;
Keep permissions for users as low as you possibly can when you set up your access and identity control policies, temporarily bumping them up as needed. Tighten the focus of security groups, and utilize reference security groups IDs when you can.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;#4. Protect the data.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Risk is the key consideration for data safeguards in the cloud, including the following:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;risk of retaining data beyond the necessary timeframe;&lt;/li&gt;
&lt;li&gt;risk of unauthorized changes to data;&lt;/li&gt;
&lt;li&gt;risk of data unavailability or loss; and&lt;/li&gt;
&lt;li&gt;risk of unauthorized disclosure or theft.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
To explore this issue through prominent standards, see ISO/IEC 27002 and ISO/IEC 27017 from the &lt;a href=&quot;https://www.iso.org/home.html&quot;&gt;International Organization for Standardization&lt;/a&gt; and &lt;a href=&quot;http://www.iec.ch/&quot;&gt;International Electrotechnical Commission&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;#5. Optimize your visibility.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
You want to leverage all the monitoring and logging tools that are offered by your cloud service provider to give you immediate knowledge of unauthorized access. The information you can get from these tools typically includes: records of API calls, source IP addresses, times placed, and contents of the requests.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;#6. Safeguard your keys.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Keep your cloud services access keys protected. Train developers so that leaks are avoided through forums such as source code repositories, &lt;a href=&quot;https://github.com/kubernetes/dashboard&quot;&gt;Kubernetes dashboards&lt;/a&gt;, and public websites. You want a unique key for each cloud service, with access restricted to the minimum permissions possible.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Controlling cloud security&lt;/h4&gt;
&lt;br /&gt;
While it might seem complicated to protect cloud systems, it is possible to properly safeguard your ecosystem with the right set of controls. The importance of considering various controls is highlighted every time an organization exposes critical information. To bolster your defensive posture and avoid various costs and hits to your credibility that arise following a cloud security incident, focus on the above six controls.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://2.bp.blogspot.com/-zmJbW-y-bEI/WrwbKAo7tNI/AAAAAAAABSQ/Z8FEy74oP_Ag8CznKAArUXzpyiIKSfnLQCPcBGAYYCw/s1600/2018%2BPCI%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Adnan Raja has been the Vice President of Marketing at &lt;a href=&quot;http://atlantic.net/&quot;&gt;atlantic.net&lt;/a&gt; for 14 years. During Raja’s tenure, the Orlando-based, privately held hosting company has grown from having a primarily regional presence to garnering and developing attention nationwide and internationally. In collaboration with a skilled and dedicated team, Raja has successfully led a full spectrum of marketing campaigns, as well as handling PR work with major news outlets and the formation of key strategic alliances.&lt;/i&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/8104962395513455641'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/8104962395513455641'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2018/07/cloud-security-what-businesses-need-to_17.html' title='Cloud Security: What Businesses Need to Know'/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-4P8q4kzHEFg/W05pL6q7w7I/AAAAAAAABqs/8s8_X4w16P4AUw5wy-rtfSaVbchAE-dlgCLcBGAs/s72-c/Top%2BCloud%2BSecurity%2BControls_Image_Blog.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-2794268547323785455</id><published>2018-07-12T12:25:00.000-07:00</published><updated>2018-08-16T15:08:02.850-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="pen test"/><category scheme="http://www.blogger.com/atom/ns#" term="penetration testing"/><category scheme="http://www.blogger.com/atom/ns#" term="pentesting"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerability scan"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerability scanning"/><title type='text'>Pentesting vs Vulnerability Scanning: What’s the Difference?</title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/pentesting-vs-vulnerability-scanning-whats-difference&#39; /&gt;

&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;182&quot; src=&quot;https://1.bp.blogspot.com/-nrhgL8vA71E/W0eYOpnbs7I/AAAAAAAABqM/cUU86dt08Xwzn92aNVJD7TeH_rFG-FJ9QCLcBGAs/s320/Pen%2Btest%2Bvs%2Bvulnerability%2Bscanning_Blog.jpg&quot; style=&quot;display: none;&quot; width=&quot;320&quot; /&gt;

&lt;br /&gt;
&lt;h3&gt;
Two very different ways to test your systems for vulnerabilities.&amp;nbsp;&lt;/h3&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://blog.securitymetrics.com/search?q=gary+glover&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Gary Glover, Dir of Security Assessment at SecurityMetrics&quot; border=&quot;0&quot; height=&quot;100&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzhLA0V0-bcXVJcazU7oOjR8cnChEgd4x5FT_rb9i_nI87HGfZfdlqPConOojK8MRPfzvDWg1sLY2k95ROnNMYC-pilojOgHQZIvQgCGKKS6IbRamqbnNd1-dvI3N_jdvQevh0IumU59I/s200/Gary_Glover_blog.png&quot; title=&quot;&quot; width=&quot;100&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;By: Gary Glover&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
Penetration testing and vulnerability scanning are often confused for the same service. And, business owners sometimes purchase one when they really need the other.&amp;nbsp;  &lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://1.bp.blogspot.com/-nrhgL8vA71E/W0eYOpnbs7I/AAAAAAAABqM/cUU86dt08Xwzn92aNVJD7TeH_rFG-FJ9QCLcBGAs/s1600/Pen%2Btest%2Bvs%2Bvulnerability%2Bscanning_Blog.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;182&quot; src=&quot;https://1.bp.blogspot.com/-nrhgL8vA71E/W0eYOpnbs7I/AAAAAAAABqM/cUU86dt08Xwzn92aNVJD7TeH_rFG-FJ9QCLcBGAs/s320/Pen%2Btest%2Bvs%2Bvulnerability%2Bscanning_Blog.jpg&quot; style=&quot;display: none;&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;A vulnerability scan is an automated, high-level test that looks for and &lt;a href=&quot;http://blog.securitymetrics.com/2016/10/top-5-security-vulnerabilities.html&quot;&gt;potential vulnerabilities&lt;/a&gt;. A penetration test is an exhaustive, live examination designed to exploit weaknesses in your system.&amp;nbsp; Both types of testing can be performed on systems exposed to the Internet or only exposed on your internal network.&lt;br /&gt;
&lt;br /&gt;
This post will dive deeper into the differences between the two tests.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
What is a vulnerability scan?&lt;/h4&gt;
&lt;a href=&quot;https://2.bp.blogspot.com/-umkoughTbeI/W0eYOh_VWfI/AAAAAAAABqU/v5vM6ZM3J1YtCVimi9ESRWed8ul9oASHQCLcBGAs/s1600/pen%2Btest%2Bvs%2Bvulnerability%2Bscan%2Bblog%2Bicon%2B1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;pentest, pen testing, penetration test, vulnerability scan&quot; border=&quot;0&quot; data-original-height=&quot;292&quot; data-original-width=&quot;273&quot; height=&quot;200&quot; src=&quot;https://2.bp.blogspot.com/-umkoughTbeI/W0eYOh_VWfI/AAAAAAAABqU/v5vM6ZM3J1YtCVimi9ESRWed8ul9oASHQCLcBGAs/s200/pen%2Btest%2Bvs%2Bvulnerability%2Bscan%2Bblog%2Bicon%2B1.jpg&quot; title=&quot;&quot; width=&quot;186&quot; /&gt;&lt;/a&gt;Also known as vulnerability assessments, vulnerability scans assess computers, systems, and networks for security weaknesses. These scans are typically automated and give a first look into what vulnerabilities are present and could possibly be exploited.&lt;br /&gt;
&lt;br /&gt;
High-quality vulnerability scans can search for over 50,000 vulnerabilities and are required by some cyber security mandates (PCI DSS, FFIEC, and GLBA, etc.) but regardless of requirements, this type of scanning is a mainstay of cybersecurity threat prevention for any company wanting to protect their digital data.&lt;br /&gt;
&lt;br /&gt;
Vulnerability scans can be instigated manually or scheduled on an automated basis, and will complete in as little as several minutes, to as long as several hours.&amp;nbsp; These scans should be conducted at a minimum on all systems exposed to the Internet (for example, web servers, mail servers, etc. living in a DMZ).&amp;nbsp; To be thorough they should also be conducted on all systems exposed on your internal network to detect vulnerabilities that could be exploited by data thieves if they happen to get past your edge defenses.&lt;br /&gt;
&lt;br /&gt;
Vulnerability scans are a passive approach to vulnerability management, because they don’t go beyond reporting on vulnerabilities that are detected. It’s up to the business owner or his/her IT staff to patch weaknesses on a prioritized basis or confirm that a discovered vulnerability is a false positive, then rerun the scan.&lt;br /&gt;
&lt;br /&gt;
To ensure the most important vulnerabilities are being scanned for, vulnerability scans should be conducted by a skilled team or well-known vulnerability scanning company. In the case of PCI DSS compliance you must use a&amp;nbsp;&lt;a href=&quot;http://blog.securitymetrics.com/2015/07/10-ASV-qualities.html&quot; target=&quot;_blank&quot;&gt;PCI Approved Scanning Vendor, or ASV&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
See Also:&amp;nbsp;&lt;a href=&quot;http://blog.securitymetrics.com/2015/11/spotting-vulnerabilities-antiquated.html&quot; target=&quot;_blank&quot;&gt;Spotting Vulnerabilities – Is Vulnerability Scanning Antiquated?&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Reporting&lt;/b&gt;&lt;br /&gt;
After scan completion, a report will generate. Typically, vulnerability scans generate an extensive list of vulnerabilities found and references for further research on the vulnerability. Some even offer directions on how to fix the problem.&lt;br /&gt;
&lt;br /&gt;
The report identifies any identified weaknesses, but sometimes includes false positives. A false positive is when a scan identifies a threat that’s not real. Sifting through real vulnerabilities and false positives can be a chore, especially if many are falsely identified.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Benefits of a vulnerability scan&lt;/b&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Quick, high-level look at possible vulnerabilities&lt;/li&gt;
&lt;li&gt;Very affordable (~$100 per IP, per year, depending on the scan vendor)&lt;/li&gt;
&lt;li&gt;Automatic (can be automated to run weekly, monthly, quarterly, etc.)&lt;/li&gt;
&lt;li&gt;Takes minutes&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;Limitations of a vulnerability scan&lt;/b&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;False positives&lt;/li&gt;
&lt;li&gt;Businesses must manually check each vulnerability before testing again&lt;/li&gt;
&lt;li&gt;Does not confirm that a vulnerability is possible to exploit&lt;/li&gt;
&lt;/ul&gt;
See Also: &lt;a href=&quot;http://blog.securitymetrics.com/2015/10/picking-your-vulnerability-scanner.html&quot; target=&quot;_blank&quot;&gt;Picking Your Vulnerability Scanner: The Questions You Should Ask&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
What is a penetration test?&lt;/h4&gt;
&lt;a href=&quot;https://2.bp.blogspot.com/-CbUS5kRckEo/W0eYOtFUL7I/AAAAAAAABqQ/RKKeOrVpiNc3jWKanZpoYFy1F9CBUmNDgCLcBGAs/s1600/pen%2Btest%2Bvs%2Bvulnerability%2Bscan%2Bblog%2Bicon%2B2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;pentesting, pen test, penetration test, vulnerability scan&quot; border=&quot;0&quot; data-original-height=&quot;292&quot; data-original-width=&quot;273&quot; height=&quot;200&quot; src=&quot;https://2.bp.blogspot.com/-CbUS5kRckEo/W0eYOtFUL7I/AAAAAAAABqQ/RKKeOrVpiNc3jWKanZpoYFy1F9CBUmNDgCLcBGAs/s200/pen%2Btest%2Bvs%2Bvulnerability%2Bscan%2Bblog%2Bicon%2B2.jpg&quot; title=&quot;&quot; width=&quot;186&quot; /&gt;&lt;/a&gt;A &lt;a href=&quot;http://blog.securitymetrics.com/2016/12/types-of-penetration-testing-what-why-how.html&quot;&gt;penetration test&lt;/a&gt;&amp;nbsp;simulates a hacker attempting to get into a business system through the exploitation of vulnerabilities. Actual analysts, often called ethical hackers, try to prove that vulnerabilities can be exploited. Using methods like password cracking, buffer overflow, and SQL injection, they attempt to compromise and extract data from a network.&lt;br /&gt;
&lt;div class=&quot;&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a class=&quot;cta-pci&quot; href=&quot;http://bit.ly/1gk1QrK&quot; style=&quot;color: white;&quot; target=&quot;_blank&quot;&gt;Follow for more data security articles like this&lt;/a&gt; &lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Penetration testing of both external and internal systems is a very effective approach to finding vulnerabilities that need to be removed and is considered an essential element of any good security program. This type of testing is required as per PCI DSS, FFIEC, and GLBA regulations.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
SEE ALSO:&amp;nbsp;&lt;a href=&quot;http://blog.securitymetrics.com/2016/09/new-32-requirements-for-penetration-testing.html&quot;&gt;New 3.2 Requirements for Penetration Testing and Segmentation: What You Don’t Know&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
The cost of a penetration test can run between $5,000 to over $70,000, but it depends on how many IPs are tested and the size of tested web applications. Learn more about the&amp;nbsp;&lt;a href=&quot;http://blog.securitymetrics.com/2015/04/penetration-test-cost.html&quot;&gt;cost of penetration testing&lt;/a&gt;. &lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
The main aspect that differentiates penetration testing from vulnerability scanning is the live human element. There is no such thing as an automated penetration test. True penetration tests are conducted by real people.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;Penetration testers are well versed in:&lt;/b&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Black hat attack methodologies (e.g., remote access attacks, SQL injection)&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Internal and external testing (i.e., perspective of someone within the network, perspective of hacker over Internet)&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Web front-end technologies (e.g.,Javascript, HTML)&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Web application programming languages (e.g., Python, PHP)&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Web APIs (e.g., restful, SOAP)&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Network technologies (e.g, firewalls, IDS)&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Networking protocols (e.g., TCP/UDP, SSL)&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Operating systems (e.g., Linux, Windows)&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Scripting languages (e.g., python, pearl)&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Testing tools (e.g., Nessus, Metasploit)&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
In short, penetration testers provide a deep and detailed look into the data security of an organization.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
SEE ALSO:&amp;nbsp;&lt;a href=&quot;http://blog.securitymetrics.com/2017/01/what-types-of-penetration-tests-you-need.html&quot;&gt;Different Types of Penetration Tests for Your Business Needs&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;Reporting&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Typically, penetration test reports are long and contain a description of testing methodologies, attacks used, detailed findings, and suggestions for remediation.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;Benefits of a penetration test&lt;/b&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Live, manual tests mean more accurate and thorough results&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Rules out false positives&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Usually performed annually or after a significant change&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;Limitations of a penetration test&lt;/b&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Time (1 day to 3 weeks)&lt;/li&gt;
&lt;li style=&quot;text-align: left;&quot;&gt;Cost ($5,000 to $70,000)&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
Which is better? A vulnerability scan or penetration test?&lt;/h4&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Both tests work together to validate optimal network security. Vulnerability scans are for weekly, monthly, or quarterly insight into your network security, while penetration tests are a more thorough way to deeply examine your network security. Yes, penetration tests are expensive, but you are paying a professional to examine every nook and cranny of your business the way a real-world attacker would.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
The difference is comparable to that between a fuzzy x-ray image and a clear, 3-D MRI. X-rays are great for small, quick problems (V/A scan) but an MRI (PenTest) is needed for deeper, more complicated problems. Get an MRI for your network.&lt;/div&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/penetration-testing-request&quot;&gt;Interested in a penetration test for your business?&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;i&gt;Gary Glover (CISSP, CISA, QSA, PA-QSA) is Senior Vice President of Assessments at &lt;a href=&quot;https://www.securitymetrics.com/&quot; target=&quot;_blank&quot;&gt;SecurityMetrics&lt;/a&gt; with over 10 years of &lt;a href=&quot;https://www.securitymetrics.com/pci-audit&quot; target=&quot;_blank&quot;&gt;PCI audit&lt;/a&gt; experience and 25 years of Star Trek quoting skills. Live long and prosper as you visit his other &lt;a href=&quot;http://blog.securitymetrics.com/search?q=gary+glover&quot; target=&quot;_blank&quot;&gt;blog posts&lt;/a&gt;.&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://2.bp.blogspot.com/-zmJbW-y-bEI/WrwbKAo7tNI/AAAAAAAABSQ/Z8FEy74oP_Ag8CznKAArUXzpyiIKSfnLQCPcBGAYYCw/s1600/2018%2BPCI%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/2794268547323785455'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/2794268547323785455'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2015/05/pentesting-vs-vulnerability-scanning.html' title='Pentesting vs Vulnerability Scanning: What’s the Difference?'/><author><name>SecurityMetrics</name><uri>http://www.blogger.com/profile/07857472080352783747</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOObapsiepRZnDmD0BRhS7ISZbjX7e1hlVCU7MSt_fviOxZFnERYVXo4COBPm1Jxb8E_diq6nPDo-28CKN_dBCXnTNG7wulKJjo2VT5cqk4354ItXYfzl-6S66D1FOAg/s220/Social+Media+profile+pic-04.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-nrhgL8vA71E/W0eYOpnbs7I/AAAAAAAABqM/cUU86dt08Xwzn92aNVJD7TeH_rFG-FJ9QCLcBGAs/s72-c/Pen%2Btest%2Bvs%2Bvulnerability%2Bscanning_Blog.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-5190301615354721895</id><published>2018-07-03T12:53:00.000-07:00</published><updated>2018-08-16T15:08:20.807-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="EU GDPR"/><category scheme="http://www.blogger.com/atom/ns#" term="GDPR"/><category scheme="http://www.blogger.com/atom/ns#" term="GDPR compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="what is GDPR"/><title type='text'>PCI vs. GDPR: What’s the Difference? </title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/pci-vs-gdpr-whats-difference&#39; /&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://1.bp.blogspot.com/-KcK-Qn5U8qQ/WzvWTHnNcqI/AAAAAAAABp4/CRgTYq13spQEzMhHtBBoBqIHhqOlN_YXwCLcBGAs/s1600/PCI%2Bvs.%2BGDPR%2BBlog.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;915&quot; data-original-width=&quot;1600&quot; height=&quot;182&quot; src=&quot;https://1.bp.blogspot.com/-KcK-Qn5U8qQ/WzvWTHnNcqI/AAAAAAAABp4/CRgTYq13spQEzMhHtBBoBqIHhqOlN_YXwCLcBGAs/s320/PCI%2Bvs.%2BGDPR%2BBlog.jpg&quot; style=&quot;display: none;&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h3&gt;
Learn the important differences between the two security standards.&lt;/h3&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-2AxOFb_U0iY/WzukYlrVsMI/AAAAAAAABpE/vPskxqT2Bbs_goMXUltNCwgz-WK7Dm1DgCPcBGAYYCw/s1600/Jonas%2BDeOliveira_square.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1056&quot; data-original-width=&quot;1056&quot; height=&quot;100&quot; src=&quot;https://2.bp.blogspot.com/-2AxOFb_U0iY/WzukYlrVsMI/AAAAAAAABpE/vPskxqT2Bbs_goMXUltNCwgz-WK7Dm1DgCPcBGAYYCw/s320/Jonas%2BDeOliveira_square.jpg&quot; width=&quot;100&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Jonas De Oliveira&lt;br /&gt;
CISSP, QSA, CPA, CISA&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
If you are a merchant and already deal with &lt;a href=&quot;https://www.securitymetrics.com/pci&quot;&gt;PCI compliance&lt;/a&gt;, you’ve probably heard about the recently implemented EU mandate: General Data Protection Regulation (GDPR). You may be wondering: Does the GDPR apply to me if I only take credit cards? If I comply with PCI DSS, does that make me GDPR compliant? Do GDPR and PCI DSS do the same thing?&lt;br /&gt;
&lt;br /&gt;
Remember that the GDPR applies to any organization that processes or holds the personal data of persons residing in the European Union, whether or not the organization itself is located in the EU. It applies to data processors and controllers.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://3.bp.blogspot.com/-PysFpFfooYk/WzvWV_u7liI/AAAAAAAABp8/xXHsn8m2C4AIYzb26t3zPiO8qWJjsf8ggCLcBGAs/s1600/PCI%2Bvs.%2BGDPR%2Bicon.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;PCI, GDPR, PCI compliance&quot; border=&quot;0&quot; data-original-height=&quot;292&quot; data-original-width=&quot;273&quot; height=&quot;200&quot; src=&quot;https://3.bp.blogspot.com/-PysFpFfooYk/WzvWV_u7liI/AAAAAAAABp8/xXHsn8m2C4AIYzb26t3zPiO8qWJjsf8ggCLcBGAs/s200/PCI%2Bvs.%2BGDPR%2Bicon.jpg&quot; title=&quot;&quot; width=&quot;186&quot; /&gt;&lt;/a&gt;&lt;b&gt;Learn about data processors and controllers in our GDPR blog series:&lt;/b&gt; &lt;a href=&quot;http://blog.securitymetrics.com/2018/02/GDPR-should-I-be-worried.html&quot;&gt;Part 1&lt;/a&gt;, &lt;a href=&quot;http://blog.securitymetrics.com/search?q=gdpr+part+2&quot;&gt;Part 2&lt;/a&gt;, &lt;a href=&quot;http://blog.securitymetrics.com/2018/05/gdpr-101-part-3-what-should-i-do-now.html&quot;&gt;Part 3&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
The PCI Data Security Standard (DSS) applies to organizations that handle credit cards from the major card brands. Both are mandates that contain best practices for securing personal data and protecting the privacy of individuals.&lt;br /&gt;
&lt;br /&gt;
Here are some of the main differences between PCI DSS and GDPR:&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
1. Scope of relevant data&lt;/h4&gt;
&lt;br /&gt;
First, one of the most important aspects to understand about PCI and GDPR is &lt;a href=&quot;http://blog.securitymetrics.com/2017/04/pci-scope-categories-keeping-your-data-separate.html&quot;&gt;scope&lt;/a&gt;. Because GDPR encompasses all personally identifiable data (PII) of persons in the EU, its scope is much, much larger than the PCI DSS. Compared to GDPR, the PCI DSS applies to a very small subset of data: cardholder data. Cardholder data--while still considered PII--is a small portion of all the personal data covered by the GDPR.&lt;br /&gt;
&lt;br /&gt;
So, if all you take is credit cards, but some of those credit cards are of EU citizens, then yes—the GDPR applies to you. With all the types and subsets of EU citizen personal data, it’s likely that your business may store, transmit, or process some GDPR-relevant data.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a class=&quot;cta-pci&quot; href=&quot;http://bit.ly/1gk1QrK&quot; style=&quot;color: white;&quot; target=&quot;_blank&quot;&gt;Follow for more data security articles like this&lt;/a&gt; &lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
The graph below illustrates the difference between the PCI DSS scope and the GDPR scope.&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://1.bp.blogspot.com/-ucbWH-MLwSU/WzqZVVKMsAI/AAAAAAAABo0/Empcu8QIJNoyZFmqDxyoKmihZHUiER4bgCPcBGAYYCw/s1600/GDPR%2Bvs%2BPCI%2BTable-02%2B%25281%2529.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1239&quot; data-original-width=&quot;1600&quot; height=&quot;494&quot; src=&quot;https://1.bp.blogspot.com/-ucbWH-MLwSU/WzqZVVKMsAI/AAAAAAAABo0/Empcu8QIJNoyZFmqDxyoKmihZHUiER4bgCPcBGAYYCw/s640/GDPR%2Bvs%2BPCI%2BTable-02%2B%25281%2529.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
2. The processes covered by PCI DSS and GDPR&lt;/h4&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
The PCI DSS is intended to prevent merchant data breaches and protect cardholders, customers, and the payment ecosystem. To do so, it is used to regulate the storage, processing, and transmission of cardholder data.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Compare that to the GDPR, which aims to protect individual data subject rights by regulating the processing of personally identifiable information in a much broader sense, not just the actual charging of a payment card. The GDPR defines processing as “any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction,” article 4, paragraph 2.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Where PCI DSS is concerned with a few major data elements, GDPR is concerned with any non-personal use of personal information.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2018/03/gdpr-faqs.html&quot;&gt;GDPR FAQs&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
3. Security vs. Privacy&lt;/h4&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
At the heart of GDPR is the duty to protect the privacy of data subjects by preventing misuse, theft, or unlawful disclosure of their sensitive personal data. GDPR puts the individual in charge of their own data and grants them specific, legal rights to protect and control it. GDPR requires that organizations provide persons in the EU the means to exercise those rights.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
At the heart of the PCI DSS is a duty to protect cardholder data from hackers and cybercriminals and keep the entire payments ecosystem safe. This data security standard, first put forth by major card brands in 2006, is concerned with the day-to-day practices of data security: firewall management, encryption, anti-virus, and the like.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2018/02/piiscan-find-and-secure-unencrypted.html&quot;&gt;PIIscan: Find and Secure Unencrypted Personal Data&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
The following table outlines more of the important differences between GDPR and PCI:&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;a href=&quot;https://2.bp.blogspot.com/-sYuZ5JppVsM/WzvNGyig9RI/AAAAAAAABpw/tcDNLP3k32YdLDZ1PPTBD9fHzXPcbBh_wCPcBGAYYCw/s1600/Screen%2BShot%2B2018-07-03%2Bat%2B1.20.51%2BPM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;GDPR, PCI, PCI DSS&quot; border=&quot;0&quot; data-original-height=&quot;809&quot; data-original-width=&quot;862&quot; height=&quot;600&quot; src=&quot;https://2.bp.blogspot.com/-sYuZ5JppVsM/WzvNGyig9RI/AAAAAAAABpw/tcDNLP3k32YdLDZ1PPTBD9fHzXPcbBh_wCPcBGAYYCw/s640/Screen%2BShot%2B2018-07-03%2Bat%2B1.20.51%2BPM.png&quot; title=&quot;&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
If you have questions about &lt;a href=&quot;https://www.securitymetrics.com/gdpr-defense&quot;&gt;GDPR&lt;/a&gt;, &lt;a href=&quot;https://www.securitymetrics.com/pci&quot;&gt;PCI compliance&lt;/a&gt;, &lt;a href=&quot;https://www.securitymetrics.com/hipaa&quot;&gt;HIPAA&lt;/a&gt;, or &lt;a href=&quot;https://www.securitymetrics.com/security-consulting&quot;&gt;general data security&lt;/a&gt;, please &lt;a href=&quot;https://www.securitymetrics.com/contact&quot;&gt;contact us here&lt;/a&gt;.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;i&gt;Jonas De Oliveira is a Security Analyst for SecurityMetrics. He holds CISSP, QSA, CPA and CISA certifications. Jonas has over 12 years’ experience in the data security industry. In addition to assessing companies’ level of PCI compliance, Jonas has been integral in assisting clients prepare to demonstrate GDPR compliance. He graduated with a master’s from University of Utah in accounting with an emphasis in information systems.&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://2.bp.blogspot.com/-zmJbW-y-bEI/WrwbKAo7tNI/AAAAAAAABSQ/Z8FEy74oP_Ag8CznKAArUXzpyiIKSfnLQCPcBGAYYCw/s1600/2018%2BPCI%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/5190301615354721895'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/5190301615354721895'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2018/07/pci-vs-gdpr-whats-difference.html' title='PCI vs. GDPR: What’s the Difference? '/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-KcK-Qn5U8qQ/WzvWTHnNcqI/AAAAAAAABp4/CRgTYq13spQEzMhHtBBoBqIHhqOlN_YXwCLcBGAs/s72-c/PCI%2Bvs.%2BGDPR%2BBlog.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-1752644624166920470</id><published>2018-06-22T10:26:00.001-07:00</published><updated>2018-08-16T15:22:42.233-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="data flow diagram"/><category scheme="http://www.blogger.com/atom/ns#" term="network diagram"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI Requirement 1"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI requirements"/><title type='text'>Network Diagrams: Key to Compliance and Security </title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/network-diagrams-key-compliance-and-security&#39; /&gt;

&lt;img border=&quot;0&quot; data-original-height=&quot;400&quot; data-original-width=&quot;700&quot; height=&quot;113&quot; src=&quot;https://2.bp.blogspot.com/-QKmSO3iLAK4/Wy0raa31yeI/AAAAAAAABjQ/L6dL7wTp1cIdRduQpNFVoz7ss9qfFEv-ACLcBGAs/s200/3%2BTips%2Bfor%2BNetwork%2BSegmentation_Blog.jpg&quot; style=&quot;display: none;&quot; width=&quot;200&quot; /&gt;

&lt;h3&gt;
Three tips for PCI compliance network documentation.&lt;/h3&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-nGBLGNnuvHo/Wy0mcL7yALI/AAAAAAAABgw/Kr64CxccHmsI407glhBlh4A5U0yrBbwpACLcBGAs/s1600/nathan-cooper.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;500&quot; data-original-width=&quot;500&quot; height=&quot;100&quot; src=&quot;https://3.bp.blogspot.com/-nGBLGNnuvHo/Wy0mcL7yALI/AAAAAAAABgw/Kr64CxccHmsI407glhBlh4A5U0yrBbwpACLcBGAs/s320/nathan-cooper.jpeg&quot; width=&quot;100&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Nathan Cooper, CISSP&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;a href=&quot;https://2.bp.blogspot.com/-QKmSO3iLAK4/Wy0raa31yeI/AAAAAAAABjQ/L6dL7wTp1cIdRduQpNFVoz7ss9qfFEv-ACLcBGAs/s1600/3%2BTips%2Bfor%2BNetwork%2BSegmentation_Blog.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;400&quot; data-original-width=&quot;700&quot; height=&quot;113&quot; src=&quot;https://2.bp.blogspot.com/-QKmSO3iLAK4/Wy0raa31yeI/AAAAAAAABjQ/L6dL7wTp1cIdRduQpNFVoz7ss9qfFEv-ACLcBGAs/s200/3%2BTips%2Bfor%2BNetwork%2BSegmentation_Blog.jpg&quot; style=&quot;display: none;&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;If you were to ask network architects and engineers about their favorite part of the job, I doubt any of them will respond with “creating and maintaining network documentation.” It’s not the most glamorous task—yet requirements 1.1.2 and 1.1.3 of the Payment Card Industry Data Security Standard (PCI DSS), along with general good security hygiene, render it a necessary one.&lt;br /&gt;
&lt;br /&gt;
Part of this requirement involves creating network infrastructure and data-flow diagrams related to the Cardholder Data Environment (CDE). Although the diagramming process can be tedious and time-consuming—preventing many companies from diagramming at all, much less taking adequate time to make diagrams accurate and keep them up to date—you can’t overstate the importance of network documentation. Accurate documentation leads to accurate scoping and an assurance, for both your company and your QSA, that your network has been set up securely.&lt;br /&gt;
&lt;br /&gt;
Follow these three tips to keep your network well-documented, in turn making your life and your QSA’s life easier.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2018/06/it-checklists-for-pci-compliance.html&quot;&gt;IT Checklists for PCI Compliance&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
1. Find a program to streamline the process&lt;/h4&gt;
&lt;br /&gt;
If you found yourself nodding in agreement as we mentioned the tedium of network documentation, you need to find a program that removes at least some of the hassle. Solutions like &lt;a href=&quot;http://lucidchart.com/&quot;&gt;Lucidchart&lt;/a&gt; or Visio can simplify the diagramming process greatly.&lt;br /&gt;
&lt;a href=&quot;https://4.bp.blogspot.com/-dWmyC-ljqyk/Wy0raX0Jb_I/AAAAAAAABjU/mLrwFNe0aSY8NCFrqLDXasBIv0-1zxvFQCLcBGAs/s1600/3%2BTips%2Bfor%2BNetwork%2BSegmentation_Image.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;network diagram, data flow diagram, pci compliance&quot; border=&quot;0&quot; data-original-height=&quot;292&quot; data-original-width=&quot;273&quot; height=&quot;200&quot; src=&quot;https://4.bp.blogspot.com/-dWmyC-ljqyk/Wy0raX0Jb_I/AAAAAAAABjU/mLrwFNe0aSY8NCFrqLDXasBIv0-1zxvFQCLcBGAs/s200/3%2BTips%2Bfor%2BNetwork%2BSegmentation_Image.jpg&quot; title=&quot;&quot; width=&quot;186&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
For example, Lucidchart has created shape libraries specific to many different network types, including Cisco networks, Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), and general network infrastructure. Instead of tracking down or drawing crude sketches of network shapes, you have professional stencils representing a wide variety of network components, reducing the overall time it takes to build an accurate and professional-looking network diagram.&lt;br /&gt;
&lt;br /&gt;
Lucidchart’s platform also offers an AWS architecture import. Users can simply enter their AWS credentials or run a bash script to import data and automatically generate a completed AWS diagram. Internally, this feature has saved us thousands of dollars a year in assessments and compliance.&lt;br /&gt;
&lt;br /&gt;
This makes it easier to keep your documentation up to date because you simply add new components, lines, or segments whenever you add them to your network.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2014/05/pci-faq.html&quot;&gt;PCI FAQs&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;/h4&gt;
&lt;h4&gt;
&lt;/h4&gt;
&lt;h4&gt;
2. Create a single source of truth&lt;/h4&gt;
&lt;br /&gt;
In an ideal world, only one person would be responsible for keeping a given piece of documentation up to date and accurate. However, multiple people are typically involved with maintaining network infrastructure, handling card data, and completing other work that affects your &lt;a href=&quot;https://www.securitymetrics.com/pci&quot;&gt;PCI compliance&lt;/a&gt;. As a result, numerous (and conflicting) versions of the same documentation are commonly found in emails, network shares, and individual machines, making it difficult to nail down the most recent and complete document.&lt;br /&gt;
&lt;br /&gt;
Maintain a single source of truth—with permission-based controls for viewing, commenting, and editing—so you can easily share documentation as you gather input and make changes to your infrastructure.&lt;br /&gt;
&lt;br /&gt;
Selecting the right diagramming solution can help you collaborate more effectively with others and manage storage and version control of your network documentation in a secure, accessible way. Whichever platform you choose should include access rights and revision history, so you can limit access to authoritative documents, see who changed what, access previous diagrams to correct errors, and get a historical view of the system.&lt;br /&gt;
&lt;br /&gt;
As you create this collaborative network documentation workspace, keep in mind that you can leverage the network documentation for more than just evidence of PCI compliance—you can create diagrams with different levels of complexity to share externally with your vendors, customers, partners, etc.
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a class=&quot;cta-pci&quot; href=&quot;http://bit.ly/1gk1QrK&quot; style=&quot;color: white;&quot; target=&quot;_blank&quot;&gt;Follow for more data security articles like this&lt;/a&gt; &lt;br /&gt;
&lt;div&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;/h4&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
3. Review and update documentation quarterly or after any infrastructure changes&lt;/h4&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Businesses constantly evolve, scale, and look to become more efficient. These efforts often bleed into the way business networks are set up and the different methods companies use to accept, process, and store credit cards. For example, many companies have moved their network infrastructure into the cloud using services like AWS, Azure, and GCP to better accommodate fluctuating bandwidth demands, offload system maintenance, and transfer the compliance burden.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Once you’ve created your initial network documentation, review and update your diagrams when changes are made to ensure that your document reflects an accurate representation of your current network and business processes. This practice will keep you aware of potential network security vulnerabilities and provide the required documented information your auditor will need in order to validate your PCI compliance during your next assessment.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Network documentation will always be necessary—but it doesn’t have to be a necessary evil. With these tips, you can streamline the process for creating professional diagrams that meet compliance and help you manage your network through growth and change.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Lucidchart allows users to build high-quality network infrastructure and data-flow diagrams related to the Cardholder Data Environment (CDE). These diagrams help to define and visualize the entire PCI DSS scope or the CDE. If your business uses Amazon Web Services (AWS) for your network infrastructure, &lt;a href=&quot;https://www.lucidchart.com/blog/lucidchart-aws-architecture-import&quot;&gt;see how our company saved nearly 12 hours while documenting our network.&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;i&gt;Nathan Cooper has been working to protect Lucid and Lucid&#39;s customers since he joined the team in 2015. He obtained his Masters of Information Systems Management from Brigham Young University and is a current Certified Information Systems Security Professional (CISSP).&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://2.bp.blogspot.com/-zmJbW-y-bEI/WrwbKAo7tNI/AAAAAAAABSQ/Z8FEy74oP_Ag8CznKAArUXzpyiIKSfnLQCPcBGAYYCw/s1600/2018%2BPCI%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/1752644624166920470'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/1752644624166920470'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2018/06/network-diagrams-key-to-compliance-and.html' title='Network Diagrams: Key to Compliance and Security '/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-QKmSO3iLAK4/Wy0raa31yeI/AAAAAAAABjQ/L6dL7wTp1cIdRduQpNFVoz7ss9qfFEv-ACLcBGAs/s72-c/3%2BTips%2Bfor%2BNetwork%2BSegmentation_Blog.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-4400214469067644952</id><published>2018-06-20T06:53:00.003-07:00</published><updated>2018-08-16T15:21:11.823-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="HIPAA"/><category scheme="http://www.blogger.com/atom/ns#" term="hipaa articles"/><category scheme="http://www.blogger.com/atom/ns#" term="hipaa blog"/><category scheme="http://www.blogger.com/atom/ns#" term="HIPAA compliance"/><title type='text'>5 Tips to Improve HIPAA Compliance in 2018</title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/5-tips-improve-hipaa-compliance-2018&#39; /&gt;

&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;182&quot; src=&quot;https://2.bp.blogspot.com/-tkuHFFvSEFc/WypaZoPPBfI/AAAAAAAABgk/vAISl9UQ4oANU5BDnWabhEWp24yrDt4ZgCEwYBhgL/s320/5%2BTips%2Bto%2BImprove%2BHIPAA%2BEfforts_Blog.jpg&quot; style=&quot;display: none;&quot; width=&quot;320&quot; /&gt;
&lt;h3&gt;
The state of HIPAA security this year, plus tips to focus your efforts.&lt;/h3&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;h4&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;/h4&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;a href=&quot;http://blog.securitymetrics.com/search?q=brand+barney&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;881&quot; data-original-width=&quot;881&quot; height=&quot;100&quot; src=&quot;https://2.bp.blogspot.com/-vjuzDBRjsTE/WypZ6dGxqYI/AAAAAAAABgY/Z3Nclr-fM-E8WZmhAvK9USMnQtmWFVl8ACEwYBhgL/s320/Brand%2BBarney.jpg&quot; width=&quot;100&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://blog.securitymetrics.com/search?q=brand+barney&quot;&gt;Brand Barney&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://blog.securitymetrics.com/search?q=brand+barney&quot;&gt;CISSP, HCISSP, QSA&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;h4&gt;
&lt;/h4&gt;
&lt;h4&gt;
What’s new in HIPAA in 2018?&lt;/h4&gt;
In general, organizations don’t seem to be keeping up with mounting vulnerabilities. Breaches have increased in frequency, and I anticipate that next year the number of breaches and penalties assessed in healthcare will continue to increase.&lt;br /&gt;
&lt;br /&gt;
Hackers have wised up to the lack of compliance and the lack of security in the healthcare industry. They utilize gaps to attack healthcare organizations and hurt their systems. The FBI has reported an increase in discovered and reported attacks against all organizations, with&amp;nbsp;&lt;a href=&quot;https://www.ponemon.org/news-2/66&quot;&gt;83% of ransomware attacks against healthcare&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
We’ve all heard of ransomware, where hackers encrypt organizations’ systems and then demand large ransoms of bitcoin in exchange for the decryption of their data. As we look forward to more ransomware this year, we want to make sure to talk about how these types of breaches occur.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
SecurityMetrics HIPAA Compliance Research&lt;/h3&gt;
&lt;a href=&quot;https://1.bp.blogspot.com/-nKZ8SRav5lw/WypaZjMzLhI/AAAAAAAABgg/iDTXTs8bZywcLgG5tsyPGjmwMuF7lMWmACLcBGAs/s1600/5%2BTips%2Bto%2BImprove%2BHIPAA%2BEfforts_Image.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;292&quot; data-original-width=&quot;273&quot; height=&quot;200&quot; src=&quot;https://1.bp.blogspot.com/-nKZ8SRav5lw/WypaZjMzLhI/AAAAAAAABgg/iDTXTs8bZywcLgG5tsyPGjmwMuF7lMWmACLcBGAs/s200/5%2BTips%2Bto%2BImprove%2BHIPAA%2BEfforts_Image.jpg&quot; width=&quot;186&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2018/01/2017-hipaa-survey-results.html&quot;&gt;We surveyed HIPAA officials &lt;/a&gt;about their patient data and patient security. These officials were primarily from organizations with 0-500 employees. It’s important to remember that whether you’re a mom-and-pop practice or a large covered entity—big or small—hackers want your data. It’s not just the big targets that experience breaches.&lt;br /&gt;
&lt;br /&gt;
According to our data, at least 20% of respondents report that their organizations do not encrypt stored protected health information (PHI). This fact, coupled with the prevalence of malware and hacking, presents a major threat to the healthcare industry and business associates.&lt;br /&gt;
&lt;br /&gt;
If you’re thinking, “well we encrypt our data, so we’re protected,” the question is, are you encrypting ALL your data: flat files, spreadsheets stored locally or on network shares, USB thumb drives, and data being transmitted? Make sure any stored electronic PHI (ePHI) is protected using AES-256 (or other industry accepted/strong) encryption and any data in transit is moved on an encrypted connection (HTTPS, TLS, etc.)&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a class=&quot;cta-hipaa&quot; href=&quot;http://info.securitymetrics.com/subscribe-hipaa&quot; style=&quot;color: white;&quot; target=&quot;_blank&quot;&gt;Follow for more data security articles like this&lt;/a&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h4&gt;
Top Organizational Vulnerabilities&lt;/h4&gt;
Interestingly enough, the vulnerabilities we’re seeing this year are the same ones we saw last year. Hackers all always advancing, but they will continue to attack and take data with proven methods for as long as they work.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Currently, the biggest issues we see are:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Insecure remote access:&lt;/b&gt; Make sure you use &lt;a href=&quot;http://blog.securitymetrics.com/2017/05/new-multi-factor-authentication-supplement.html&quot;&gt;multi-factor authentication&lt;/a&gt;. The long-trusted combination of username and password (and too often passwords are weak, e.g., 123456) will no longer suffice to protect all of your data. You need to make sure that you have a strong and unique username and password combined with other accepted and secure factors. An example of this would be if your privileged access login requested two or more factors (e.g., it asked for username and password/PIN, and then prompted you to enter a security token, One Time Password token, or some other accepted factor). Failure to properly secure all of your remote access is one of the main reasons for breaches today. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;Employees: &lt;/b&gt;The “human element” can be a big problem, and quite honestly, may always remain a large problem in the healthcare industry. In my experience, employees are almost always trying their best—but if they’re not properly trained, they won’t know any better and might open a phishing email or click on a malicious link. Training your employees properly and frequently will pay dividends when your employees stop an attacker or malware dead in their tracks. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;BYOD policies:&lt;/b&gt; When we think of a bring your own device (BYOD) policy, we might think of privately owned cell phones brought into a sensitive network, but there’s more to it than that. It includes the devices used at a company: work laptops and work phones--that go home and are connected to home networks or airport Wi-Fi--and then are brought back to your sensitive data environment. We see devices stolen which had no disk encryption. Remember all of your PHI and ePHI needs to be properly encrypted.  &lt;/li&gt;
&lt;li&gt;&lt;b&gt;Third parties:&lt;/b&gt; Some of you reading this are likely a third-party. Maybe you’re a business associate performing a duty like development, platform as a service, infrastructure as a service, billing, or something like that. We see a lot of vulnerabilities coming through third parties. As a third-party, you need to make sure security and compliance is a top priority as it will directly affect the growth of your business. Doing business with a business associate is often necessary to provide proper care to patients, but it is not without risks. I work with many vendors who diligently take care to ensure all patient data they access or are provided is secure, and that they are compliant. However, this is not the case for all business associates in the industry. It’s important to remember that you should engage business associates with proper due diligence. Make sure that all BAAs are in place and obtain assurances that your data and systems will be secure and compliant when shared or accessed by any third party. &lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
HIPAA data security updates&lt;/h4&gt;
I don’t see HIPAA compliance requirements as a whole changing drastically anytime soon. Not to be confused with the healthcare industry, HIPAA itself hasn’t really changed much from year to year.&lt;br /&gt;
&lt;br /&gt;
In the cybersecurity realm, we did see &lt;a href=&quot;https://pages.nist.gov/800-63-3/sp800-63b.html&quot;&gt;new clarification from NIST &lt;/a&gt;&amp;nbsp;regarding what are considered strong passwords or passphrases. OWASP re-released their updated&lt;a href=&quot;https://www.owasp.org/images/7/72/OWASP_Top_10-2017_%28en%29.pdf.pdf&quot;&gt; top 10 most critical web application security risks of 2017&lt;/a&gt;. Keep in mind that it has been re-released, but that it hasn’t changed all that much. Since far too many businesses and vendors haven’t drastically improved their security, most attackers are using the same methods they have in years past.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Issues with a compliance mentality&lt;/h4&gt;
Far too many entities are just “check listing” their compliance efforts (this is not unique to the healthcare industry)—which will continue to lead to data breaches. It’s easy to think of attackers as part of an extensive and organized network, or even as nation states--and certainly those things exist. But, the source of a data breach at your organization could be as simple as your own employees or patients accessing a system or application on your unsecured Wi-Fi.&lt;br /&gt;
&lt;br /&gt;
Negligence of security can lead to:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Unauthorized use or disclosure of PHI (i.e., loss of data). &lt;/li&gt;
&lt;li&gt;Patient harm (loss of data, physical/emotional harm), especially if it has to do with sensitive medical information (mental health, drug use, etc.). &lt;/li&gt;
&lt;li&gt;Network medical device loss of integrity. As technology advances, we’ll see more devices affected and the possibility of harm to patients (physical or emotional). &lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
These types of problems are going to continue to happen until we make a big shift into real security and not just checking boxes.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
5 tips to improve HIPAA compliance in 2018&lt;/h4&gt;
&lt;b&gt;1. Focus on policies and procedures&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
We often see that entities have completed some portion of their policies and procedures—usually their privacy policies. We also see policies and procedures that are just a few pages in total, if they exist at all. Of course, not all policies and procedures are going to apply to every employee, however, a 2- or 3-page document will not be enough.&lt;br /&gt;
&lt;br /&gt;
Also remember that your policies and procedures document is not just a paperweight. You may have sufficient documentation, but if you need to find information about your firewalls or about authorized uses and disclosures, and your document isn’t usable, it’s not going to do you or your employees a lot of good.&lt;br /&gt;
&lt;br /&gt;
If your organization receives a complaint or has a breach, the first thing HHS and OCR will likely ask to see is your complete policies and procedures. If you don’t have sufficient policies and procedures in place, it’s likely to lead to further investigation into your organization and compliance.&lt;br /&gt;
&lt;br /&gt;
Think about implementation: where are the gaps in your policies and procedures? Do you use a cloud vendor? Do you have policies and procedures for your firewall and router configurations? For encryption of data at rest and data in transit?&lt;br /&gt;
&lt;br /&gt;
Are your staff trained in the policies and procedures that apply to them? If not, it’s time to get our documentation in order and then train your staff on them. It’s not uncommon for me to go into an organization and ask employees to show me where their policies and procedures are, and they can’t find them.&lt;br /&gt;
&lt;br /&gt;
Lastly, you need to regularly update your policies and procedures. As your organization changes, your roadmap (i.e., policies and procedures) should adapt and change with it. Your policies and procedures shouldn’t be an afterthought. They are there to help you and your staff ensure proper security and compliance in your organization and for your patients.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2015/07/hipaa-security-policy-free-download.html&quot;&gt;HIPAA Security Policy Free Download&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2. Incident response plan&lt;/b&gt;&lt;br /&gt;
Even if you haven’t been breached yet, it’s likely you will at some point: whether it’s a small incidental breach or a major event where the contents of your database have been exfiltrated outside of your network. The size and severity will vary depending on the amount of time and resources you’ve put into your security. But, regardless of the size of the breach, if you haven’t prepared for the aftermath, it’s going to be significantly more painful and expensive.&lt;br /&gt;
&lt;br /&gt;
First, you need to document your &lt;a href=&quot;http://blog.securitymetrics.com/2017/03/6-phases-incident-response-plan.html&quot;&gt;incident response plan,&lt;/a&gt; (and do so before a breach, rather than after). Second, you need use the incident response plan to minimize potential impact. This will help you to reduce fines and any negative effects on your business and customers. Make sure you’re identifying all the potential risk and vulnerabilities. This can be done through a &lt;a href=&quot;http://blog.securitymetrics.com/2015/04/start-a-hipaa-risk-analysis.html&quot;&gt;risk analysis&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
It’s not uncommon for health organizations to engage a third-party service provider to contain and respond to the breach. The use of that third party needs to be documented in your plan.&lt;br /&gt;
&lt;br /&gt;
You will need to set up a breach response team and make sure they understand their responsibilities. Make sure you have a team leader, scribe, timeline leader, and HR or legal representatives. Oftentimes people wrongly assume a person or group knows their responsibilities related to a data breach. If they aren’t included in incident response planning and training, there’s no way for them to know their responsibilities.&lt;br /&gt;
&lt;br /&gt;
Sell the incident response plan to your executives. Whatever you do after a breach will greatly affect the fines and bad press your practice could face.&lt;br /&gt;
&lt;br /&gt;
Finally, you need to test your incident response plan. Start by performing &lt;a href=&quot;http://blog.securitymetrics.com/2018/01/employee-data-security-training-tabletop-exercises.html&quot;&gt;tabletop exercises&lt;/a&gt; at least once a year. Doing so will not only keep you in compliance, but it will also help you find gaps in your plan. Whether your incident response team has twenty people or two, you need to test the plan for efficacy and communication. Bring up all aspects and details, like how physicians will communicate with communicate to IT, HR, and legal, and how legal will communicate with the courts. Document what you learn during your tabletop exercises—I’ve never seen an incident response exercise where someone didn’t learn something new to help improve security and protect privacy.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2017/01/6-steps-to-making-incident-response-plan.html&quot;&gt;6 Steps to Making an Incident Response Plan&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3. Risk analysis&lt;/b&gt;&lt;br /&gt;
If you haven’t done a risk analysis, &lt;a href=&quot;http://blog.securitymetrics.com/2015/04/start-a-hipaa-risk-analysis.html&quot;&gt;get started on one today&lt;/a&gt;. A risk analysis is the identification of the risks, threats, and vulnerabilities to your organization. Those risks, threats, and vulnerabilities can be digital or physical, internal or external, negligent or willful. A risk analysis takes into account your systems, as well as the human and environmental elements which affect your organization.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Risk: &lt;/b&gt;The potential for a threat to exploit a vulnerability and the loss, damage, or destruction it would cause.  &lt;/li&gt;
&lt;li&gt;&lt;b&gt;Threat:&lt;/b&gt; Anything that could exploit a vulnerability, whether intentionally or unintentionally.  &lt;/li&gt;
&lt;li&gt;&lt;b&gt;Vulnerability: &lt;/b&gt;A weakness, flaw, or security gap in an environment.  &lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
If you have done a risk analysis, you should review and update it at least annually. Significant events, like mergers or acquisitions, would also affect your risk analysis, so you’d need to review and update yours at that time.&lt;br /&gt;
&lt;br /&gt;
To start on a risk analysis, you need to first understand where your PHI is stored, received, maintained, and transmitted. If you don’t understand which systems are touching PHI and how they interact with it, it’s going to be incredibly challenging, if not impossible, to identify risks, threats, and vulnerabilities in a thorough and accurate manner.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2015/04/start-a-hipaa-risk-analysis.html&quot;&gt;How to Start a HIPAA Risk Analysis&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
It is not uncommon for organizations to use tools like &lt;a href=&quot;http://blog.securitymetrics.com/2016/03/vulnerability-scanners-101-what-why-and-how.html&quot;&gt;vulnerability scans&lt;/a&gt; (internal and external), &lt;a href=&quot;http://blog.securitymetrics.com/2015/04/penetration-test-cost.html&quot;&gt;penetration tests&lt;/a&gt; (internal and external), and virus scanning, to assist in the identification of some of the many risks and vulnerabilities in your PHI/ePHI environment. However, these tools are not the only component to your risk analysis. It’s important to consider the physical, administrative, and technical risks, threats, and vulnerabilities that may be present in your organization. It’s your responsibility to make sure that the accurate and thorough identification of all potential risks, threats and vulnerabilities is performed. There is no shame in seeking the help of an experienced third-party service provider to simplify this process and help close any gaps you may have in experience.&lt;br /&gt;
&lt;br /&gt;
Don’t forget to to interview employees during this process. Your employees have valuable insights into how they interact with your systems and sensitive data. You might believe that staff are doing things one way, only to discover that they don’t because they found a better way. Here are a few questions you might ask in this process: How do employees interact with patients and PHI/ePHI? Who has access to what data? What are the policies and procedures around access and data usage. Where do they send data, and how is that transmission performed? What do your employees do when a process or technology isn’t working? Do they find a new, creative way of interacting with that PHI/ePHI?&lt;br /&gt;
&lt;br /&gt;
Whatever you do, do not delay in your risk mitigation. Properly addressing risks will require time and resources, but know that the risks, threats and vulnerabilities in your organization will not address themselves, and hackers are always looking for access to your systems and data.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;4. Train staff properly&lt;/b&gt;&lt;br /&gt;
Training can’t be emphasized enough. Your staff can either be your &lt;a href=&quot;http://blog.securitymetrics.com/2017/12/employee-training-social-engineering.html&quot;&gt;greatest asset or your greatest vulnerability&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Training staff just at the time of hire is not sufficient. You need to hold monthly meetings where you review the Security, Privacy, and Breach Notification Rules. All staff should be included: nurses, doctors, receptionists, assistants, developers, system administrators, network administrators, etc. Each job role will experience different issues.&lt;br /&gt;
&lt;br /&gt;
Make trainings fun. If you include games or food, staff will be more likely to engage with and retain the information presented. Here are some example training topics: acceptable uses and disclosures of PHI, social media compliance, &lt;a href=&quot;http://blog.securitymetrics.com/2016/02/fighting-phishing-email-scams.html&quot;&gt;phishing&lt;/a&gt;, &lt;a href=&quot;http://blog.securitymetrics.com/2015/08/healthcare-social-engineering.html&quot;&gt;social engineering&lt;/a&gt;, and &lt;a href=&quot;http://blog.securitymetrics.com/2017/02/5-tips-to-boost-business-physical-security.html&quot;&gt;physical security&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
You should also test staff: quiz them and give them reviews. Find out if your trainings are effective. You could even hire someone to perform an email phishing tests on your staff to determine if your training is working in a real-world situation. Security should be first of mind. If your staff introduces security risks due to ignorance, it is highly likely that they will think it’s acceptable for future situations and you will remain vulnerable.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;5. Security best practices&lt;/b&gt;&lt;br /&gt;
We are constantly looking at how to best bulk up security and protect data. We sat down with our forensic team to find out the top vulnerabilities that allow attackers to break into systems. These are the most common areas with which they noted security concerns:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Logging &lt;/li&gt;
&lt;li&gt;Encryption &lt;/li&gt;
&lt;li&gt;Intrusion Detection/Prevention System (IDS/IPS) &lt;/li&gt;
&lt;li&gt;File Integrity Monitoring (FIM) &lt;/li&gt;
&lt;li&gt;Edge Firewall Security &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;External Vulnerability Scan &lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;Remote Access Security &lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Keep in mind the many tools and services available to help you test your systems and protect PHI:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Wireless Network Security &lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Web Application Security &lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Physical Security &lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Penetration Testing &lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;System Hardening &lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;System Patching &lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Internal Vulnerability Scan &lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
A less technical, but just-as-important, aspect of security, is encouraging the right kind of culture. Many companies do not maintain a good and ubiquitous security culture. Management in these organizations may be touting that they have an awesome security culture, but in reality their security culture, or lack thereof, is causing their patient data many risks, threats, and vulnerabilities. It is not uncommon see healthcare companies pour time and money into systems or outside assistance, but then fail to protect or maintain those systems, because it just isn’t a priority internally. In those cases, their efforts are more like a Band-Aid.&lt;br /&gt;
&lt;br /&gt;
Also understand that security comes from the top down, not vice versa. If security is not handled with a top-down approach, things can get frustrating for staff members. Many times, employees will even leave an organization if it doesn’t seem to care about security.&lt;br /&gt;
&lt;br /&gt;
Security does not have to be overly challenging. Create an environment where employees aren’t afraid to report suspicious behavior or anything that could be a security problem. A great security culture will facilitate openness and empower employees to bring up the security issues you need to know about.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Live and breathe security&lt;/h4&gt;
To better protect yourself and your organization, you should live and breathe security. Make compliance and security year-long practices. HIPAA compliance is often treated as a “single-point-in-time” event, but in reality, security and compliance are never ending. That fact on its own can be enough to make you want to throw your hands up and call it quits, but don’t. Your patients rely on you to protect their sensitive information. It’s up to you to make sure that your organization has complete and secure processes in place.&lt;br /&gt;
&lt;br /&gt;
Also remember that healthcare workers are busy, and their main concern is taking care of patients. If you conduct a thorough, annual risk analysis, (as well as anytime there is a big change in your processes or in your PHI/ePHI environment), you can feel better knowing about the vulnerabilities working from an action plan.&lt;br /&gt;
&lt;br /&gt;
We’ve only listed 5 tips in this blog post, but there are so many excellent processes and tools you can implement to help safeguard your patient data. And you don’t have to do it alone: get your organization on board and engage a third party if you need to.&lt;br /&gt;
&lt;br /&gt;
If you are interested in a &lt;a href=&quot;https://www.securitymetrics.com/hipaa-audit&quot;&gt;HIPAA audit&lt;/a&gt;, or would like to learn more about &lt;a href=&quot;https://www.securitymetrics.com/hipaa&quot;&gt;HIPAA&lt;/a&gt;, &lt;a href=&quot;https://www.securitymetrics.com/pci&quot;&gt;PCI&lt;/a&gt;, &lt;a href=&quot;https://www.securitymetrics.com/gdpr-defense&quot;&gt;GDPR&lt;/a&gt;, or &lt;a href=&quot;https://www.securitymetrics.com/vulnerability-scan&quot;&gt;data security&lt;/a&gt;, please &lt;a href=&quot;https://www.securitymetrics.com/contact&quot;&gt;contact us here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Brand Barney (CISSP, HCISPP, QSA) is Senior HIPAA Security Analyst at &lt;a href=&quot;https://www.securitymetrics.com/&quot; target=&quot;_blank&quot;&gt;SecurityMetrics&lt;/a&gt;, has over 10 years of data security experience, and will totally geek out if you mention Doctor Who. Brand loves to play jazz piano and daydreams about being as great as Dave Brubeck or Thelonious Monk. Connect with him on &lt;a href=&quot;https://twitter.com/Brand_Barney&quot; target=&quot;_blank&quot;&gt;Twitter&lt;/a&gt; or check out his other &lt;a href=&quot;http://blog.securitymetrics.com/search?q=brand+barney&quot; target=&quot;_blank&quot;&gt;blog posts&lt;/a&gt;.&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/hipaa-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; src=&quot;https://2.bp.blogspot.com/-Z_ASd-4JFw0/Wicgv3hoBpI/AAAAAAAAAVs/WwEDgD5EeAEQ4Cccah5cvAJfzOGPlP5wwCPcBGAYYCw/s1600/2018%2BHIPAA%2BGuide_Blog.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/4400214469067644952'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/4400214469067644952'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2018/06/5-tips-to-improve-hipaa-compliance-in.html' title='5 Tips to Improve HIPAA Compliance in 2018'/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-tkuHFFvSEFc/WypaZoPPBfI/AAAAAAAABgk/vAISl9UQ4oANU5BDnWabhEWp24yrDt4ZgCEwYBhgL/s72-c/5%2BTips%2Bto%2BImprove%2BHIPAA%2BEfforts_Blog.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-1326604410114552190</id><published>2018-06-13T08:14:00.001-07:00</published><updated>2018-08-14T08:16:46.330-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Guide to PCI Compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="information technology"/><category scheme="http://www.blogger.com/atom/ns#" term="infotech"/><category scheme="http://www.blogger.com/atom/ns#" term="IT"/><title type='text'>IT Checklists for PCI Compliance </title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/it-checklists-pci-compliance&#39; /&gt;

&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;113&quot; src=&quot;https://4.bp.blogspot.com/-TBqNGDYvpfE/WyE9kbpm7nI/AAAAAAAABf8/-GRVEIasTEofMbJ9GNLD0iCGgd_CORm4gCLcBGAs/s200/IT%2BChecklists_Blog.jpg&quot; style=&quot;display: none;&quot; width=&quot;200&quot; /&gt;

&lt;h3&gt;
Detailed checklists for teams working on PCI compliance.&lt;/h3&gt;
&lt;br /&gt;
&lt;a href=&quot;https://1.bp.blogspot.com/-tr7TFDtmrSk/WyEtWkgsR6I/AAAAAAAABfw/BWkZvrNHZCIF-xOqUTr-a-5d7fbSNaJJQCPcBGAYYCw/s1600/IT%2BChecklists_Image.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;292&quot; data-original-width=&quot;273&quot; height=&quot;200&quot; src=&quot;https://1.bp.blogspot.com/-tr7TFDtmrSk/WyEtWkgsR6I/AAAAAAAABfw/BWkZvrNHZCIF-xOqUTr-a-5d7fbSNaJJQCPcBGAYYCw/s200/IT%2BChecklists_Image.png&quot; width=&quot;186&quot; /&gt;&lt;/a&gt;We created our &lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;PCI Guide&lt;/a&gt; &lt;/span&gt;to help businesses get compliant with PCI standards and avoid data breaches. While C-level executives and compliance officers may oversee a PCI compliance program at the highest levels, it’s the IT managers and teams who are tasked with the day-to-day details of what “compliance” really means.&lt;br /&gt;
&lt;br /&gt;
That’s why we include &lt;a href=&quot;https://info.securitymetrics.com/pci-guide-it-checklist&quot; style=&quot;background-color: white;&quot;&gt;PCI Guide IT checklists&lt;/a&gt; to go along with each PCI DSS requirement.&lt;br /&gt;
&lt;br /&gt;
IT pros keep businesses running: they often manage networks, field support requests, give trainings, oversee deployments, and serve as database admins—all in the course of a day. Data security and compliance are added responsibilities on top of maintaining basic business operations, so separate and thorough tracking methods can help make the entire organization more secure.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;https://info.securitymetrics.com/pci-guide-it-checklist&quot;&gt;Download our PCI Compliance IT Checklists here&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Information technology team management&lt;/h4&gt;
&lt;br /&gt;
IT pros have told us that they love our PCI guides specifically for the checklists. They use them to &lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;https://www.pcisecuritystandards.org/documents/PCI-DSS-v3_2-ROC-Reporting-Template.pdf&quot;&gt;PCI Report on Compliance (ROC)&lt;/a&gt;&lt;/span&gt; or prepare for a &lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;https://www.securitymetrics.com/pci-audit&quot;&gt;PCI audit&lt;/a&gt;&lt;/span&gt;. The lists provide a starting point and help keep teams and individuals on task. &lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://4.bp.blogspot.com/-TBqNGDYvpfE/WyE9kbpm7nI/AAAAAAAABf8/-GRVEIasTEofMbJ9GNLD0iCGgd_CORm4gCLcBGAs/s1600/IT%2BChecklists_Blog.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;113&quot; src=&quot;https://4.bp.blogspot.com/-TBqNGDYvpfE/WyE9kbpm7nI/AAAAAAAABf8/-GRVEIasTEofMbJ9GNLD0iCGgd_CORm4gCLcBGAs/s200/IT%2BChecklists_Blog.jpg&quot; style=&quot;display: none;&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
manage everyday security tasks, as well as to fill out their &lt;br /&gt;
&lt;br /&gt;
Some IT departments print off the checklists for every member of their team to make sure no one is missing anything.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2018/04/what-are-12-requirements-of-pci-dss.html&quot; style=&quot;background-color: white;&quot;&gt;The 12 Requirements of PCI DSS&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Interactive PCI compliance checklists&lt;/h4&gt;
&lt;br /&gt;
There are twelve lists—one to cover each requirement—and within each are interactive fields and checklists. Managers and team members can enter to whom the requirement list is assigned, its assigned completion date, and actual completion date.&lt;br /&gt;
&lt;br /&gt;
As interactive PDFs, the checklists can be checked and unchecked. So, teams can keep track of progress on the PDF versions, or just print them out and take them on the go. This feature also doubles as a way to easily document general PCI compliance efforts at your organization.&lt;br /&gt;
&lt;br /&gt;
INFOGRAPHIC: &lt;a href=&quot;http://info.securitymetrics.com/infographic-data-breach-visualization-2017&quot;&gt;2017 Data Breaches&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
IT data security tasks&lt;/h4&gt;
&lt;br /&gt;
These lists are based specifically on PCI DSS requirements, and they are designed to help managers make sure that even the smallest tasks are covered. Each list includes subsets of “things you &lt;i&gt;will need to have&lt;/i&gt;,” “things you &lt;i&gt;will need to do&lt;/i&gt;,” and “things you &lt;i&gt;may need to do&lt;/i&gt;.”&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;We reference the specific PCI DSS requirement that goes with each task. For instance, on the checklist for “Requirement 4: Transmitting Cardholder Data,” we match up tasks with their specific requirement found in the PCI DSS: 4.2b, 4.1, 4.1.1, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
The SecurityMetrics Guide to PCI DSS Compliance&lt;/h4&gt;
&lt;br /&gt;
For even more information and tips about PCI DSS compliance, &lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;http://info.securitymetrics.com/&quot;&gt;check out our PCI guide&lt;/a&gt;.&lt;/span&gt; Our 2018 version includes the interactive checklists as well as PCI auditor insights, forensic data breach statistics, and more in-depth information on each of the requirements.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2018/05/top-5-pci-blog-posts-for-small.html&quot;&gt;Top 5 PCI Blog Posts for SMBs&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;/h4&gt;
&lt;h4&gt;
&lt;/h4&gt;
&lt;h4&gt;
The SecurityMetrics PCI Guide protects businesses&lt;/h4&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
We help businesses avoid data breaches because for us, data security is personal. Our CEO Brad Caldwell founded SecurityMetrics in 2000, two years after a data breach at his small business left him without affordable options for remediation.&lt;br /&gt;
&lt;br /&gt;
We create content like our PCI Guide and Checklists to help businesses protect themselves from hackers and cybercriminals who want to steal data or collect ransoms.&lt;br /&gt;
&lt;br /&gt;
If you&#39;d like to learn more about &lt;a href=&quot;https://www.securitymetrics.com/pci&quot;&gt;PCI compliance&lt;/a&gt; or are interested in a &lt;a href=&quot;https://www.securitymetrics.com/pci-audit&quot;&gt;PCI audit&lt;/a&gt; or &lt;a href=&quot;https://www.securitymetrics.com/hipaa-audit&quot;&gt;HIPAA audit&lt;/a&gt;, &lt;a href=&quot;https://www.securitymetrics.com/contact&quot;&gt;contact us here&lt;/a&gt;.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://2.bp.blogspot.com/-zmJbW-y-bEI/WrwbKAo7tNI/AAAAAAAABSQ/Z8FEy74oP_Ag8CznKAArUXzpyiIKSfnLQCPcBGAYYCw/s1600/2018%2BPCI%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/1326604410114552190'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/1326604410114552190'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2018/06/it-checklists-for-pci-compliance.html' title='IT Checklists for PCI Compliance '/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-TBqNGDYvpfE/WyE9kbpm7nI/AAAAAAAABf8/-GRVEIasTEofMbJ9GNLD0iCGgd_CORm4gCLcBGAs/s72-c/IT%2BChecklists_Blog.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-4973284621465752326</id><published>2018-06-05T12:53:00.000-07:00</published><updated>2018-08-15T09:14:00.244-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="PCI 3.1"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="pci dss 3.1"/><title type='text'>PCI 3.1: Stop Using SSL and Outdated TLS Immediately</title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/pci-31-stop-using-ssl-and-outdated-tls-immediately&#39; /&gt;

&lt;img alt=&quot;PCI 3.1 SSL TLS&quot; border=&quot;0&quot; data-original-height=&quot;622&quot; data-original-width=&quot;1088&quot; height=&quot;113&quot; src=&quot;https://3.bp.blogspot.com/-Kle8v-7QmFs/Wxblhi-HVHI/AAAAAAAABeg/zmHT2OyXl2wHoroQf94AbGchweGAqcocwCLcBGAs/s200/PCI%2B3.1%2BSSL%253ATLS%2Brevamp%2Bblog.png&quot; style=&quot;display: none;&quot; title=&quot;&quot; width=&quot;200&quot; /&gt;
&lt;h3&gt;
“SSL has been removed as an example of strong cryptography in the PCI DSS, and can no longer be used as a security control after June 30, 2016.” &lt;/h3&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://blog.securitymetrics.com/search?q=gary+glover&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Gary Glover, Director of Security Assessments&quot; border=&quot;0&quot; height=&quot;100&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzhLA0V0-bcXVJcazU7oOjR8cnChEgd4x5FT_rb9i_nI87HGfZfdlqPConOojK8MRPfzvDWg1sLY2k95ROnNMYC-pilojOgHQZIvQgCGKKS6IbRamqbnNd1-dvI3N_jdvQevh0IumU59I/s1600/Gary_Glover_blog.png&quot; title=&quot;&quot; width=&quot;100&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Gary Glover&lt;br /&gt;
SVP, Assessments&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
UPDATE: As of May 2017, PCI DSS 3.2.1 is the latest standard.&amp;nbsp;&lt;a href=&quot;http://blog.securitymetrics.com/2018/05/pci-council-releases-pci-dss-321-what.html&quot;&gt;Read more about the 3.2.1 updates&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blog.pcisecuritystandards.org/are-you-ready-for-30-june-2018-sayin-goodbye-to-ssl-early-tls&quot;&gt;June 30, 2018&lt;/a&gt; is the deadline for merchants to disable SSL/early TLS and implement a more secure encryption protocol. TLS 1.1 or higher is required (TLS v1.2 strongly encouraged).&lt;br /&gt;
&lt;br /&gt;
 In April of 2015, the Payment Card Industry Security Standards Council (PCI SSC) released an unscheduled and important update: PCI DSS version 3.1. While it did include minor clarifications and additions, PCI 3.1 was primarily released to address the insecurity of Secure Sockets Layer (SSL) and some Transport Layer Security (TLS) encryption protocols.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
After the release of PCI 3.1, all SSL and early TLS versions were not (and still are not) considered strong cryptography.&lt;br /&gt;
&lt;br /&gt;
SSL and TLS encrypt the information sent between web browsers and web servers. Since the release of SSL v3, unfixable vulnerabilities were identified. You may have heard of some of these vulnerabilities back in 2014, including&amp;nbsp;&lt;a href=&quot;http://blog.securitymetrics.com/2015/03/freak-exploit.html&quot; target=&quot;_blank&quot;&gt;FREAK&lt;/a&gt;, &lt;a href=&quot;http://blog.securitymetrics.com/2014/10/poodle-vulnerability.html&quot; target=&quot;_blank&quot;&gt;POODLE&lt;/a&gt;, and &lt;a href=&quot;http://blog.securitymetrics.com/2014/11/windows-schannel-vulnerability.html&quot; target=&quot;_blank&quot;&gt;WinShock&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;quote&quot;&gt;
The point is, the PCI Council has deemed that SSL and early TLS will no longer protect cardholder data.&lt;br /&gt;
&lt;div class=&quot;custom_twitter&quot;&gt;
&lt;a href=&quot;http://ctt.ec/4csoW&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;PCI Council: SSL and early TLS will no longer protect cardholder data. http://bit.ly/1ERO1Kq&quot; src=&quot;http://clicktotweet.com/img/bg-twitter.png&quot; height=&quot;40&quot; width=&quot;30&quot; /&gt;Tweet&lt;/a&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;a href=&quot;https://3.bp.blogspot.com/-Kle8v-7QmFs/Wxblhi-HVHI/AAAAAAAABeg/zmHT2OyXl2wHoroQf94AbGchweGAqcocwCLcBGAs/s1600/PCI%2B3.1%2BSSL%253ATLS%2Brevamp%2Bblog.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;PCI 3.1 SSL TLS&quot; border=&quot;0&quot; data-original-height=&quot;622&quot; data-original-width=&quot;1088&quot; height=&quot;113&quot; src=&quot;https://3.bp.blogspot.com/-Kle8v-7QmFs/Wxblhi-HVHI/AAAAAAAABeg/zmHT2OyXl2wHoroQf94AbGchweGAqcocwCLcBGAs/s200/PCI%2B3.1%2BSSL%253ATLS%2Brevamp%2Bblog.png&quot; style=&quot;display: none;&quot; title=&quot;&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;Since the April 2015 update, merchants were not allowed to implement any new technology relying on SSL or early TLS (version 1.0 and sometimes 1.1, depending on use and implementation). Merchants already using systems and devices that utilize SSL and TLS must discontinue the use of those systems and devices before June 30, 2016.&lt;br /&gt;
&lt;br /&gt;
The PCI DSS v3.1 requirements directly affected are:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Requirement 2.2.3 &lt;/b&gt;Implement additional security features for any required services, protocols, or daemons considered insecure.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Requirement 2.3&lt;/b&gt; Encrypt all non-console administrative access using strong cryptography.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Requirement 4.1&lt;/b&gt; Use strong cryptography and security protocols to safeguard sensitive cardholder data during transmission over open, public networks.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
Each of these requirements will have additional sub-requirements or guidance provided in the &lt;a href=&quot;http://blog.securitymetrics.com/2018/05/pci-council-releases-pci-dss-321-what.html&quot;&gt;latest version of the PCI DSS.&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
How will PCI 3.1 affect SecurityMetrics customers?&lt;/h4&gt;
SecurityMetrics has been scanning for SSL vulnerabilities for over a decade. Specifically, we have been scanning for SSL version 3 vulnerabilities, such as the POODLE vulnerability, since October 2014.&lt;br /&gt;
&lt;ul&gt;
&lt;a href=&quot;https://3.bp.blogspot.com/-GbAAfiIy_Lg/WxblQFBi2CI/AAAAAAAABeU/y2kPQ69yb74F9Ub0SQcxIL7z2jiH0Yf8wCLcBGAs/s1600/PCI3.1%2BSSL%253ATLS%2Brevamp%2Bicon.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;PCI 3.1 SSL TLS&quot; border=&quot;0&quot; data-original-height=&quot;250&quot; data-original-width=&quot;251&quot; height=&quot;199&quot; src=&quot;https://3.bp.blogspot.com/-GbAAfiIy_Lg/WxblQFBi2CI/AAAAAAAABeU/y2kPQ69yb74F9Ub0SQcxIL7z2jiH0Yf8wCLcBGAs/s200/PCI3.1%2BSSL%253ATLS%2Brevamp%2Bicon.png&quot; title=&quot;&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;
&lt;li&gt;SecurityMetrics vulnerability scans do not currently fail merchants using SSL or TLS 1.0 &lt;i&gt;as long as they have provided documentation&lt;/i&gt; showing they have a TLS Mitigation and Migration plan.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;This exception will expire when the June 30, 2018 deadline hits.&lt;/b&gt; Customers that have not disabled SSL and Early TLS and rescanned by that date may be knocked out of compliance due to a failing scan&amp;nbsp;&lt;a href=&quot;https://www.securitymetrics.com/contact&quot; target=&quot;_blank&quot;&gt;contact SecurityMetrics Support&lt;/a&gt; if you have questions.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class=&quot;&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a class=&quot;cta-pci&quot; href=&quot;http://bit.ly/1gk1QrK&quot; style=&quot;color: white;&quot; target=&quot;_blank&quot;&gt;Follow for more data security articles like this&lt;/a&gt;&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;/h4&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
What about HTTPS and ecommerce?&lt;/h4&gt;
&lt;/div&gt;
Because virtually all ecommerce websites have SSL/TLS enabled for their cryptography, they are at the highest risk from SSL/TLS vulnerabilities. New &lt;a href=&quot;http://blog.securitymetrics.com/2017/06/look-at-e-commerce-guidance-what-to-know.html&quot;&gt;e-commerce&lt;/a&gt; websites must not use or support SSL/early TLS.&lt;br /&gt;
&lt;br /&gt;
The PCI Council also stated that web browsers will begin prohibiting SSL connections in the near future, preventing users from accessing web servers that haven’t migrated to a more modern protocol.&lt;br /&gt;
&lt;h4&gt;
&lt;br /&gt;What about my POS/POI terminal?&lt;/h4&gt;
The PCI Council decided that Point of Sale (POS) or Point of Interaction (POI) devices that aren’t susceptible to all known exploits of SSL and early TLS may continue to be used, even after the deadline.&lt;br /&gt;
&lt;br /&gt;
Merchants who continue using old POS or POI devices should understand that because SSL is outdated technology, it may be subject to future security vulnerabilities. The PCI Council recommends that POI environments update to TLS v1.1 or later if possible.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
How do I know if I’m using SSL/early TLS?&lt;/h4&gt;
SSL and TLS are widely used, so I recommend contacting your terminal providers, gateways, service providers, vendors, and acquiring bank to determine if the applications and devices you use have this encryption protocol. If you’re writing your own software, please check with your development department.&lt;br /&gt;
&lt;br /&gt;
Examples of applications that likely use SSL/early TLS
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Virtual payment terminals&lt;/li&gt;
&lt;li&gt;Back-office servers&lt;/li&gt;
&lt;li&gt;Web/application servers&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;
&lt;b&gt;
What if I’m using SSL/early TLS?&lt;/b&gt;&lt;/h4&gt;
The PCI Council has released guidance on migrating from SSL and TLS, as well as examples and recommendations on how to deal with this requirement in their &lt;a href=&quot;https://www.pcisecuritystandards.org/documents/Migrating_from_SSL_Early_TLS_Information%20Supplement_v1.pdf&quot; target=&quot;_blank&quot;&gt;Migrating from SSL and Early TLS information supplement.&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;b&gt;If you use SSL/early TLS, but don’t need to:&lt;/b&gt;&lt;/h4&gt;
If you have existing implementations of SSL and early TLS that you don’t need for regular business operations, immediately remove or discontinue all instances of SSL/TLS. Do not use any new technologies that use SSL/TLS.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;b&gt;If you use SSL/early TLS, and need to continue using:&lt;/b&gt;&lt;/h4&gt;
First, remember not to implement any new technologies that use SSL/TLS. But, if you need to continue using SSL/early TLS to continue regular business operations, here are some examples of what you can do:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Upgrade to a current, secure version of TLS configured to not accept fallback to SSL or early TLS.&lt;/li&gt;
&lt;li&gt;Encrypt data with strong cryptography before sending over SSL/early TLS (for example, use field-level or application-level encryption to encrypt the data prior to transmission)&lt;/li&gt;
&lt;li&gt;Set up a strongly-encrypted session first (e.g. IPsec tunnel), then send data over SSL within the secure tunnel&lt;/li&gt;
&lt;li&gt;Check firewall configurations to see if SSL can be blocked&lt;/li&gt;
&lt;li&gt;Check all application and system patches are up to date&lt;/li&gt;
&lt;li&gt;Check and monitor systems to ID suspicious activity that may indicate a security issue&lt;/li&gt;
&lt;/ul&gt;
Please note that organizations with existing implementations of SSL and early TLS must have a Risk Mitigation and Migration Plan in place. According to the PCI Council, this document will “detail [your] plans for migrating to a secure protocol, and also describes controls [you have] in place to reduce the risk associated with SSL/early TLS until the migration is complete.”&lt;br /&gt;
&lt;br /&gt;
You will need to provide your Risk Mitigation and Migration Plan to your PCI assessor as part of the PCI DSS assessment process.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Learn more about the Risk Mitigation and Migration Plan in the PCI Council’s &lt;a href=&quot;https://www.pcisecuritystandards.org/documents/Migrating_from_SSL_Early_TLS_Information%20Supplement_v1.pdf&quot; target=&quot;_blank&quot;&gt;migrating from SSL and Early TLS information supplement.&lt;/a&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Need help discontinuing the use of SSL/TLS? &lt;a href=&quot;https://www.securitymetrics.com/contact&quot; target=&quot;_blank&quot;&gt;Contact our PCI support team.&lt;/a&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Gary Glover (CISSP, CISA, QSA, PA-QSA) is Senior Vice President of Security Assessments at &lt;a href=&quot;https://www.securitymetrics.com/&quot; target=&quot;_blank&quot;&gt;SecurityMetrics&lt;/a&gt; with over 10 years of &lt;a href=&quot;https://www.securitymetrics.com/pci-audit&quot; target=&quot;_blank&quot;&gt;PCI audit&lt;/a&gt; experience and 25 years of Star Wars quoting skills. May the Force be with you as you visit his other &lt;a href=&quot;http://blog.securitymetrics.com/search?q=gary+glover&quot; target=&quot;_blank&quot;&gt;blog posts&lt;/a&gt;.&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://2.bp.blogspot.com/-zmJbW-y-bEI/WrwbKAo7tNI/AAAAAAAABSQ/Z8FEy74oP_Ag8CznKAArUXzpyiIKSfnLQCPcBGAYYCw/s1600/2018%2BPCI%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/4973284621465752326'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/4973284621465752326'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2015/04/pci-3-1-ssl-and-tls.html' title='PCI 3.1: Stop Using SSL and Outdated TLS Immediately'/><author><name>SecurityMetrics</name><uri>http://www.blogger.com/profile/07857472080352783747</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOObapsiepRZnDmD0BRhS7ISZbjX7e1hlVCU7MSt_fviOxZFnERYVXo4COBPm1Jxb8E_diq6nPDo-28CKN_dBCXnTNG7wulKJjo2VT5cqk4354ItXYfzl-6S66D1FOAg/s220/Social+Media+profile+pic-04.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-Kle8v-7QmFs/Wxblhi-HVHI/AAAAAAAABeg/zmHT2OyXl2wHoroQf94AbGchweGAqcocwCLcBGAs/s72-c/PCI%2B3.1%2BSSL%253ATLS%2Brevamp%2Bblog.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-6203256892586842063</id><published>2018-05-28T21:47:00.001-07:00</published><updated>2018-08-14T08:20:27.119-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="2017 data breach trends"/><category scheme="http://www.blogger.com/atom/ns#" term="cost of a data breach"/><category scheme="http://www.blogger.com/atom/ns#" term="data breach"/><category scheme="http://www.blogger.com/atom/ns#" term="data breach predictions"/><title type='text'>Lessons from Data Breaches in 2017 and What to Expect in 2018</title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/lessons-data-breaches-2017-and-what-expect-2018&#39; /&gt;

&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;113&quot; src=&quot;https://3.bp.blogspot.com/-t8IFg7xPcRU/WwzZyBKhq0I/AAAAAAAABdc/Y3ujOthMA0sP77a7cgi_T1cUAecxvrLhQCEwYBhgL/s200/Forensics%2Blessons%2Blearned_Blog.jpg&quot; style=&quot;display: none;&quot; width=&quot;200&quot; /&gt;

&lt;br /&gt;
&lt;h3&gt;
Which data breach predictions came true in 2017 and what to expect for 2018.&lt;/h3&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;a href=&quot;http://blog.securitymetrics.com/search?q=david+ellis&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;986&quot; data-original-width=&quot;986&quot; height=&quot;100&quot; src=&quot;https://4.bp.blogspot.com/-KhphYo93GPM/WmJSx58jT8I/AAAAAAAAAlo/CreHWgLFvrA1PjiNcou5CSWHBA8zNokQACPcBGAYYCw/s320/Dave%2BEllis.jpg&quot; width=&quot;100&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;David Ellis&lt;br /&gt;
SVP, Investigations&lt;br /&gt;
&lt;span style=&quot;text-align: start;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;GCIH, QSA, PFI, CISSP&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
This blog is based on Dave Ellis’s Webinar, “Lessons Learned from 2017 Forensic Investigations.&quot; You can &lt;a href=&quot;http://info.securitymetrics.com/2017-forensics-webinar&quot;&gt;download and watch the webinar here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
SecurityMetrics&#39; Forensic Investigations Team has been helping business recover from data breaches and theft for over eighteen years. We analyze the data from those investigations and use it to inform our customers, predict breach trends, and better protect merchants.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
How did our predictions for 2017 play out?&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;i&gt;Insecure remote access will continue to plague organizations &lt;/i&gt;&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Yes; continues to be the most common problem we see. &lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;&lt;i&gt;Large-scale POS breaches will decrease, but employees will remain high-risk &lt;/i&gt;&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;This certainly happened. We’ve seen the large-scale breaches decline, and employees were the most common weak point (e.g., opening phishing emails). &lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;&lt;i&gt;Overall number of breaches will temporarily decrease &lt;/i&gt;&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;This is proven true according to our investigations. POS breaches have declined with the advent of EMV.  &lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;&lt;i&gt;Ecommerce breaches will increase &lt;/i&gt;&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;In 2017, 56% of the payment card investigations we performed were in ecommerce, up from 38% in 2016.  &lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;&lt;i&gt;Increased attacks against healthcare targets &lt;/i&gt;&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Yes; we saw near-two-fold increase in healthcare breaches last year. &lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;&lt;i&gt;A resurgence of ransomware &lt;/i&gt;&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;According to Malware Bytes, ransomware was the most prolific gainer of 2017. Ransomware rates tripled in number from 2016; 60% of malware payloads installed on commercial systems were ransomware.  &lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;b&gt;INFOGRAPHIC: &lt;/b&gt;&lt;a href=&quot;http://info.securitymetrics.com/infographic-data-breach-visualization-2017&quot;&gt;2017 PCI Data Breach Trends&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Many of our readers want to know: what does a cyberattack typically look like? How does an attacker gain access to a system in the first place? How do they steal the information, and what do they do with it?&lt;br /&gt;
&lt;br /&gt;
It pays to understand the steps and patterns of a hacker—plus, it brings to light how important it is to comply with security standards regarding password complexity and secure remote access.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
An attacker’s activities will typically include:&lt;/h4&gt;
&lt;ol&gt;
&lt;li&gt;Scan internet for open remote access ports. The majority of attacks are not specifically targeted. More commonly, an attacker will start by launching a port scan over a large range of IP addresses looking for open ports that correspond to remote access applications. If they see the company is running remote access software, they will likely attempt to breach through that software.  &lt;/li&gt;
&lt;li&gt;They will enter ‘administrator’ or ‘admin’ for the username, and now they just need to “bruteforce” a password using an online password list.  &lt;/li&gt;
&lt;li&gt;Test remote access credentials. &lt;/li&gt;
&lt;li&gt;If successful, they gain system access and ascertain where they are (e.g., whether they have gained access to a healthcare organization, retail business, or home network). &lt;/li&gt;
&lt;li&gt;At this point, an attacker might monitor your activity by installing a keylogger. &lt;/li&gt;
&lt;li&gt;Download malware onto the system or encrypt critical files.  &lt;/li&gt;
&lt;li&gt;Attacker will capture confidential information or contact the owner of the system and levy ransom demands.&amp;nbsp;&lt;/li&gt;
&lt;/ol&gt;
&lt;div&gt;
&lt;b&gt;SEE ALSO:&lt;/b&gt;&amp;nbsp;&lt;a href=&quot;http://blog.securitymetrics.com/2018/01/2017-data-breach-trends.html&quot;&gt;2017 PCI DSS Data Breach Trends Blog Post&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a class=&quot;cta-pci&quot; href=&quot;http://bit.ly/1gk1QrK&quot; style=&quot;color: white;&quot; target=&quot;_blank&quot;&gt;Follow for more data security articles like this&lt;/a&gt;&lt;/div&gt;
&lt;h4&gt;
How does stolen data turn into money for hackers?&lt;/h4&gt;
&lt;a href=&quot;https://3.bp.blogspot.com/-t8IFg7xPcRU/WwzZyBKhq0I/AAAAAAAABdc/Y3ujOthMA0sP77a7cgi_T1cUAecxvrLhQCEwYBhgL/s1600/Forensics%2Blessons%2Blearned_Blog.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;113&quot; src=&quot;https://3.bp.blogspot.com/-t8IFg7xPcRU/WwzZyBKhq0I/AAAAAAAABdc/Y3ujOthMA0sP77a7cgi_T1cUAecxvrLhQCEwYBhgL/s200/Forensics%2Blessons%2Blearned_Blog.jpg&quot; style=&quot;display: none;&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
Attackers might personally use the credit card numbers online or to buy gift cards or prepaid cash cards.&lt;br /&gt;
&lt;br /&gt;
Or—they could be a part of a large organization made up of talented individuals. Organized hacking is like the “new mafia.” These operations are highly systemized, and their employees are probably more motivated than you or I at our jobs. Widespread across the globe, hacking organizations post their offerings on the dark web, and aim to sell the credit card information per number or in bulk.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Most common security failures in 2017:&lt;/h4&gt;
&lt;a href=&quot;https://3.bp.blogspot.com/-yTlb8q6od5s/WwzacKcKuwI/AAAAAAAABdg/VVvW0Yr7oP8aOlvDyJlUKd-MIAiBV0ShwCLcBGAs/s1600/2018%2BBlog%2BPosts_Image%2B%25281%2529.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;292&quot; data-original-width=&quot;273&quot; height=&quot;200&quot; src=&quot;https://3.bp.blogspot.com/-yTlb8q6od5s/WwzacKcKuwI/AAAAAAAABdg/VVvW0Yr7oP8aOlvDyJlUKd-MIAiBV0ShwCLcBGAs/s200/2018%2BBlog%2BPosts_Image%2B%25281%2529.png&quot; width=&quot;186&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Firewalls:&lt;/b&gt; &lt;a href=&quot;http://blog.securitymetrics.com/2018/01/2017-data-breach-trends.html&quot;&gt;About 52% of the cases we investigated&lt;/a&gt; had inadequate firewall configurations. In some cases, there were no firewalls at all, but most often they weren’t properly configured.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Passwords:&lt;/b&gt; Similar to when firewalls are left on default configurations, passwords can be left on default settings as well. Or the password might be too simple, like “password” or “12345.” A few years ago, there was a large breach where more than one billion passwords were “lost.” They weren’t actually lost because the hacker that stole them had cleverly inserted them into a brute-force hacking tool (which he made available for sale to others) that can fly through a system and quickly attempt different passwords. To mitigate these attacks, we recommend that your system lock down after three failed password attempts.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Antivirus:&lt;/b&gt; In many of the data breaches we investigated, there was no antivirus installed, or it was expired on some or all of the key systems. And in cases where it was installed, inconsistency was often a problem. The antivirus software wasn’t always installed on all endpoints. We found that 72% of breached companies had adequate antivirus running. But antivirus still makes the list because in the close to 30% of the other cases that inadequacy was a direct contributor to the data breach.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Secure access: &lt;/b&gt;Determines who is and is not allowed to access information on your system. Secure access could be compromised with a weak authentication password but is usually due to a lack of multi-factor authentication. There should not be any areas with sensitive or protected information to which someone could log in without multi-factor authentication. &lt;a href=&quot;http://blog.securitymetrics.com/2017/10/understanding-MFA-supplement.html&quot;&gt;Multi-factor authentication will prove to be a crucial security principle&lt;/a&gt; as time goes on.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;
Other security issues:&lt;/h4&gt;
&lt;ol&gt;
&lt;li&gt;More than one primary function per server. If you have a device that’s used to take patient info or process credit card info, the more you can segment and separate that device from devices that are used to conduct more routine day-to-day activities, the easier it will be for you to provide high-level security for just a few key devices in your critical data environments, rather than across your entire network. &lt;/li&gt;
&lt;li&gt;Application security updates. Ignoring patches continues to be a problem. For example, when payment applications discover security flaws, they will issue security patches. But we see many investigations where organizations failed to update with current patches, even though they had been supplied months (and in some cases, years) before. &lt;/li&gt;
&lt;/ol&gt;
&lt;h4&gt;
SEE ALSO: &lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2016/06/how-to-manage-data-breach-5-steps.html&quot;&gt;5 Steps to Manage a Data Breach&lt;/a&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4&gt;
How did healthcare do with security in 2017?&lt;/h4&gt;
&lt;br /&gt;
The FBI reports(link) increased attacks against healthcare organizations in 2017: 88% of ransomware attacks last year targeted healthcare organizations. The other 12% were targeting individuals or non-healthcare businesses. Hackers recognize that if they can hold hostage patient information or doctors’ notes, the healthcare industry has to act immediately and is more likely to pay a ransom.&lt;br /&gt;
&lt;br /&gt;
89% of studied healthcare organizations reported a breach involving the loss of patient data in the past two years. In our investigations, we found that 78% were compliant with the HIPAA requirement to encrypt patient data, 55% complied with reviewing firewall rules at least yearly, and only 26% complied with using multi-factor authentication for remote access. 
&lt;br /&gt;
Top organizational vulnerabilities&lt;br /&gt;
&lt;br /&gt;
In our opinion, the top vulnerabilities organizations should focus on are:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Insecure remote access &lt;/b&gt;&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Tip:&lt;/b&gt; Insist on multi-factor authentication with &lt;a href=&quot;http://blog.securitymetrics.com/2017/07/pci-requirement-8-combatting-weak-passwords.html&quot;&gt;strong passwords&lt;/a&gt; and tokens for all environments containing high value data.  &lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;&lt;b&gt;Employees  &lt;/b&gt;&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Tip:&lt;/b&gt; Train employees on identifying phishing emails and &lt;a href=&quot;http://blog.securitymetrics.com/2017/12/employee-training-social-engineering.html&quot;&gt;social engineering attacks.&lt;/a&gt;  &lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;&lt;b&gt;BYOD procedures  &lt;/b&gt;&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Tip: &lt;/b&gt;Bring Your Own Device (BYOD) can be a problem. For example, an employee that uses their work computer on a home network inadvertently downloads a virus. The employee then introduces the virus into the work environment when they log back into the work network. Your work environment should scan devices for viruses when it detects a new login.  &lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;&lt;b&gt;3rd Parties&lt;/b&gt;&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Tip:&lt;/b&gt; Know where your data flows and is stored. Conduct risk assessments that include 3rd-party service providers. Do your due diligence with service providers, making sure you have policies, procedures, and agreements on file regarding their security.  &lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;h4&gt;
Top 10 Tips to avoid data breaches&lt;/h4&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2016/08/employee-training-in-data-security.html&quot;&gt;Educate staff employees&lt;/a&gt;: &lt;a href=&quot;http://blog.securitymetrics.com/2018/01/employee-data-security-training-tabletop-exercises.html&quot;&gt;Hold regular trainings&lt;/a&gt; with special focus on phishing/spoof emails. 10% of phishing email links are clicked on. Also train your staff to recognize and guard against social engineering. Teach them to question what seem like unusual requests for information (like W2s or personal data). &lt;/li&gt;
&lt;li&gt;Install updates and patches: Consistently monitor application updates and watch for flaws and subsequent patches.  &lt;/li&gt;
&lt;li&gt;Develop secure code, then test: Enforce a secure software development lifecycle. For example, follow NIST 800-115 or the OWASP Testing Guide.  &lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2016/03/vulnerability-scanners-101-what-why-and-how.html&quot;&gt;Vulnerability Scans&lt;/a&gt; and &lt;a href=&quot;http://blog.securitymetrics.com/2015/04/penetration-test-cost.html&quot;&gt;Penetration Tests&lt;/a&gt;: Schedule scans often and regularly (e.g., quarterly) and after any significant network changes. Conduct penetration tests on critical systems at least yearly and after any significant network changes. Be sure to include social engineering tests.  &lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2017/09/pci-requirement-10-logging.html&quot;&gt;Configure and review logs&lt;/a&gt;: The best way to find out about a breach is from your own internal review. Someone in your organization needs to have eyes on security logs daily. Create and implement a process to respond to intrusion detection system (IDS) and file integrity monitoring (FIM) alerts in real time.  &lt;/li&gt;
&lt;li&gt;Risk assessments: Hold a risk assessment at least annually and after any significant network changes.  &lt;/li&gt;
&lt;li&gt;Control admin access:&amp;nbsp; Update default usernames like “admin.” Implement multi-factor authentication and restrict access to sensitive data.  &lt;/li&gt;
&lt;li&gt;Segment your network: (link) Implement network segmentation by isolating less-secure networks from high-security networks. Ensure that a breach of the less-secure network cannot affect the high-security network.  &lt;/li&gt;
&lt;li&gt;Hide sensitive data: (link) Chances are you need to store some sensitive data at your business, so at a minimum, sensitive data should be encrypted and properly secured. Be certain to test your backups to ensure that you will be able to restore from them after a data breach. (This will be your greatest defense against a successful ransomware attack.) &lt;/li&gt;
&lt;li&gt;Develop and test an incident response plan: (link on how to do one) Creating a thorough incident response plan (IRP) (and testing it annually) will help coordinate your response during and after a security incident, minimize an incident’s impact, and restore your operations as quickly as possible.&amp;nbsp;&lt;/li&gt;
&lt;/ol&gt;
&lt;h4&gt;
2018 Forensic Predictions&amp;nbsp;&lt;/h4&gt;
&lt;ol&gt;
&lt;li&gt;Ecommerce breaches will continue to increase, as will attacks against healthcare. Ecommerce increased last year, and it will continue to do so. We will probably settle in at a rate of about 80% of investigated breaches that occur in ecommerce environments.  &lt;/li&gt;
&lt;li&gt;Smaller merchant breaches will come under greater scrutiny. It used to be that virtually all merchant breaches were investigated. But about five years ago, the card brands softened their mandates to reduce the financial burden for smaller merchants. While a breach of a single small merchant doesn’t typically expose a large number of credit card accounts, the collective total of several small merchant data breaches does. As the number of point-of-sale (POS) card-present breaches decreases, you will start to see increased pressure for small merchants to take more definitive actions when they’re under the suspicion of a data compromise.  &lt;/li&gt;
&lt;li&gt;Coordinated attacks that start with your cell phone. We had an attack last year that started with a breached cell phone, which led to the personal computer in the home, then on to the owner’s business (which was n the healthcare industry), then the breach spread to all of the devices in that environment. You may also see more attacks aimed at individuals—and those may be likely to start with a cell phone.  &lt;/li&gt;
&lt;li&gt;Passwords may not be the security you’re looking for. We will start to see next year—and more so in the coming years—that passwords will no longer be considered an element of security. There is present technology that can search and break password hashes at the rate of 600 billion attempts per second. This means that attackers could span every possible combination of keys possible, in most languages, in just a few days. As developers put more steam behind this tool, the time and resources needed to break passwords will greatly reduce, regardless of password complexity level.  &lt;/li&gt;
&lt;li&gt;Artificial intelligence (AI): on your side and against you. We will likely start to see security tools with artificial intelligence that can detect and adapt to data breaches. But we will also likely see AI on the attackers’ side—with malware that can self-move, self-manipulate, and self-hide in response to what it sees a user do. AI will start to show up with increasing frequency, and it’s going to make the future of data security very interesting.&amp;nbsp;&lt;/li&gt;
&lt;/ol&gt;
&lt;div&gt;
&lt;b&gt;SEE ALSO:&lt;/b&gt;&amp;nbsp;&lt;a href=&quot;http://blog.securitymetrics.com/2016/10/-how-much-does-a-data-breach-cost.html&quot;&gt;How Much Does a Data Breach Cost Your Organization?&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Learn more about our &lt;a href=&quot;https://www.securitymetrics.com/forensics&quot;&gt;Incident Response Services&lt;/a&gt;&amp;nbsp;or inquire about a&amp;nbsp;&lt;a href=&quot;https://www.securitymetrics.com/pci-audit&quot;&gt;PCI&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href=&quot;https://www.securitymetrics.com/hipaa-audit&quot;&gt;HIPAA Audit&lt;/a&gt;.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;David Ellis (GCIH, QSA, PFI, CISSP) is Director of &lt;a href=&quot;https://www.securitymetrics.com/forensics&quot; target=&quot;_blank&quot;&gt;Forensic Investigations&lt;/a&gt; at &lt;a href=&quot;https://www.securitymetrics.com/&quot; target=&quot;_blank&quot;&gt;SecurityMetrics&lt;/a&gt; with over 25 years of law enforcement and investigative experience. Check out his other &lt;a href=&quot;http://blog.securitymetrics.com/search?q=david+ellis&quot; target=&quot;_blank&quot;&gt;blog posts&lt;/a&gt;.&lt;/i&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://2.bp.blogspot.com/-zmJbW-y-bEI/WrwbKAo7tNI/AAAAAAAABSQ/Z8FEy74oP_Ag8CznKAArUXzpyiIKSfnLQCPcBGAYYCw/s1600/2018%2BPCI%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://3.bp.blogspot.com/-t8IFg7xPcRU/WwzZyBKhq0I/AAAAAAAABdY/r-zuAhFzdK0UVhxbwgQjY0kOQy3K6rJ0ACLcBGAs/s1600/Forensics%2Blessons%2Blearned_Blog.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;182&quot; src=&quot;https://3.bp.blogspot.com/-t8IFg7xPcRU/WwzZyBKhq0I/AAAAAAAABdY/r-zuAhFzdK0UVhxbwgQjY0kOQy3K6rJ0ACLcBGAs/s320/Forensics%2Blessons%2Blearned_Blog.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/6203256892586842063'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/6203256892586842063'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2018/05/lessons-from-data-breaches-in-2017-and.html' title='Lessons from Data Breaches in 2017 and What to Expect in 2018'/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-t8IFg7xPcRU/WwzZyBKhq0I/AAAAAAAABdc/Y3ujOthMA0sP77a7cgi_T1cUAecxvrLhQCEwYBhgL/s72-c/Forensics%2Blessons%2Blearned_Blog.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-8350818100962532933</id><published>2018-05-22T13:27:00.001-07:00</published><updated>2018-08-14T08:19:38.207-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="PCI compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI DSS"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI DSS 3.2"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI DSS 3.2.1"/><title type='text'>PCI Council Releases PCI DSS 3.2.1: What You Need to Know</title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/pci-council-releases-pci-dss-321-what-you-need-know&#39; /&gt;

&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1515&quot; height=&quot;176&quot; src=&quot;https://2.bp.blogspot.com/-J4uT4RyAFC0/WwR8IH9viBI/AAAAAAAABdM/_mn5J2hZ2Mgj_6Zwaev8MzdV67DVXd57QCEwYBhgL/s320/2018%2BBlog%2BPosts_Main%2BBlog.jpg&quot; width=&quot;320&quot;style=&quot;display:none&quot; /&gt;&lt;h3&gt;
Learn what’s changed in the latest version of the PCI DSS.&lt;/h3&gt;
&lt;h4&gt;
PCI DSS version 3.2.1&lt;/h4&gt;
&lt;a href=&quot;https://4.bp.blogspot.com/-tBLQ3HoS8UM/WwR8IDI_69I/AAAAAAAABdE/cFAVahFGiekT14nCJDKWfJZW0nhB2tV-QCLcBGAs/s1600/2018%2BBlog%2BPosts_PCI%2BCouncil%2BReleases_Image.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;608&quot; data-original-width=&quot;568&quot; height=&quot;200&quot; src=&quot;https://4.bp.blogspot.com/-tBLQ3HoS8UM/WwR8IDI_69I/AAAAAAAABdE/cFAVahFGiekT14nCJDKWfJZW0nhB2tV-QCLcBGAs/s200/2018%2BBlog%2BPosts_PCI%2BCouncil%2BReleases_Image.jpg&quot; width=&quot;186&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-J4uT4RyAFC0/WwR8IH9viBI/AAAAAAAABdI/2U2Yhgk3OEs38I-H0Rn9M6_9HdrP-XvAACLcBGAs/s1600/2018%2BBlog%2BPosts_Main%2BBlog.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1515&quot; height=&quot;110&quot; src=&quot;https://4.bp.blogspot.com/-J4uT4RyAFC0/WwR8IH9viBI/AAAAAAAABdI/2U2Yhgk3OEs38I-H0Rn9M6_9HdrP-XvAACLcBGAs/s200/2018%2BBlog%2BPosts_Main%2BBlog.jpg&quot; style=&quot;display: none;&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;The Payment Card Industry Security Standards Council (PCI SSC) &lt;a href=&quot;https://www.pcisecuritystandards.org/pdfs/PCI-DSS-3.2.1-Release.pdf?utm_campaign=General%20communications&amp;amp;utm_medium=email&amp;amp;_hsenc=p2ANqtz-_yU2PXzYIhyKiKbzt4PM095lGDK0VqmEZRaXs1e7WIA6bUYUp514UpNVkxePzZM9HzNmfYstu4cBpVHsbovgN64WaH9QB1S2ilfqxx4_wmbWcyu8U&amp;amp;_hsmi=63010115&amp;amp;utm_content=63010115&amp;amp;utm_source=hs_email&amp;amp;hsCtaTracking=148ef970-fda9-4060-96ce-3058a2f3842e%7C8887aad7-e84c-4a26-aaf4-b62eb663e5af&quot;&gt;recently announced&lt;/a&gt; the release of the PCI Data Security Standard version 3.2.1.&lt;br /&gt;
&lt;br /&gt;
The Council previously &lt;a href=&quot;https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2.pdf?agreement=true&amp;amp;time=1526933356500&quot;&gt;released version 3.2&lt;/a&gt; in April of 2016 to replace version 3.1, which &lt;a href=&quot;https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2_Summary_of_Changes.pdf?agreement=true&amp;amp;time=1526933425054&quot;&gt;brought with it some big changes&lt;/a&gt;, among which were &lt;a href=&quot;http://blog.securitymetrics.com/2017/05/new-requirements-for-service-providers.html&quot;&gt;new requirements for service providers&lt;/a&gt; and additional guidance about multi-factor authentication.&lt;br /&gt;
&lt;br /&gt;
So what has changed between versions 3.2 and 3.2.1?&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Changes to standard characterized as &quot;clarifications&quot;&amp;nbsp;&lt;/h4&gt;
All of the changes in &lt;a href=&quot;https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf?agreement=true&amp;amp;time=1526937988299&quot;&gt;this latest version 3.2.1&lt;/a&gt; are characterized by the PCI Council as clarification—as&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://2.bp.blogspot.com/-J4uT4RyAFC0/WwR8IH9viBI/AAAAAAAABdM/_mn5J2hZ2Mgj_6Zwaev8MzdV67DVXd57QCEwYBhgL/s1600/2018%2BBlog%2BPosts_Main%2BBlog.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1515&quot; height=&quot;176&quot; src=&quot;https://2.bp.blogspot.com/-J4uT4RyAFC0/WwR8IH9viBI/AAAAAAAABdM/_mn5J2hZ2Mgj_6Zwaev8MzdV67DVXd57QCEwYBhgL/s320/2018%2BBlog%2BPosts_Main%2BBlog.jpg&quot; style=&quot;display: none;&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
opposed to additional guidance or actual changes in requirements. The intent of clarification from the PCI Council is to ensure that “concise wording in the standard portrays the desired intent of requirements.”&lt;br /&gt;
&lt;br /&gt;
Many of the changes involve simply removing requirements’ effective dates which have passed or correcting minor punctuation and format issues. However, there are a few items of clarification regarding SSL/early TLS and multi-factor authentication that are worth noting:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;“Appendix A2: Additional PCI DSS Requirements for Entities using SSL/early TLS” has been &lt;b&gt;renamed&lt;/b&gt; “Appendix A2: Additional PCI DSS Requirements for Entities using SSL/early TLS for Card-Present POS POI terminal connections.”  &lt;/li&gt;
&lt;li&gt;In Appendix A2, requirements A2.1 – A2.3 were &lt;b&gt;updated&lt;/b&gt; to focus only on the allowance for POS POIs that are not susceptible to known exploits and their service provider termination points to continue using SSL/early TLS. &lt;/li&gt;
&lt;li&gt;In “Appendix B: Compensating Controls,” Multi-factor authentication was &lt;b&gt;removed&lt;/b&gt; from the compensating control example, as MFA is now required for all non-console administrative access. The use of one-time passwords (tokens) as an alternative potential control for this scenario was added. &lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;h4&gt;
Stay updated to maintain compliance&amp;nbsp;&lt;/h4&gt;
While these changes are not likely to affect your day-to-day data security routines or require much extra time or money, it’s important to use the latest version of the PCI DSS to avoid misunderstandings and potential gaps in security.&lt;br /&gt;
&lt;br /&gt;
You can read a full and detailed summary of changes between &lt;a href=&quot;https://www.pcisecuritystandards.org/documents/PCI_DSS_Summary_of_Changes_3-2-1.pdf?agreement=true&amp;amp;time=1526571758272&quot;&gt;PCI DSS version 3.2 and 3.2.1 here.&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
If you need help with &lt;a href=&quot;https://www.securitymetrics.com/pci&quot;&gt;PCI compliance&lt;/a&gt; or would like to know more about &lt;a href=&quot;https://www.securitymetrics.com/pci-audit&quot;&gt;PCI audits&lt;/a&gt;, &lt;a href=&quot;https://www.securitymetrics.com/contact&quot;&gt;contact us here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://2.bp.blogspot.com/-zmJbW-y-bEI/WrwbKAo7tNI/AAAAAAAABSQ/Z8FEy74oP_Ag8CznKAArUXzpyiIKSfnLQCPcBGAYYCw/s1600/2018%2BPCI%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/8350818100962532933'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/8350818100962532933'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2018/05/pci-council-releases-pci-dss-321-what.html' title='PCI Council Releases PCI DSS 3.2.1: What You Need to Know'/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-J4uT4RyAFC0/WwR8IH9viBI/AAAAAAAABdM/_mn5J2hZ2Mgj_6Zwaev8MzdV67DVXd57QCEwYBhgL/s72-c/2018%2BBlog%2BPosts_Main%2BBlog.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-7247676454708747334</id><published>2018-05-21T09:29:00.000-07:00</published><updated>2018-08-16T09:31:42.437-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hipaa assistance"/><category scheme="http://www.blogger.com/atom/ns#" term="hipaa audit cost"/><category scheme="http://www.blogger.com/atom/ns#" term="HIPAA compliance audit"/><category scheme="http://www.blogger.com/atom/ns#" term="hipaa compliance consulting"/><category scheme="http://www.blogger.com/atom/ns#" term="hipaa compliance cost"/><category scheme="http://www.blogger.com/atom/ns#" term="hipaa cost"/><category scheme="http://www.blogger.com/atom/ns#" term="HIPAA IT compliance"/><title type='text'>How Much Does HIPAA Compliance Cost?</title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/how-much-does-hipaa-compliance-cost&#39; /&gt;

&lt;img border=&quot;0&quot; data-original-height=&quot;398&quot; data-original-width=&quot;696&quot; height=&quot;113&quot; src=&quot;https://4.bp.blogspot.com/-CglmSFln9uU/WwLzbuTXJfI/AAAAAAAABc8/WgyirqD8i6oeNVST8HP6nY1zAF0KuFfKgCEwYBhgL/s200/Screen%2BShot%2B2018-04-13%2Bat%2B10.38.10%2BAM.png&quot; style=&quot;display: none;&quot; width=&quot;200&quot; /&gt;

&lt;h3&gt;
Realistic HIPAA security budgets vs. wishful thinking.&lt;/h3&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-uEOuEWuclwg/We5Vz_gjQdI/AAAAAAAAAF8/atN5s-5_mOwNZGBl5ORFcvYVwsLovKjJQCPcBGAYYCw/s1600/Jen%2BStone_tight.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;723&quot; data-original-width=&quot;723&quot; height=&quot;100&quot; src=&quot;https://2.bp.blogspot.com/-uEOuEWuclwg/We5Vz_gjQdI/AAAAAAAAAF8/atN5s-5_mOwNZGBl5ORFcvYVwsLovKjJQCPcBGAYYCw/s320/Jen%2BStone_tight.jpg&quot; width=&quot;100&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Jen Stone&lt;br /&gt;
MCSIS, CISSP, QSA&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
HIPAA compliance is rarely allocated the resources it requires. And this trend extends beyond just small organizations with limited security budgets. Lack of budget is a plague that affects risk and compliance officers at health organizations of all sizes.&amp;nbsp;  &lt;br /&gt;
&lt;br /&gt;
This post will give you the information you need to more accurately plan your HIPAA budget.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2015/11/five-things-making-hipaa-security-budget.html&quot; target=&quot;_blank&quot;&gt;Five Things to Consider When Making a HIPAA Security Budget&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
What does the HHS think HIPAA compliance costs?&lt;/h4&gt;
&lt;a href=&quot;https://www.gpo.gov/fdsys/pkg/FR-2013-01-25/pdf/2013-01073.pdf&quot;&gt;The HHS &lt;/a&gt;gave an interesting estimation (see Table 1) of how much HIPAA compliance might cost, shortly after they released the HIPAA Final Rule in 2013.&lt;br /&gt;
&lt;br /&gt;
Per organization, they estimated:
&lt;br /&gt;
&lt;ul&gt;
&lt;a href=&quot;https://4.bp.blogspot.com/-CglmSFln9uU/WwLzbuTXJfI/AAAAAAAABc8/WgyirqD8i6oeNVST8HP6nY1zAF0KuFfKgCEwYBhgL/s1600/Screen%2BShot%2B2018-04-13%2Bat%2B10.38.10%2BAM.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;398&quot; data-original-width=&quot;696&quot; height=&quot;113&quot; src=&quot;https://4.bp.blogspot.com/-CglmSFln9uU/WwLzbuTXJfI/AAAAAAAABc8/WgyirqD8i6oeNVST8HP6nY1zAF0KuFfKgCEwYBhgL/s200/Screen%2BShot%2B2018-04-13%2Bat%2B10.38.10%2BAM.png&quot; style=&quot;display: none;&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;
&lt;li&gt;&lt;b&gt;$80&lt;/b&gt; for an updated Notice of Privacy Practices&lt;/li&gt;
&lt;li&gt;&lt;b&gt;$763&lt;/b&gt; for breach notification requirement updates&lt;/li&gt;
&lt;li&gt;&lt;b&gt;$84&lt;/b&gt; for &lt;a href=&quot;http://blog.securitymetrics.com/2017/09/hipaa-business-associate-agreements.html&quot; target=&quot;_blank&quot;&gt;business associate agreement&lt;/a&gt; updates&lt;/li&gt;
&lt;li&gt;&lt;b&gt;$113 &lt;/b&gt;for security rule compliance&lt;/li&gt;
&lt;/ul&gt;
Grand total per organization: &lt;b&gt;$1,040&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
This estimate is likely inaccurate, especially when considering the complexities of the Security Rule. When the Security Rule was added back in 2003, it included 75 new requirements and 254 points for organizations to validate to, most of which are quite technical.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a class=&quot;cta-hipaa&quot; href=&quot;http://info.securitymetrics.com/subscribe-hipaa&quot; style=&quot;color: white;&quot; target=&quot;_blank&quot;&gt;Follow for more data security articles like this&lt;/a&gt;
&lt;/div&gt;
&lt;br /&gt;
The following is an example of a &quot;validation point:&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;164.308 – Acquire IT Systems and Services (1 requirement)&lt;/b&gt;&lt;br /&gt;
Based on the OCR audit protocol, here are the validation points:
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Interview management to verify that Policy and Procedures exist (P&amp;amp;P)&lt;/li&gt;
&lt;li&gt;Determine if the P&amp;amp;P are approved and updated on a periodic basis&lt;/li&gt;
&lt;li&gt;Obtain and review the documented policy (what is required) and procedure (how we are supposed to accomplish the task)&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Where are P&amp;amp;P stored?  How is it disseminated to staff?&lt;/li&gt;
&lt;li&gt;How do we document staff have read, understand and agree to abide by the policy?&lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;Determine if the P&amp;amp;P are approved and updated on a periodic basis&lt;/li&gt;
&lt;/ul&gt;
In this one example you can see that this single requirement (1 of 75) has three core validation points (3 of 254) with several more minor validation points.&lt;br /&gt;
&lt;br /&gt;
Looking at the math, and the HHS’ estimated $113 allotted to the security rule, that means only $4 is allowed per requirement. It would be a stretch for healthcare entities to accurately validate each new security point for only $4 worth of labor, technology, and implementation. That’s not even taking into account that you will likely need to add (or, at the very least, upgrade) hardware and applications.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgs-bC8ktP-cFwVROv8NgiNic1yisJzN3hhkfsiYk1-g1nmuKttiZbBJEunpAKpL3Tuje3Ur8cNagvt996GXA_ax6HGzheM1hgpA6PehY1vrSQQQL5Cdnjfp6UN-4FAxToNf-XjSCU9BUY/s1600/hipaa+costs.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgs-bC8ktP-cFwVROv8NgiNic1yisJzN3hhkfsiYk1-g1nmuKttiZbBJEunpAKpL3Tuje3Ur8cNagvt996GXA_ax6HGzheM1hgpA6PehY1vrSQQQL5Cdnjfp6UN-4FAxToNf-XjSCU9BUY/s1600/hipaa+costs.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h4&gt;
Variables that affect HIPAA compliance cost&lt;/h4&gt;
The cost of HIPAA compliance depends on your organization. Here are a few variables that will factor into the cost of your overall compliance.&lt;br /&gt;
&lt;ul&gt;&lt;br /&gt;
&lt;li&gt;&lt;b&gt;Your organization type: &lt;/b&gt;Are you a hospital, business associate, HIE, healthcare clearinghouse, or another type of healthcare provider? Each will have varying amounts of protected health information (PHI) and risk levels.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Your organization size:&lt;/b&gt; Typically, the larger the organization, the more vulnerabilities it has. More workforce members, more programs, more processes, more computers, more PHI, and more departments add up to more HIPAA cost.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Your organization’s culture:&lt;/b&gt; If data security is one of upper management’s top priorities, you have probably already invested in a cybersecurity program. If management has been hesitant to dedicate budget to security, compliance with HIPAA will cost more because you will have more distance to make up.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Your organization’s environment: &lt;/b&gt;The type of medical devices, the brand of computers, the kind of firewalls, the model of backend servers, etc. can all affect HIPAA compliance cost. If cybersecurity was considered when purchasing, implementing and maintaining these devices, the costs to comply with HIPAA at this point will be lower. If security was not considered, costs to get in line with HIPAA will be greater.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Your organization’s dedicated HIPAA workforce: &lt;/b&gt;Without a dedicated HIPAA team, you might not know how far you are from closing the HIPAA gap. Even with a dedicated HIPAA team, organizations usually require&amp;nbsp;&lt;a href=&quot;https://www.securitymetrics.com/security-consulting&quot; target=&quot;_blank&quot;&gt;outside assistance or consulting&lt;/a&gt; to help them meet HIPAA requirements.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;h4&gt;
The cost of a data breach&lt;/h4&gt;
Costs related to a HIPAA program can seem daunting, but they are small in comparison with not protecting PHI. Here are a few data breach costs, fines, and penalties you may not have considered.&amp;nbsp;
&lt;br /&gt;
&lt;ul&gt;
&lt;span style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;380&quot; data-original-width=&quot;307&quot; height=&quot;200&quot; src=&quot;https://2.bp.blogspot.com/-VsREi-OS7fs/WwLxcs-OwJI/AAAAAAAABcs/Ge2c93kUKb4Amm-xmOH8XZyUgeP9yjxqACLcBGAs/s200/Screen%2BShot%2B2018-05-21%2Bat%2B10.14.16%2BAM.png&quot; width=&quot;161&quot; /&gt;&lt;/span&gt;
&lt;li&gt;HHS fines: up to&lt;b&gt; $1.5 million/violation/year&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;FTC fines:&lt;b&gt; $16,000/violation&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Class action lawsuits:&lt;b&gt; $1,000/record&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;State attorneys general: &lt;b&gt;$150,000 – $6.8 million&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Patient loss: &lt;b&gt;40%&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Free credit monitoring for affected individuals: &lt;b&gt;$10-$30/record&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;ID theft monitoring: &lt;b&gt;$10-$30/record&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Lawyer fees: &lt;b&gt;$2,000+&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Breach notification costs: &lt;b&gt;$1,000+&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Business associate changes: &lt;b&gt;$5,000+&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Technology repairs: &lt;b&gt;$2,000+&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
SEE ALSO:&amp;nbsp;&lt;a href=&quot;http://blog.securitymetrics.com/2016/10/-how-much-does-a-data-breach-cost.html&quot;&gt;How Much Does a Data Breach Cost Your Organization?&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
When you look at the &lt;a href=&quot;https://www.hhs.gov/about/news/2018/02/01/five-breaches-add-millions-settlement-costs-entity-failed-heed-hipaa-s-risk-analysis-and-risk.html&quot;&gt;high costs paid by organizations found in violation of HIPAA&lt;/a&gt;, it’s obvious the consequences are meant to penalize those who don’t adequately protect patient information.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;quote&quot;&gt;
So, how much does HIPAA compliance cost?&lt;br /&gt;
&lt;div class=&quot;custom_twitter&quot;&gt;
&lt;a href=&quot;http://ctt.ec/pB8AY&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Tweet: How much does HIPAA compliance actually cost? A breakdown: http://bit.ly/1IvI8Bv&quot; src=&quot;http://clicktotweet.com/img/bg-twitter.png&quot; height=&quot;40&quot; width=&quot;30&quot; /&gt;Tweet&lt;/a&gt;&lt;/div&gt;
&lt;/blockquote&gt;
If you are a large provider, you’ll probably benefit most from an &lt;a href=&quot;https://www.securitymetrics.com/hipaa-audit&quot; target=&quot;_blank&quot;&gt;onsite HIPAA compliance audit&lt;/a&gt;. Security experts examine your organization for security risks, provide guidance as you remediate any problems, and consult on the implementation of any outstanding HIPAA requirements.&lt;br /&gt;
&lt;br /&gt;
Your onsite auditor should work with you to complete both your &lt;a href=&quot;http://blog.securitymetrics.com/2015/04/start-a-hipaa-risk-analysis.html&quot; target=&quot;_blank&quot;&gt;HIPAA risk analysis&lt;/a&gt; and risk management plan. Learn the &lt;a href=&quot;http://blog.securitymetrics.com/2015/03/pros-cons-hipaa-audit.html&quot; target=&quot;_blank&quot;&gt;pros and cons of a HIPAA audit&lt;/a&gt; here.&lt;br /&gt;
&lt;br /&gt;
If you don’t have the budget for an onsite audit, you’ll need to find a HIPAA expert to &lt;a href=&quot;https://www.securitymetrics.com/guided-hipaa&quot; target=&quot;_blank&quot;&gt;help you get through the risk analysis&lt;/a&gt; and &lt;a href=&quot;http://blog.securitymetrics.com/2015/01/how-much-does-hipaa-risk-management-cost.html&quot; target=&quot;_blank&quot;&gt;risk management plan&lt;/a&gt; process. Look for an expert who offers technical support when you have questions. Experts will likely recommend you receive &lt;a href=&quot;http://blog.securitymetrics.com/2014/09/pci-compliance-scanning-requirements.html&quot; target=&quot;_blank&quot;&gt;external vulnerability scans&lt;/a&gt; to find weaknesses in your systems, and hire &lt;a href=&quot;http://blog.securitymetrics.com/2015/04/penetration-test-cost.html&quot; target=&quot;_blank&quot;&gt;penetration testers&lt;/a&gt; (ethical hackers) to test your system. If you haven’t already, you’ll likely need to purchase &lt;a href=&quot;https://www.securitymetrics.com/hipaa-policies&quot; target=&quot;_blank&quot;&gt;HIPAA policy templates&lt;/a&gt; and start your &lt;a href=&quot;http://blog.securitymetrics.com/2015/01/hipaa-workforce-member-training.html&quot; target=&quot;_blank&quot;&gt;employee training&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Taking all the above into consideration, and remembering that this estimate depends on various factors at your organization, here’s how much HIPAA compliance might cost you:&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
If you are a small covered entity, HIPAA should cost:&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;Risk Analysis and Management Plan ~$2,000&lt;/li&gt;
&lt;li&gt;Remediation ~ $1,000 - $8,000&lt;/li&gt;
&lt;li&gt;Training and policy development ~ $1,000-2,000&lt;/li&gt;
&lt;/ul&gt;
Total: &lt;b&gt;$4,000 - $12,000&lt;/b&gt;&lt;br /&gt;
&lt;h4&gt;
&lt;br /&gt;If you are a medium/large covered entity, HIPAA should cost:&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;Onsite audit ~ $40,000+&lt;/li&gt;
&lt;li&gt;Risk Analysis and Management Plan ~ $20,000+&lt;/li&gt;
&lt;li&gt;Vulnerability scans ~ $800&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2016/11/what-healthcare-know-about-hipaa-penetration-testing.html&quot;&gt;Penetration testing&lt;/a&gt; ~ $5,000+&lt;/li&gt;
&lt;li&gt;Remediation ~ Varies based on where entity stands in compliance and security&lt;/li&gt;
&lt;li&gt;Training and policy development ~ $5,000+&lt;/li&gt;
&lt;/ul&gt;
Total: &lt;b&gt;$50,000+, depending on the entity’s current environment&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;i&gt;Jen Stone (MSCIS, CISSP, QSA) is a Security Analyst at SecurityMetrics with an extensive background in Information Security and 20+ years in IT.&amp;nbsp;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;i&gt;&lt;/i&gt;

&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;a href=&quot;http://info.securitymetrics.com/hipaa-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://3.bp.blogspot.com/-3ROiSHsLoJk/WigdqVQi9jI/AAAAAAAAAWg/mZsO-dvMJak-m-rVdCoYEXTuUL_9vTa4gCPcBGAYYCw/s1600/2018%2BHIPAA%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;&lt;i&gt;
&lt;/i&gt;&lt;/i&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;i&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;&lt;i&gt;
&lt;/i&gt;&lt;/i&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/7247676454708747334'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/7247676454708747334'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2015/04/how-much-does-hipaa-cost.html' title='How Much Does HIPAA Compliance Cost?'/><author><name>SecurityMetrics</name><uri>http://www.blogger.com/profile/07857472080352783747</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOObapsiepRZnDmD0BRhS7ISZbjX7e1hlVCU7MSt_fviOxZFnERYVXo4COBPm1Jxb8E_diq6nPDo-28CKN_dBCXnTNG7wulKJjo2VT5cqk4354ItXYfzl-6S66D1FOAg/s220/Social+Media+profile+pic-04.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-CglmSFln9uU/WwLzbuTXJfI/AAAAAAAABc8/WgyirqD8i6oeNVST8HP6nY1zAF0KuFfKgCEwYBhgL/s72-c/Screen%2BShot%2B2018-04-13%2Bat%2B10.38.10%2BAM.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-5186779512425821394</id><published>2018-05-15T15:51:00.002-07:00</published><updated>2018-08-14T08:21:29.580-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="EU GDPR"/><category scheme="http://www.blogger.com/atom/ns#" term="GDPR"/><category scheme="http://www.blogger.com/atom/ns#" term="GDPR compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="what is GDPR"/><title type='text'>GDPR 101 Part 3: What Should I Do Now?</title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/gdpr-101-part-3-what-should-i-do-now&#39; /&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://3.bp.blogspot.com/-UKhZW5yYF-4/WvtXmjLkp5I/AAAAAAAABcc/qPdUhhU4WNsbyPd6fD-PUt4CbSeeS5M9ACEwYBhgL/s1600/GDPR%2Bpart%2B3_Blog.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;182&quot; src=&quot;https://3.bp.blogspot.com/-UKhZW5yYF-4/WvtXmjLkp5I/AAAAAAAABcc/qPdUhhU4WNsbyPd6fD-PUt4CbSeeS5M9ACEwYBhgL/s320/GDPR%2Bpart%2B3_Blog.jpg&quot; style=&quot;display: none;&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h3&gt;
Three tips to get the ball rolling on your GDPR efforts.&amp;nbsp;&lt;/h3&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-fUmCETPmPeI/WlOd-DIR36I/AAAAAAAAAhc/AVpqWDncHf4BvuroeihFk582vnQeETSfACPcBGAYYCw/s1600/Gary_Glover_blog.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1588&quot; data-original-width=&quot;1588&quot; height=&quot;100&quot; src=&quot;https://3.bp.blogspot.com/-fUmCETPmPeI/WlOd-DIR36I/AAAAAAAAAhc/AVpqWDncHf4BvuroeihFk582vnQeETSfACPcBGAYYCw/s320/Gary_Glover_blog.png&quot; width=&quot;100&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Gary Glover&lt;br /&gt;
SVP, Assessments&lt;br /&gt;
CISSP, CISA, QSA&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
This post wraps up the final installment in our 3-part GDPR 101 blog series. This series is based on our &lt;a href=&quot;http://info.securitymetrics.com/l/47362/2018-01-29/61shgc&quot;&gt;GDPR 101 Webinar &lt;/a&gt;and is meant to &lt;a href=&quot;http://blog.securitymetrics.com/2018/02/GDPR-should-I-be-worried.html&quot;&gt;help frame your understanding of the GDPR&lt;/a&gt;, educate you on the &lt;a href=&quot;http://blog.securitymetrics.com/2018/04/gdpr-101-part-2-what-are-requirements.html&quot;&gt;terms and definitions you need to know&lt;/a&gt;, as well as give you practical tips to start your GDPR compliance journey.&lt;br /&gt;
&lt;br /&gt;
If you are a merchant, or any organization that handles the personal data of European Union citizens, you will need to comply with the GDPR. Here are three ways you can make progress today towards your GDPR compliance.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
1. Learn and understand&amp;nbsp;&lt;/h4&gt;
&lt;br /&gt;
The first step you should take is to educate yourself. Learn about the GDPR requirements and seek out reliable resources. &lt;a href=&quot;https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/&quot;&gt;The Information Commissioner’s Office&lt;/a&gt; in the UK has a website and blog dedicated to educating the public about this upcoming data security mandate.&lt;br /&gt;
&lt;br /&gt;
Here are some more GDPR resources to get you started:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-AvvBKFNk1c4/WvtXmgDxZII/AAAAAAAABcY/Y7xRMyHSyB0teEEdsXi63KhPkTrMpfhgACLcBGAs/s1600/GDPR%2Bpart%2B3_Image.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;GDPR, EU GDPR, cybersecurity,&quot; border=&quot;0&quot; data-original-height=&quot;292&quot; data-original-width=&quot;273&quot; height=&quot;200&quot; src=&quot;https://2.bp.blogspot.com/-AvvBKFNk1c4/WvtXmgDxZII/AAAAAAAABcY/Y7xRMyHSyB0teEEdsXi63KhPkTrMpfhgACLcBGAs/s200/GDPR%2Bpart%2B3_Image.png&quot; title=&quot;&quot; width=&quot;186&quot; /&gt;&lt;/a&gt;
&lt;li&gt;&lt;a href=&quot;http://info.securitymetrics.com/l/47362/2018-01-29/61shgc&quot;&gt;GDPR 101 Webinar &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2018/02/GDPR-should-I-be-worried.html&quot;&gt;GDPR 101 Part 1: Should I Be Worried? &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2018/04/gdpr-101-part-2-what-are-requirements.html&quot;&gt;GDPR 101 Part 2: What are the Requirements? &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2018/03/gdpr-faqs.html&quot;&gt;GDPR FAQs &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://info.securitymetrics.com/gdpr-analaysis-uk&quot;&gt;Infographic: How Prepared are UK Organizations for GDPR? &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://info.securitymetrics.com/gdpr-analysis-us&quot;&gt;Infographic: How Prepared are US Organizations for GDPR? &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://info.securitymetrics.com/gdpr-analysis-uk-vs-us&quot;&gt;Infographic: GDPR Compliance: UK vs. US &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
2. Assess and plan&lt;/h4&gt;
&lt;br /&gt;
In any kind of security effort, the first thing you’ll need to do is create a &lt;a href=&quot;https://en.wikipedia.org/wiki/Data_flow_diagram&quot;&gt;data-flow diagram.&lt;/a&gt; This will help you discover and clearly document where personal data flows. You’ll need to show where sensitive data comes in and out of systems, and how it moves inside the organization.&lt;br /&gt;
&lt;br /&gt;
Determine the security controls you don’t yet have in place. There are worksheets available, like these &lt;a href=&quot;https://ico.org.uk/for-organisations/resources-and-support/data-protection-self-assessment/&quot;&gt;checklists from the ICO office in the UK&lt;/a&gt;, to help you comply with GDPR. At this point, make a plan for how your organization will integrate and complete all the documentation that will be required.&lt;br /&gt;
&lt;br /&gt;
If you already follow other data security standards, like the Payment Card Industry Data Security Standard (PCI DSS), you may find there is some crossover between the data security controls. It’s important to realize that just because you’re certified compliant with PCI DSS or have had a HIPAA audit, that doesn’t mean you’re GDPR compliant.&lt;br /&gt;
&lt;br /&gt;
Even though there are crossovers between data security standards, GDPR has a much larger scope because it includes many types of information that fall under “personal data,” like names, addresses, and telephone numbers. However, if you only handle credit card data, your scope may remain similar to what it already is under the PCI DSS.&lt;br /&gt;
&lt;br /&gt;
You can use online management tools like &lt;a href=&quot;https://www.securitymetrics.com/gdpr-defense&quot;&gt;GDPR Defense &lt;/a&gt;to manage your GDPR compliance efforts, securely store documentation, and track important tasks.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2018/07/pci-vs-gdpr-whats-difference.html&quot;&gt;What&#39;s the Difference Between GDPR and PCI?&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
3. Assign a DPO or similar position&lt;/h4&gt;
&lt;br /&gt;
You may or may not be legally required to appoint a &lt;a href=&quot;https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/accountability-and-governance/data-protection-officers/&quot;&gt;Data Protection Officer (DPO),&lt;/a&gt; depending on your “core activities,” or the primary business activities of your organization. According to the UK’s ICO website, if your core activities consist of either of the following, you will be required to appoint a DPO:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Processing activities which require the regular and systematic monitoring of individuals on a large scale; or &lt;/li&gt;
&lt;li&gt;Processing on a large scale of special category data, or data relating to criminal convictions and offenses. &lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
So basically, if your core business activity is data processing on a large scale, or the processing of special or sensitive data, you will be required to have a DPO.&lt;br /&gt;
&lt;br /&gt;
Even if you are not legally required to appoint a DPO, you should assign someone in your organization to serve as a GDPR officer. Assign one person to learn about, delegate, and oversee GDPR efforts at your organization.&lt;br /&gt;
&lt;br /&gt;
WHITE PAPER: &lt;a href=&quot;https://info.securitymetrics.com/gdpr-101-wp&quot;&gt;GDPR 101&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Take steps sooner rather than later&lt;/h4&gt;
&lt;br /&gt;
The GDPR becomes enforceable on May 25, 2018. Take these 3 steps now to be as prepared as possible. Small actions now will help you avoid fines and penalties and better protect sensitive data at your organization. If your organization does experience a data breach involving EU citizens&#39; personal data, you&#39;ll fare better in the aftermath if you have made a good faith effort to comply with mandates and laws.&lt;br /&gt;
&lt;br /&gt;
SMB? &lt;a href=&quot;https://www.securitymetrics.com/gdpr-defense&quot;&gt;GDPR Defense&lt;/a&gt; can help you organize and manage GDPR efforts.&lt;br /&gt;
&lt;br /&gt;
Large Organization? &lt;a href=&quot;https://www.securitymetrics.com/security-consulting#product-quote&quot;&gt;Contact us for GDPR consulting&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Gary Glover (CISSP, CISA, QSA, PA-QSA) is Director of Security Assessment at &lt;a href=&quot;https://www.securitymetrics.com/&quot; target=&quot;_blank&quot;&gt;SecurityMetrics&lt;/a&gt; with over 10 years of &lt;a href=&quot;https://www.securitymetrics.com/pci-audit&quot; target=&quot;_blank&quot;&gt;PCI audit&lt;/a&gt; experience and 25 years of Star Wars quoting skills. May the Force be with you as you visit his other &lt;a href=&quot;http://blog.securitymetrics.com/search?q=gary+glover&quot; target=&quot;_blank&quot;&gt;blog posts&lt;/a&gt;.&lt;/i&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://info.securitymetrics.com/pci-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://2.bp.blogspot.com/-zmJbW-y-bEI/WrwbKAo7tNI/AAAAAAAABSQ/Z8FEy74oP_Ag8CznKAArUXzpyiIKSfnLQCPcBGAYYCw/s1600/2018%2BPCI%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/5186779512425821394'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/5186779512425821394'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2018/05/gdpr-101-part-3-what-should-i-do-now.html' title='GDPR 101 Part 3: What Should I Do Now?'/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-UKhZW5yYF-4/WvtXmjLkp5I/AAAAAAAABcc/qPdUhhU4WNsbyPd6fD-PUt4CbSeeS5M9ACEwYBhgL/s72-c/GDPR%2Bpart%2B3_Blog.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-3642597292579047419</id><published>2018-05-11T14:13:00.000-07:00</published><updated>2018-08-17T09:35:03.746-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ETA"/><category scheme="http://www.blogger.com/atom/ns#" term="eta conference"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI compliance"/><title type='text'>ETA TRANSACT 2018 Wrap Up</title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/eta-transact-2018-wrap&#39; /&gt;

&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;182&quot; src=&quot;https://4.bp.blogspot.com/-oPNSJu3uAr8/WvX38K7hEbI/AAAAAAAABas/EX7li5klTWQe1OF-H5BlssY_wRWEQhguACLcBGAs/s320/TRANSACT18%2BWrap%2Bup_Blog.jpg&quot; style=&quot;display: none;&quot; width=&quot;320&quot; /&gt;

&lt;br /&gt;
&lt;h3&gt;
The quality of our connections made 2018 our best year yet.&amp;nbsp;&lt;/h3&gt;
From our annual golf tournament on Monday to tasty drinks and good conversation on the show floor, TRANSACT 18 was a huge success.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;a href=&quot;https://2.bp.blogspot.com/-lLRSRhg9pNc/WvX38Ng-QqI/AAAAAAAABaw/l6hQ6IYegfcyLbHOm6LAwaXmlMpNNx2vgCLcBGAs/s1600/TRANSACT18%2BWrap%2Bup_Image.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;292&quot; data-original-width=&quot;273&quot; height=&quot;200&quot; src=&quot;https://2.bp.blogspot.com/-lLRSRhg9pNc/WvX38Ng-QqI/AAAAAAAABaw/l6hQ6IYegfcyLbHOm6LAwaXmlMpNNx2vgCLcBGAs/s200/TRANSACT18%2BWrap%2Bup_Image.png&quot; width=&quot;185&quot; /&gt;&lt;/a&gt;
Mix and Mingle with a QSA&lt;/h4&gt;
Our theme for 2018, “Mix and Mingle with a QSA,” was complemented by our unique mixed soda bar featuring security-themed flavor options.&lt;br /&gt;
&lt;br /&gt;
Attendees flowed through our booth to grab drinks and chat with QSAs about data security and PCI compliance. The most popular drink was the “Penetration Test,” with Dr. Pepper, coffee, coconut, and cream.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-ndQo_gzjj18/WvX6MI4UidI/AAAAAAAABbI/58prDXGISBAv6bJMAq2gNfqOuCRlg_eRQCLcBGAs/s1600/IMG_4811.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;240&quot; src=&quot;https://1.bp.blogspot.com/-ndQo_gzjj18/WvX6MI4UidI/AAAAAAAABbI/58prDXGISBAv6bJMAq2gNfqOuCRlg_eRQCLcBGAs/s320/IMG_4811.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Matt Brown ready to demo our latest PCI compliance tools.&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-kS-R0f9eMuk/WvX6MNoS38I/AAAAAAAABbA/lFOsVh-rX2s_hDfBY_drpO_6iR-K-1OBACLcBGAs/s1600/IMG_5043.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;240&quot; src=&quot;https://3.bp.blogspot.com/-kS-R0f9eMuk/WvX6MNoS38I/AAAAAAAABbA/lFOsVh-rX2s_hDfBY_drpO_6iR-K-1OBACLcBGAs/s320/IMG_5043.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Mixing and mingling with our QSAs.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-yrHIsMsXUYY/WvX6MKqRKeI/AAAAAAAABbE/EYJcRHfBG84yi-jSluaHha_sRsiEFPVqwCLcBGAs/s1600/IMG_5267.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;240&quot; src=&quot;https://4.bp.blogspot.com/-yrHIsMsXUYY/WvX6MKqRKeI/AAAAAAAABbE/EYJcRHfBG84yi-jSluaHha_sRsiEFPVqwCLcBGAs/s320/IMG_5267.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;PCI DSS Compliance Done Right.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-kvr9zIZYR0Q/WvX6MjtXQwI/AAAAAAAABbM/vDqg-peQCbAmQiKeITumlzRmFgBF4BLVgCLcBGAs/s1600/IMG_6191.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;240&quot; src=&quot;https://2.bp.blogspot.com/-kvr9zIZYR0Q/WvX6MjtXQwI/AAAAAAAABbM/vDqg-peQCbAmQiKeITumlzRmFgBF4BLVgCLcBGAs/s320/IMG_6191.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Visitors standing in line for yummy sodas!&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-1_0VVT9Lxfc/WvX93PlRVwI/AAAAAAAABbw/iO5Ifg7zXnw_1C1NElRYzJuFKl3rFm62gCLcBGAs/s1600/20180418_165840.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1200&quot; data-original-width=&quot;1600&quot; height=&quot;240&quot; src=&quot;https://1.bp.blogspot.com/-1_0VVT9Lxfc/WvX93PlRVwI/AAAAAAAABbw/iO5Ifg7zXnw_1C1NElRYzJuFKl3rFm62gCLcBGAs/s320/20180418_165840.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Bird&#39;s-eye view of SecurityMetrics&#39; booth.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;h4&gt;
Data Breach Panel with Gary Glover&lt;/h4&gt;
&lt;br /&gt;
On Tuesday, our Senior VP of Assessments, Gary Glover (CISSP, CISA, QSA, PA-QSA), participated in the Data Breach Panel sponsored by Fortner. He and other panel members related that when organizations are breached, they are almost never PCI compliant. They also reported investigators see hundreds of compromises at small retailers which we never hear about on the news.&lt;br /&gt;
&lt;br /&gt;
Gary specifically advised retailers to stop looking for an “easy button” to solve data breaches. Many merchants look for a piece of hardware or software to solve the problem. “But there isn’t,” he said during the panel. “Some of the solutions don’t cost much; it’s processes. It’s procedures. It’s figuring out who is really looking at your remote access. Who is really doing your internal scans? Who is really configuring your network to try and keep people out of certain zones? We’re still seeing all kinds of architecture mistakes.”&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://www.afponline.org/trends-topics/topics/articles/Details/preventing-data-breaches-five-keys-for-retailers/&quot;&gt;You can read more about the Data Breach Panel here.&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Annual Golf Tournament at TPC Summerlin&lt;/h4&gt;
&lt;br /&gt;
The Las Vegas wind didn’t stop our golf teams from showing up on Monday. As part of the pre-conference roster, this annual tradition is the perfect time to get to know our partners and friends in the payments industry.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Our winners are as follows:&lt;/b&gt;&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right; text-align: right;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-vFGzW4XCRLw/WvX2Bc_jPsI/AAAAAAAABZ4/cMjE9EC36UkEywMLfDFiDQSnrgrUFvHNACLcBGAs/s1600/IMG_1777.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1024&quot; height=&quot;240&quot; src=&quot;https://4.bp.blogspot.com/-vFGzW4XCRLw/WvX2Bc_jPsI/AAAAAAAABZ4/cMjE9EC36UkEywMLfDFiDQSnrgrUFvHNACLcBGAs/s320/IMG_1777.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Start your engines.&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;b&gt;Closest to the Pin&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
Front nine winner: Wally Mylnarksi &lt;br /&gt;
Back nine winner: Jerry Nelson&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Longest Drive&lt;/b&gt;&lt;br /&gt;
Front nine winner: Marc Roberts&lt;br /&gt;
Back nine winner: Joe Benson&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Golf Tournament Winners&lt;/b&gt;&lt;br /&gt;
1st: Wally Mlynarski, Ian Stuttard, Chris Taylor, Al Echamendi&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;br /&gt;
2nd: Don Kissock, Scott Kim, Daniel Shin, Shawn Dalton&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;br /&gt;
3­­rd:&amp;nbsp; Mike Fox, Thad Sheffield, Eric Woodson&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;br /&gt;
&lt;span style=&quot;background-color: white; font-family: &amp;quot;calibri&amp;quot; , sans-serif; font-size: 12pt;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-a1o2R7n_rOs/WvX2AYfesNI/AAAAAAAABZk/5bCgGdx_5EALAsBCdggXTIV6Atw-hOK1ACLcBGAs/s1600/IMG_1774.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1024&quot; height=&quot;240&quot; src=&quot;https://4.bp.blogspot.com/-a1o2R7n_rOs/WvX2AYfesNI/AAAAAAAABZk/5bCgGdx_5EALAsBCdggXTIV6Atw-hOK1ACLcBGAs/s320/IMG_1774.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Golf team ready to win.&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-u0xF_apTYFg/WvX2JIhSP6I/AAAAAAAABaM/jM7SvsMdm8g5D_HvRCtI12-eVlxb88biQCLcBGAs/s1600/IMG_1780.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1024&quot; height=&quot;240&quot; src=&quot;https://1.bp.blogspot.com/-u0xF_apTYFg/WvX2JIhSP6I/AAAAAAAABaM/jM7SvsMdm8g5D_HvRCtI12-eVlxb88biQCLcBGAs/s320/IMG_1780.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Lining up the put.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-IbMrXG5Ppb8/WvX2AQp0WeI/AAAAAAAABZo/V4m-q948sakv87TXmhe5eM1ShYqs9E5hwCLcBGAs/s1600/IMG_1772.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1024&quot; height=&quot;240&quot; src=&quot;https://2.bp.blogspot.com/-IbMrXG5Ppb8/WvX2AQp0WeI/AAAAAAAABZo/V4m-q948sakv87TXmhe5eM1ShYqs9E5hwCLcBGAs/s320/IMG_1772.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Windy but beautiful day on the course.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://3.bp.blogspot.com/-Ie2fkuIm5o4/WvX2BgY5zxI/AAAAAAAABZ8/9l2dTpPBk8sKc08TVN6SmMwdna3jKa7jACLcBGAs/s1600/IMG_1778.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1024&quot; height=&quot;240&quot; src=&quot;https://3.bp.blogspot.com/-Ie2fkuIm5o4/WvX2BgY5zxI/AAAAAAAABZ8/9l2dTpPBk8sKc08TVN6SmMwdna3jKa7jACLcBGAs/s320/IMG_1778.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;A great put.&amp;nbsp;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
We can’t wait to see everyone again next year!&lt;br /&gt;
&lt;br /&gt;
If you weren’t able to visit with our QSAs or sales team or still have questions, &lt;a href=&quot;http://securitymetrics.com/contact&quot;&gt;please reach out to us anytime.&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
For information about &lt;a href=&quot;https://www.securitymetrics.com/pci-audit&quot;&gt;PCI audits&lt;/a&gt;, &lt;a href=&quot;https://www.securitymetrics.com/hipaa-audit&quot;&gt;HIPAA audits&lt;/a&gt;, or other &lt;a href=&quot;https://www.securitymetrics.com/vulnerability-scan&quot;&gt;data security services&lt;/a&gt;, &lt;a href=&quot;http://securitymetrics.com/&quot;&gt;please visit us here&lt;/a&gt;.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://2.bp.blogspot.com/-zmJbW-y-bEI/WrwbKAo7tNI/AAAAAAAABSQ/Z8FEy74oP_Ag8CznKAArUXzpyiIKSfnLQCPcBGAYYCw/s1600/2018%2BPCI%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/3642597292579047419'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/3642597292579047419'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2018/05/eta-transact-2018-wrap-up.html' title='ETA TRANSACT 2018 Wrap Up'/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-oPNSJu3uAr8/WvX38K7hEbI/AAAAAAAABas/EX7li5klTWQe1OF-H5BlssY_wRWEQhguACLcBGAs/s72-c/TRANSACT18%2BWrap%2Bup_Blog.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-3105104285895334883</id><published>2018-05-08T15:22:00.003-07:00</published><updated>2018-08-14T08:21:01.104-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="EU GDPR"/><category scheme="http://www.blogger.com/atom/ns#" term="GDPR"/><category scheme="http://www.blogger.com/atom/ns#" term="GDPR compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="what is GDPR"/><title type='text'>How Prepared are UK Businesses for GDPR?</title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/how-prepared-are-uk-businesses-gdpr&#39; /&gt;

&lt;h3&gt;
Learn about the General Data Protection Regulation and how UK businesses are preparing.&lt;/h3&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://4.bp.blogspot.com/-egZ24iKLT20/WvIi1isEumI/AAAAAAAABZI/3AJTF181hok_bmmekMrLOryrzi7j1h1QwCLcBGAs/s1600/UK%2BGDPR%2BPreparedness_Blog%2B2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;182&quot; src=&quot;https://4.bp.blogspot.com/-egZ24iKLT20/WvIi1isEumI/AAAAAAAABZI/3AJTF181hok_bmmekMrLOryrzi7j1h1QwCLcBGAs/s320/UK%2BGDPR%2BPreparedness_Blog%2B2.jpg&quot; style=&quot;display: none;&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
The EU General Data Protection Regulation (GDPR) will come into effect on May 25, 2018. This government mandate introduces tougher laws about processing and handling personal data of EU citizens, tightens the timeline for breach reporting, and protects numerous individual rights.&lt;br /&gt;
&lt;br /&gt;
Some businesses in the UK have researched and made preparations for the GDPR. Other still do not know what the GDPR is. &lt;a href=&quot;http://blog.securitymetrics.com/2018/02/GDPR-should-I-be-worried.html&quot;&gt;Fines for data breaches and non-compliance&lt;/a&gt; can range between 4% of a business’s annual global turnover (aka revenue) or €20 Million—whichever is greater.&lt;br /&gt;
&lt;br /&gt;
There are two major parties when it comes to GDPR: Data Controllers and Data Processors. It’s important that organizations determine which group they belong to, so they can understand the scope of their responsibility. Data Controllers are entities or individuals that need to process personal data in order to do business. They determine the purposes for which and the manner in which the personal data is processed. Data Processors take and process personal data on behalf of the Controller.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2018/03/gdpr-faqs.html&quot;&gt;GDPR FAQs&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
We interviewed over 250 management and IT professionals in the United Kingdom about GDPR and their GDPR compliance efforts. &lt;a href=&quot;http://info.securitymetrics.com/gdpr-analaysis-uk&quot;&gt;This infographic&lt;/a&gt; is an analysis of their collected responses.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
GDPR priority levels among UK businesses&lt;/h4&gt;
&lt;br /&gt;
While 44% of UK organizations we interviewed consider GDPR a high priority, 35% still do not know what GDPR is. What does this mean? Sometimes companies are simply busy or they don’t realize how significant the GDPR is to them. There could also be a lack of reliable education and resources.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://3.bp.blogspot.com/-XEXAywxrcXE/WvIhV9tsXJI/AAAAAAAABYk/4wX9xjU6cpsi1QCo-Er88YJmiPp6fL9tQCLcBGAs/s1600/Screen%2BShot%2B2018-05-03%2Bat%2B10.38.54%2BPM.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;470&quot; data-original-width=&quot;1594&quot; height=&quot;116&quot; src=&quot;https://3.bp.blogspot.com/-XEXAywxrcXE/WvIhV9tsXJI/AAAAAAAABYk/4wX9xjU6cpsi1QCo-Er88YJmiPp6fL9tQCLcBGAs/s400/Screen%2BShot%2B2018-05-03%2Bat%2B10.38.54%2BPM.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
For those companies that consider GDPR a high priority, there are few GDPR management tools on the market. But, using such a tool is a good way to stay organized and avoid fines down the road. Check out &lt;a href=&quot;https://www.securitymetrics.com/gdpr-defense&quot;&gt;SecurityMetrics GDPR Defense&lt;/a&gt; for more tracking options.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
How ready are UK businesses for GDPR?&lt;/h4&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://3.bp.blogspot.com/-bEiTkLZscO8/WvIhYQ3aOlI/AAAAAAAABYo/aVOrGYl62fAIt_q6S_3OPUHSjelSNqGIgCLcBGAs/s1600/Screen%2BShot%2B2018-05-03%2Bat%2B10.39.19%2BPM.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;988&quot; data-original-width=&quot;1552&quot; height=&quot;251&quot; src=&quot;https://3.bp.blogspot.com/-bEiTkLZscO8/WvIhYQ3aOlI/AAAAAAAABYo/aVOrGYl62fAIt_q6S_3OPUHSjelSNqGIgCLcBGAs/s400/Screen%2BShot%2B2018-05-03%2Bat%2B10.39.19%2BPM.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
With the May 25th implementation date looming near, organizations report varying levels of readiness. Nearly 50% of companies that we surveyed say they are 50% ready or less for GDPR.&lt;br /&gt;
&lt;br /&gt;
If businesses already follow security standards like the PCI DSS or HIPAA, there may be some overlap in the security controls they already have in place. However, GDPR has a much larger scope and protects data subjects’ rights to a greater extent.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://info.securitymetrics.com/l/47362/2018-01-29/61shgc&quot;&gt;Download our GDPR 101 Webinar&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Resource planning for GDPR&lt;/h4&gt;
&lt;br /&gt;
&lt;a href=&quot;https://3.bp.blogspot.com/-weeqX9OD3HM/WvIhcUwupjI/AAAAAAAABYs/x4hxCSy9tFoe2-oBd-nxx9C1gNdUW2iQQCLcBGAs/s1600/Screen%2BShot%2B2018-05-03%2Bat%2B10.39.34%2BPM.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;410&quot; data-original-width=&quot;1554&quot; height=&quot;105&quot; src=&quot;https://3.bp.blogspot.com/-weeqX9OD3HM/WvIhcUwupjI/AAAAAAAABYs/x4hxCSy9tFoe2-oBd-nxx9C1gNdUW2iQQCLcBGAs/s400/Screen%2BShot%2B2018-05-03%2Bat%2B10.39.34%2BPM.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;We asked businesses how they plan to meet GDPR requirements. Again, a large chunk of respondents report not knowing what GDPR is. For those with a plan, most expect to handle the requirements of GDPR themselves and only 17% will hire someone to help.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
It’s difficult to say yet exactly how much GDPR compliance will cost businesses. The true amount will depend on many factors, including company size, current security controls, the amount of data processed, and the handling methods.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://4.bp.blogspot.com/-N23WX5-tEk8/WvIhe2MBviI/AAAAAAAABYw/AfQiS4X80aA5pP0mgEHustLbMOz7LgnqwCLcBGAs/s1600/Screen%2BShot%2B2018-05-03%2Bat%2B10.39.43%2BPM.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;372&quot; data-original-width=&quot;1552&quot; height=&quot;95&quot; src=&quot;https://4.bp.blogspot.com/-N23WX5-tEk8/WvIhe2MBviI/AAAAAAAABYw/AfQiS4X80aA5pP0mgEHustLbMOz7LgnqwCLcBGAs/s400/Screen%2BShot%2B2018-05-03%2Bat%2B10.39.43%2BPM.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;We asked companies what they estimate to spend annually on GDPR compliance. Over half reported that they expect to spend less than $200 annually. Only 9% reported planning for $3000 or more.&lt;br /&gt;
&lt;br /&gt;
Again, the appropriate budget for each company is dependent on many factors and will likely change as time goes on and businesses are more familiar with GDPR compliance. But as of a few weeks before implementation, it appears that companies plan to spend a very minimal fraction of their budget on GDPR compliance.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2018/02/GDPR-should-I-be-worried.html&quot;&gt;GDPR 101 Part 1 Blog&lt;/a&gt;, &lt;a href=&quot;http://blog.securitymetrics.com/2018/04/gdpr-101-part-2-what-are-requirements.html&quot;&gt;GDPR 101 Part 2 Blog&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
What we’ve learned about GDPR readiness in the UK&lt;/h4&gt;
&lt;br /&gt;
We found that 62% our respondents already work toward compliance with the PCI DSS. This can be seen as a strength or a weakness, depending on how a company handles its data security overall. While we mentioned that yes, there are overlaps between PCI and GDPR, the scope and breadth of each compliance mandate are different. GDPR applies to all personal data—also known as personally identifiable information (PII)—and its intent is to protect the privacy rights of individuals.&lt;br /&gt;
&lt;a href=&quot;https://4.bp.blogspot.com/-J04Gk1-DZBU/WvIhh83KGWI/AAAAAAAABY0/6BPAUzS34DYgODrB1ly3SUa0ZXhcegVegCLcBGAs/s1600/Screen%2BShot%2B2018-05-03%2Bat%2B10.39.53%2BPM.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;728&quot; data-original-width=&quot;1524&quot; height=&quot;190&quot; src=&quot;https://4.bp.blogspot.com/-J04Gk1-DZBU/WvIhh83KGWI/AAAAAAAABY0/6BPAUzS34DYgODrB1ly3SUa0ZXhcegVegCLcBGAs/s400/Screen%2BShot%2B2018-05-03%2Bat%2B10.39.53%2BPM.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
UK respondents were on average only 54% ready for GDPR implementation and 57% consider GDPR a medium-to-high priority. This means that there is still plenty to be done. The key is to find reliable resources and tools that provide a starting point and a map for the GDPR compliance journey.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://www.securitymetrics.com/gdpr-defense&quot;&gt;SecurityMetrics GDPR Defense&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
If you have questions about data security mandates or standards like &lt;a href=&quot;https://www.securitymetrics.com/gdpr-defense&quot;&gt;GDPR&lt;/a&gt;, &lt;a href=&quot;https://www.securitymetrics.com/pci&quot;&gt;PCI DSS&lt;/a&gt;, or &lt;a href=&quot;https://www.securitymetrics.com/hipaa&quot;&gt;HIPAA&lt;/a&gt;, &lt;a href=&quot;https://www.securitymetrics.com/contact&quot;&gt;contact us here&lt;/a&gt;.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://2.bp.blogspot.com/-zmJbW-y-bEI/WrwbKAo7tNI/AAAAAAAABSQ/Z8FEy74oP_Ag8CznKAArUXzpyiIKSfnLQCPcBGAYYCw/s1600/2018%2BPCI%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/3105104285895334883'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/3105104285895334883'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2018/05/how-prepared-are-uk-businesses-for-gdpr.html' title='How Prepared are UK Businesses for GDPR?'/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-egZ24iKLT20/WvIi1isEumI/AAAAAAAABZI/3AJTF181hok_bmmekMrLOryrzi7j1h1QwCLcBGAs/s72-c/UK%2BGDPR%2BPreparedness_Blog%2B2.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-6955933796136019444</id><published>2018-05-01T12:21:00.001-07:00</published><updated>2018-08-14T08:18:56.508-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="small business cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="small business IT security"/><category scheme="http://www.blogger.com/atom/ns#" term="small business pci compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="small business security"/><category scheme="http://www.blogger.com/atom/ns#" term="small business security tips"/><title type='text'>Top 5 PCI Blog Posts for SMBs</title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/top-5-pci-blog-posts-smbs&#39; /&gt;

&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;182&quot; src=&quot;https://1.bp.blogspot.com/-0A-YJvy7EXA/Wui81cstcwI/AAAAAAAABXM/aD1ORkDhHJk5tonPtzXc4MM1Bqtu3bSCgCLcBGAs/s320/Small%2Bbusiness%2Bblogs_Blog.jpg&quot; style=&quot;display: none;&quot; width=&quot;320&quot; /&gt;
&lt;h3&gt;
Resources to help SMBs learn about data security and PCI Compliance.&lt;/h3&gt;
&lt;a href=&quot;https://3.bp.blogspot.com/-lpYYWEvxd74/Wui81ZvxOGI/AAAAAAAABXQ/QTFAjd0Hme8tzXFN-ITPOYXvWdCuPaHoACLcBGAs/s1600/Small%2Bbusiness%2Bblogs_Image.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;292&quot; data-original-width=&quot;273&quot; height=&quot;200&quot; src=&quot;https://3.bp.blogspot.com/-lpYYWEvxd74/Wui81ZvxOGI/AAAAAAAABXQ/QTFAjd0Hme8tzXFN-ITPOYXvWdCuPaHoACLcBGAs/s200/Small%2Bbusiness%2Bblogs_Image.png&quot; width=&quot;186&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
We often get questions from small business owners about where they fit in with data security and PCI compliance. Are they expected to go as far as large companies with their security controls? Do the same requirements apply to them?&amp;nbsp;While their day-to-day involvement and implementation costs will differ from those of large enterprises, the data security principles needed to achieve PCI compliance remain the same.&lt;br /&gt;
&lt;br /&gt;
As an SMB owner, your business size and card processing environment will ultimately determine &lt;a href=&quot;https://www.pcisecuritystandards.org/document_library?category=saqs#results&quot;&gt;which SAQ you need to follow&lt;/a&gt;. But it’s important to recognize the unique risks and challenges SMBs face when getting compliant with the PCI standards. They sometimes lack the time, manpower, and cash flow to properly implement all data security controls.&lt;br /&gt;
&lt;br /&gt;
We hear about massive data breaches like &lt;a href=&quot;https://www.ftc.gov/equifax-data-breach&quot;&gt;Equifax&lt;/a&gt;, &lt;a href=&quot;https://www.usatoday.com/story/money/2017/05/23/target-pay-185m-2013-data-breach-affected-consumers/102063932/&quot;&gt;Target&lt;/a&gt;, and &lt;a href=&quot;https://en.wikipedia.org/wiki/Yahoo!_data_breaches&quot;&gt;Yahoo&lt;/a&gt; in the news, but experts estimate small businesses account for &lt;a href=&quot;https://www.afponline.org/trends-topics/topics/articles/Details/preventing-data-breaches-five-keys-for-retailers/&quot;&gt;200-300 payment card data breaches per day&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Here are the top 5 blogs from SecurityMetrics to help you as you work towards better security and PCI compliance for your business.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;a href=&quot;http://blog.securitymetrics.com/2014/07/which-saq-is-right-for-me.html&quot;&gt;PCI Standards: Which PCI SAQ is Right for My Business?&lt;/a&gt;&lt;/h4&gt;
&lt;br /&gt;
A PCI Self-Assessment Questionnaire (PCI SAQ) is a merchant’s statement of PCI compliance. It’s a way to show that you&#39;re taking the security measures needed to keep cardholder data secure at your business.&lt;br /&gt;
&lt;br /&gt;
Each SAQ includes a list of security standards that businesses must review and follow. PCI SAQs vary in length. SAQ A is the shortest with just 22 questions, and the longest is SAQ D with 329 questions.&lt;br /&gt;
&lt;br /&gt;
There are 9 different SAQs that a merchant can choose from. How you process credit cards and handle cardholder data determines which SAQ your business needs to fill out. For example, if you don&#39;t have a storefront and all of your products are sold online through a third party, you probably qualify for SAQ A or SAQ A-EP. If you have a storefront that processes credit cards through the Internet and you also store customer credit card data, you&#39;re probably an SAQ D merchant.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2016/09/updating-to-pci-32-saqs-changes-to-know.html&quot;&gt;Updating PCI DSS SAQs to 3.2: the Changes You Should Know&lt;/a&gt;&lt;br /&gt;
&lt;h4&gt;
&lt;/h4&gt;
&lt;h4&gt;
&lt;/h4&gt;
&lt;h4&gt;
&lt;/h4&gt;
&lt;h4&gt;
&lt;/h4&gt;
&lt;h4&gt;
&lt;a href=&quot;http://blog.securitymetrics.com/2016/11/7-pci-compliance-tips-for-small-businesses.html&quot;&gt;7 Compliance Tips for Small Businesses&lt;/a&gt;&lt;/h4&gt;
&lt;br /&gt;
When it comes to PCI compliance, small businesses have their own unique struggles with securing data. While smaller businesses have less card data to process and store than large businesses, they also have fewer resources and smaller budgets for security.&lt;br /&gt;
&lt;br /&gt;
A lot of businesses also have difficulty implementing PCI requirements in a way that actually protects their data. Instead, many small businesses will treat PCI as a checklist and complete the bare minimum, without thinking of applying PCI requirements to data security.&lt;br /&gt;
&lt;br /&gt;
These businesses also don’t fully leverage standards and practices by the PCI DSS to improve and secure their environment. They’re more concerned with becoming PCI compliant than secure. This attitude can leave their business open to an expensive and damaging data breach.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;a href=&quot;http://blog.securitymetrics.com/2014/05/pci-faq.html&quot;&gt;PCI DSS Compliance FAQ&lt;/a&gt;&lt;/h4&gt;
&lt;br /&gt;
As you might expect, we get a lot of questions about PCI DSS Compliance. Read this blog to learn PCI basics and get the answers to our most frequently asked questions.&lt;br /&gt;
&lt;br /&gt;
The Payment Card Industry Data Security Standard (PCI DSS) was established in 2006 by the major card brands (i.e., Visa, MasterCard, American Express, Discover Financial Services, JCB International).&lt;br /&gt;
&lt;br /&gt;
All businesses that process, store, or transmit payment card data are required to implement the standard to prevent cardholder data theft. Your card-handling practices and processing environment determine which PCI DSS requirements apply to your business.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2018/04/what-are-12-requirements-of-pci-dss.html&quot;&gt;What are the 12 Requirements of PCI DSS Compliance?&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://1.bp.blogspot.com/-0A-YJvy7EXA/Wui81cstcwI/AAAAAAAABXM/aD1ORkDhHJk5tonPtzXc4MM1Bqtu3bSCgCLcBGAs/s1600/Small%2Bbusiness%2Bblogs_Blog.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;182&quot; src=&quot;https://1.bp.blogspot.com/-0A-YJvy7EXA/Wui81cstcwI/AAAAAAAABXM/aD1ORkDhHJk5tonPtzXc4MM1Bqtu3bSCgCLcBGAs/s320/Small%2Bbusiness%2Bblogs_Blog.jpg&quot; style=&quot;display: none;&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;a href=&quot;http://blog.securitymetrics.com/2016/11/securitymetrics-NIST-800-30-risk-assessment.html&quot;&gt;SecurityMetrics NIST 800-30 Risk Assessment&lt;/a&gt;&lt;/h4&gt;
&lt;br /&gt;
Do you know where you struggle with data security? Are you compliant with all government and financial mandates? Do you know how to get started?&lt;br /&gt;
&lt;br /&gt;
While risk assessments are a good place to start in securing your business’s data, many businesses aren’t even sure where to start with a risk assessment. It can be difficult to put together a list of all possible risks a business may have in an organized, understandable document.&lt;br /&gt;
&lt;br /&gt;
We noticed this problem and looked into what could be done to help businesses put together their risk assessments quickly and efficiently. That’s where the NIST 800-30 Risk Assessment comes in.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;a href=&quot;http://blog.securitymetrics.com/2015/08/pci-compliance-cost.html&quot;&gt;How Much Does PCI Compliance Cost?&lt;/a&gt;&lt;/h4&gt;
&lt;br /&gt;
The topic of compliance cost is popular with merchants of all sizes, but more so for small businesses. Being PCI compliant involves more than just filling out a PCI SAQ or completing a vulnerability scan. A lot of work and resources go into changing business procedures to ensure the protection of customer credit card data and eventual PCI compliance.  &lt;br /&gt;
&lt;br /&gt;
Many businesses are confused about what budget they should set for PCI compliance. Often, they budget too little. Small budgets make it difficult for IT departments and third parties to upgrade equipment to the latest security standards to ensure the business protects data security.&lt;br /&gt;
&lt;br /&gt;
For more information about &lt;a href=&quot;http://securitymetrics.com/pci&quot;&gt;PCI Compliance&lt;/a&gt; or &lt;a href=&quot;https://www.securitymetrics.com/pci-audit&quot;&gt;PCI audits&lt;/a&gt; for businesses of any size, please &lt;a href=&quot;https://www.securitymetrics.com/contact&quot;&gt;contact us here.&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://2.bp.blogspot.com/-zmJbW-y-bEI/WrwbKAo7tNI/AAAAAAAABSQ/Z8FEy74oP_Ag8CznKAArUXzpyiIKSfnLQCPcBGAYYCw/s1600/2018%2BPCI%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/6955933796136019444'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/6955933796136019444'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2018/05/top-5-pci-blog-posts-for-small.html' title='Top 5 PCI Blog Posts for SMBs'/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-0A-YJvy7EXA/Wui81cstcwI/AAAAAAAABXM/aD1ORkDhHJk5tonPtzXc4MM1Bqtu3bSCgCLcBGAs/s72-c/Small%2Bbusiness%2Bblogs_Blog.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-1570317589486519234</id><published>2018-04-23T11:54:00.003-07:00</published><updated>2018-08-14T08:24:28.048-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Guide to PCI Compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI DSS"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI DSS 3.2"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI SSC"/><category scheme="http://www.blogger.com/atom/ns#" term="pci ssc approved scanning vendor"/><title type='text'>Resources from the PCI Council: Payment Data Security Essentials</title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/resources-pci-council-payment-data-security-essentials&#39; /&gt;

&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;182&quot; src=&quot;https://1.bp.blogspot.com/-PsrPbzV9bjM/Wt4rZGKq_nI/AAAAAAAABWc/ebftBWAdeGY0BMRTyoGmg5JCifx58aliACLcBGAs/s320/Merchant%2BResources_Blog.jpg&quot; style=&quot;display: none;&quot; width=&quot;320&quot; /&gt;
&lt;br /&gt;
&lt;h3&gt;
Series of infographics and videos to help merchants with common security issues.&amp;nbsp;&lt;/h3&gt;
&lt;br /&gt;
&lt;a href=&quot;https://1.bp.blogspot.com/-QUHl8cS3AS8/Wt4raWU1-GI/AAAAAAAABWg/eQbOlOZFxMkziFdK9hAGm_dbLgCCuPAswCLcBGAs/s1600/Merchant%2BResources_Image.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;292&quot; data-original-width=&quot;273&quot; height=&quot;200&quot; src=&quot;https://1.bp.blogspot.com/-QUHl8cS3AS8/Wt4raWU1-GI/AAAAAAAABWg/eQbOlOZFxMkziFdK9hAGm_dbLgCCuPAswCLcBGAs/s200/Merchant%2BResources_Image.png&quot; width=&quot;185&quot; /&gt;&lt;/a&gt;The Payment Card Industry Security Standards Council (PCI SSC) &lt;a href=&quot;https://blog.pcisecuritystandards.org/share-this-new-resources-for-businesses-on-payment-data-security-essentials&quot;&gt;recently announced&lt;/a&gt; the release of their “Payment Data Security Essentials” video and infographic series to &lt;a href=&quot;http://pcissc.org/merchants&quot;&gt;help merchants&lt;/a&gt;&amp;nbsp;with the most common causes of data breaches. These three issues: &lt;a href=&quot;https://www.youtube.com/watch?v=MxgSNFgvAVc&quot;&gt;insecure remote access&lt;/a&gt;, &lt;a href=&quot;https://www.youtube.com/watch?v=dNVQk65KL8g&quot;&gt;weak passwords&lt;/a&gt;, and &lt;a href=&quot;https://www.youtube.com/watch?v=0nYQgf_PPts&quot;&gt;insufficient patching,&lt;/a&gt; represent much of the “low hanging fruit” that hackers can leverage to successfully attack and steal data from businesses.&lt;br /&gt;
&lt;br /&gt;
Too often, organizations miss these problems and leave their data vulnerable. And it’s not just the companies with massive, highly publicized data breaches that make these critical errors. Smaller businesses actually tend to be more at risk, usually due to a lack in resources for security—we just don’t hear about them as often.&lt;br /&gt;
&lt;br /&gt;
INFOGRAPHIC: &lt;a href=&quot;http://info.securitymetrics.com/infographic-data-breach-visualization-2017&quot;&gt;2017 PCI DSS Data Breach Trends&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
The PCI Council notes that these factors represent the “bad news,” but the good news is that education in these areas can help merchants better focus their resources to tasks that will provide the most “bang for their buck.” Each video is under three minutes and gives actionable tips for merchants. Infographics are printable, illustrate the risk associated with each security issue, plus they outline additional resources for each problem.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Insecure Remote Access&amp;nbsp;&lt;/h4&gt;
&lt;br /&gt;
The SecurityMetrics Forensic Team found that in 2017, &lt;a href=&quot;http://blog.securitymetrics.com/2018/01/2017-data-breach-trends.html&quot;&gt;45% of breached organizations &lt;/a&gt;were accessed by attackers through remote access. Remote access remains one of the most common hacking attack vectors because businesses often configure their remote access application insecurely.&lt;br /&gt;
&lt;br /&gt;
In addition to proper configuration, organizations should limit employees’ access to remote access and implement multi-factor authentication.&lt;br /&gt;
&lt;br /&gt;
WEBINAR: &lt;a href=&quot;http://info.securitymetrics.com/webinar-multi-factor-authentication-recording&quot;&gt;Understanding the New Multi-Factor Authentication Supplement&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Check out the PCI Council’s &lt;a href=&quot;https://www.youtube.com/watch?v=MxgSNFgvAVc&amp;amp;t=5s&quot;&gt;remote access informational video&lt;/a&gt; and &lt;a href=&quot;https://www.pcisecuritystandards.org/documents/Payment-Data-Security-Essential-Secure-Remote-Access.pdf&quot;&gt;infographic&lt;/a&gt; to learn more about how you can implement these security practices at your business.&lt;br /&gt;
&lt;br /&gt;
WHITE PAPER: &lt;a href=&quot;http://blog.securitymetrics.com/2016/01/configuring-your-remote-desktop-wrong.html&quot;&gt;Configuring Your Remote Desktop&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Weak Passwords&lt;/h4&gt;
&lt;br /&gt;
Passwords remain a weak point overall for cybersecurity. It’s not out of reach for a hacker to “brute force” a password, especially if it&#39;s simple or common. Online, there are readily available lists of default vendor passwords, including extremely common ones like: 1234, guest, user, pass, access, admin, pass, password, [name of product/vendor], root, anonymous, sa, database, or secret.&lt;br /&gt;
&lt;br /&gt;
To minimize the risk of a breach, you should change vendors’ default passwords, make the new passwords sufficiently complex, and never share them.&lt;br /&gt;
&lt;br /&gt;
Check out the &lt;a href=&quot;https://www.youtube.com/watch?v=dNVQk65KL8g&quot;&gt;password informational video&lt;/a&gt; and &lt;a href=&quot;https://www.pcisecuritystandards.org/documents/Payment-Data-Security-Essential-Strong-Passwords.pdf&quot;&gt;infographic&lt;/a&gt; to learn how maintaining proper password practices will protect your organization.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2017/07/pci-requirement-8-combatting-weak-passwords.html&quot;&gt;PCI Requirement 8: Combatting Weak Passwords&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Insufficient Patching&amp;nbsp;&lt;/h4&gt;
&lt;br /&gt;
Recent high-profile hacks like Equifax and others have hinged on unpatched software. Most software will have flaws or need to be updated at some point, so most vendors will regularly send out updates to their customers. These updates include “patches” that fix vulnerabilities, and if businesses don’t stay on top of them, these well-known (in the hacker world) vulnerabilities can make your business an easy target.&lt;br /&gt;
&lt;br /&gt;
Whether you are an e-commerce business or use point-of-sale hardware, you need to keep your patch updates timely and thorough. To do that, you should know who makes your software and devices, and then make sure you subscribe to their update lists and emails. Find out if they run automatic updates, or if running them is your job.&lt;br /&gt;
&lt;br /&gt;
LEARN MORE: &lt;a href=&quot;http://info.securitymetrics.com.pci-guide/&quot;&gt;2018 SecurityMetrics Guide to PCI DSS Compliance&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Some installers and resellers have actually been trained by the PCI Council to address critical security controls while installing merchant payment systems. They are known as &lt;a href=&quot;https://www.pcisecuritystandards.org/assessors_and_solutions/qualified_integrators_and_resellers&quot;&gt;Qualified Integrators and Resellers (QIRs), and you can find a list of them here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Searching for vulnerabilities that may need patches can be done with scanning software. The Council’s &lt;a href=&quot;https://www.youtube.com/watch?v=0nYQgf_PPts&quot;&gt;patching informational video&lt;/a&gt; and &lt;a href=&quot;https://www.pcisecuritystandards.org/documents/Payment-Data-Security-Essential-Patching.pdf&quot;&gt;infographic&lt;/a&gt; include tips for communicating with vendors, as well as resources to find &lt;a href=&quot;https://www.pcisecuritystandards.org/assessors_and_solutions/approved_scanning_vendors&quot;&gt;PCI Approved Scanning Vendors (ASVs)&lt;/a&gt; to perform your vulnerability scans.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2017/10/pci-requirement-11-vulnerability-scans.html&quot;&gt;PCI Requirement 11: Vulnerability Scanning and Penetration Testing&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://2.bp.blogspot.com/-zmJbW-y-bEI/WrwbKAo7tNI/AAAAAAAABSQ/Z8FEy74oP_Ag8CznKAArUXzpyiIKSfnLQCPcBGAYYCw/s1600/2018%2BPCI%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/1570317589486519234'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/1570317589486519234'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2018/04/resources-from-pci-council-payment-data.html' title='Resources from the PCI Council: Payment Data Security Essentials'/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-PsrPbzV9bjM/Wt4rZGKq_nI/AAAAAAAABWc/ebftBWAdeGY0BMRTyoGmg5JCifx58aliACLcBGAs/s72-c/Merchant%2BResources_Blog.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-5278719585223981158</id><published>2018-04-16T14:37:00.001-07:00</published><updated>2018-08-14T08:25:14.419-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="EU GDPR"/><category scheme="http://www.blogger.com/atom/ns#" term="GDPR"/><category scheme="http://www.blogger.com/atom/ns#" term="GDPR compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="piiscan"/><title type='text'>GDPR 101 Part 2: What are the Requirements of GDPR?</title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/gdpr-101-part-2-what-are-requirements-gdpr&#39; /&gt;

&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;113&quot; src=&quot;https://4.bp.blogspot.com/-QEs4488cm9I/WtUcT9VfMSI/AAAAAAAABVg/2P__dbeKRjwykzeCRWWEyDOv6cgJmNGVgCLcBGAs/s200/GDPR%2B101%2Bpart%2B2_Blog.jpg&quot; style=&quot;display: none;&quot; width=&quot;200&quot; /&gt;
&lt;br /&gt;
&lt;h3&gt;
Learn the basics about the EU’s General Data Protection Regulation.&lt;/h3&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://blog.securitymetrics.com/search?q=gary+glover&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1588&quot; data-original-width=&quot;1588&quot; height=&quot;100&quot; src=&quot;https://3.bp.blogspot.com/-fUmCETPmPeI/WlOd-DIR36I/AAAAAAAAAhc/AVpqWDncHf4BvuroeihFk582vnQeETSfACPcBGAYYCw/s200/Gary_Glover_blog.png&quot; width=&quot;100&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Gary Glover&lt;br /&gt;
VP of Assessments&lt;br /&gt;
CISSP, CISA, QSA, PA-QSA&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
Part 2 of our 3-part GDPR 101 blog series is based on our &lt;a href=&quot;http://info.securitymetrics.com/gdpr-webinar&quot;&gt;GDPR 101 Webinar&lt;/a&gt; and will cover the “what” of the GDPR: its terms, requirements, and the individual data subject rights it names and protects.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://blog.securitymetrics.com/2018/02/GDPR-should-I-be-worried.html&quot;&gt;GDPR 101 Part 1: Should I Be Worried&lt;/a&gt;? helped set up a framework for your approach to GDPR compliance. Our 3rd installment in this blog series will offer practical tips to get you started on your own &lt;a href=&quot;https://www.securitymetrics.com/gdpr-defense&quot;&gt;GDPR compliance journey.&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Terms and Definitions in the GDPR&lt;/h4&gt;
First up, the difference between &lt;a href=&quot;https://ico.org.uk/media/for-organisations/documents/1546/data-controllers-and-data-processors-dp-guidance.pdf&quot;&gt;data controllers and data proc&lt;span id=&quot;goog_780221604&quot;&gt;&lt;/span&gt;&lt;span id=&quot;goog_780221605&quot;&gt;&lt;/span&gt;essors&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Not all organizations involved in the processing of personal data have the same roles or levels of responsibility.&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Data Controllers: &lt;/b&gt;Entities or individuals that need to process personal data in order to do business. They determine the purposes for which and the manner in which the personal data is processed. The data controller must exercise control over the data processing and ultimately carries the responsibility for its security. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;Data Processors: &lt;/b&gt;Processors take and/or process personal data on behalf of the Controller.  &lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
Other important GDPR terms to know:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Supervisory Authority: &lt;/b&gt;An independent public authority established by a member state to represent the people and oversee/monitor businesses. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;Personally Identifiable Data (PII)/Personal Data:&lt;/b&gt; any information relating to a data subject, which could identify them directly or indirectly. Besides names, addresses, etc., personal data can refer to identification numbers, or even to one or more factors specific to physical, physiological, mental, economic, cultural or social identity. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;Pseudonymisation: &lt;/b&gt;amending data so that it is no longer identifiable except with a key. Sometimes takes the form of a coded data set and works a bit like encryption. Does not apply to data that is rendered anonymous. Pseudonymisation may not always put data out of scope for GDPR, but it can allow the relaxing of some provisions for using data for secondary purposes, like historical or research purposes.  &lt;/li&gt;
&lt;li&gt;&lt;b&gt;PII/Personal Data Breach:&lt;/b&gt; A security breach leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed. &lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;
What are the requirements of the GDPR?&lt;/h4&gt;
&lt;br /&gt;
&lt;b&gt;Data Mapping and Tracking&lt;/b&gt;&lt;br /&gt;
The first step in GDPR compliance is to discover and clearly document all of the PII/personal data that flows into and out of your organization. To do this, you will need to understand the processes that use PII and conduct internal interviews. Once you know where and what you’re looking for, a good data discovery tool can help. The next step is to document what the personal data is, where it comes from, and where it flows. Documentation includes data flow and network diagrams, as well as process descriptions.&lt;br /&gt;
&lt;br /&gt;
INFOGRAPHIC: &lt;a href=&quot;http://info.securitymetrics.com/infographic-piiscan&quot;&gt;How to Find and Secure Unencrypted PII&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Communicating Privacy Information&lt;/b&gt;&lt;br /&gt;
GDPR has core principles about communicating with those you get personal data from. This communication could occur between you and the data subject themselves, or you and an entity providing you with previously collected personal data.&lt;br /&gt;
&lt;br /&gt;
Privacy notices must be more transparent, using clear and plain language, and be easily accessible and easy to understand for any of your customers. This communication will need to explain things such as your lawful basis for getting their data, how long it will be kept, and what their rights are regarding the data you are processing or storing.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Subject Access Requests&lt;/b&gt;&lt;br /&gt;
The time limit to comply with data subject access requests (DSAR) has been reduced from 40 days to one month. If you handle a large number of access requests, consider how to deal with requests more quickly.&lt;br /&gt;
&lt;br /&gt;
In most cases, you’ll not be able to charge the customer for the time you use to complete the request. You can refuse or charge for requests that are manifestly unfounded or excessive. If you do refuse a request, you must tell the individual why and that they have the right to complain to the supervisory authority and to a judicial remedy. You must do this without undue delay and at the latest, within one month&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Processing Data Lawfully&lt;/b&gt;&lt;br /&gt;
You will need to explain your company’s need to obtain the personal data, including the lawful basis for gathering and processing it. Document this information and update your privacy notice to explain it.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Consent to Process Data&lt;/b&gt;&lt;br /&gt;
Gathering data needs to include a clear “opt-in” step from data subjects. You will not be able to inform customers through an automatic pop up or “fine print” only. Consent must be obtained. Review how you seek, record, and manage consent, and maintain clear privacy notice documentation.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Consent for Children&lt;/b&gt;&lt;br /&gt;
Organizations must have processes in place to verify data subjects’ ages. For children, your privacy notice must be written in simple language the child can understand. At present, the GDPR states that you must obtain parental or guardian consent for any data processing activity of a subject younger than 16 in the EU.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Data Breaches&lt;/b&gt;&lt;br /&gt;
Establish policies and procedures to detect, report, and investigate a personal data breach (e.g., Incident Response Plan.) You must report personal data breaches to your SA within 72 hours after awareness of the breach. If individuals face an adverse impact, contact individuals directly. Failure to report a breach when required to do so could result in a fine in addition to the fine for the breach itself.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Data Protection Officers&lt;/b&gt;&lt;br /&gt;
You will need to designate a Data Protection Officer (DPO) to be responsible for data protection compliance if your organization is:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;a href=&quot;https://2.bp.blogspot.com/-ZEdesPMzW78/WtUVAAYjhWI/AAAAAAAABVM/ly8QVd0C3qEX39TuVhFHajex-KaTBMO8ACLcBGAs/s1600/GDPR%2B101%2Bpart%2B2_Image.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;292&quot; data-original-width=&quot;273&quot; height=&quot;200&quot; src=&quot;https://2.bp.blogspot.com/-ZEdesPMzW78/WtUVAAYjhWI/AAAAAAAABVM/ly8QVd0C3qEX39TuVhFHajex-KaTBMO8ACLcBGAs/s200/GDPR%2B101%2Bpart%2B2_Image.png&quot; width=&quot;186&quot; /&gt;&lt;/a&gt;
&lt;li&gt;A public authority or body (except for courts acting in their judicial capacity) &lt;/li&gt;
&lt;li&gt;An organization carrying out regular and systematic monitoring of data subjects on a large scale &lt;/li&gt;
&lt;li&gt;An organization processing a large scale of special data categories—health records—(as detailed in Article 9) and personal data relating to criminal convictions and offenses (as detailed in Article 10) &lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
But even if you don’t fall into one of these categories, we highly recommend designating a DPO. Your DPO will need knowledge, support, and authority to carry out their role effectively.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2018/03/gdpr-faqs.html&quot;&gt;GDPR Frequently Asked Questions&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Data Protection by Design&lt;/b&gt;&lt;br /&gt;
GDPR makes “data protection by design and default” an express legal requirement. This one statement itself can create a myriad of data protection and security requirements that are not specifically defined by the GDPR but are well known in the data security industry.&lt;br /&gt;
&lt;br /&gt;
You may already be familiar with many of them if you undergo PCI DSS, ISO 27000, SOC, or other security assessments.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Data Protection Impact Assessments&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
Data Protection Impact Assessments (DPIAs) are essentially a formal Risk Assessment process like that defined in NIST 800-30.&amp;nbsp; You will need to conduct DPIAs when specific risks might affect the rights and freedoms of data subjects. For example, when a new technology is deployed, a profiling operation will impact individuals significantly, or when there’s a large-scale processing of special categories of data.&lt;br /&gt;
&lt;br /&gt;
This impact assessment will use information gathered from your data mapping exercise as well as information about all the systems and networks used to process data. This process is critical to implementing the “data protection by design and default” philosophy.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Security Considerations&lt;/b&gt;&lt;br /&gt;
The concept of “data protection by design and by default” leads to the need for a lot of security controls to be applied to your systems, processes and people involved in dealing with sensitive personal data.&lt;br /&gt;
&lt;br /&gt;
Based on our experience in the security industry, here are a few of the major areas that will need attention. Each of these bullets could be expanded into more system or process requirements, but we will not go into that here.&amp;nbsp; If you want to be GDPR compliant, you will need to have documented evidence that your systems embody the principle of “data protection by design and by default.”&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2017/05/new-multi-factor-authentication-supplement.html&quot;&gt;Remote Access Security&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2017/12/what-is-web-application-penetration-test.html&quot;&gt;Web Application Security&lt;/a&gt; &lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://4.bp.blogspot.com/-QEs4488cm9I/WtUcT9VfMSI/AAAAAAAABVg/2P__dbeKRjwykzeCRWWEyDOv6cgJmNGVgCLcBGAs/s1600/GDPR%2B101%2Bpart%2B2_Blog.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;113&quot; src=&quot;https://4.bp.blogspot.com/-QEs4488cm9I/WtUcT9VfMSI/AAAAAAAABVg/2P__dbeKRjwykzeCRWWEyDOv6cgJmNGVgCLcBGAs/s200/GDPR%2B101%2Bpart%2B2_Blog.jpg&quot; style=&quot;display: none;&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;Edge Firewall Security &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.securitymetrics.com/vulnerability-scan&quot;&gt;External Vulnerability Scan&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;Wireless Network Security &lt;/li&gt;
&lt;li&gt;Password Policies &lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2017/04/pci-requirement-5-protecting-system-with-anti-virus.html&quot;&gt;Malware Prevention &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2017/08/pci-dss-requirement-9-physical-security.html&quot;&gt;Physical Security &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
WEBINAR: &lt;a href=&quot;http://info.securitymetrics.com/webinar-multi-factor-authentication-recording&quot;&gt;Understanding the New Multi-Factor Authentication Supplement&lt;/a&gt;&lt;br /&gt;
&lt;h4&gt;
&lt;/h4&gt;
&lt;h4&gt;
What rights does GDPR name and protect?&lt;/h4&gt;
&lt;br /&gt;
&lt;b&gt;Right to erasure: &lt;/b&gt;Individuals may request to have personal data erased. This right is also sometimes called “the right to be forgotten.” Other data security standards (such as HIPAA) may overrule the right to erasure in certain circumstances; it’s best to consult with a legal advisor regarding these possible scenarios.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Right to be informed:&lt;/b&gt; Keeping data subjects informed is key to transparency under the GDPR. You must let them know your purposes for processing their personal data, your retention periods for that personal data, and who the data will be shared with. This is known in the GDPR as “privacy information.”&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Right of access:&lt;/b&gt; Data subjects have the right to access their personal data and supplementary information. The right of access also states that individuals should be aware of and verify the lawfulness of the processing.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Right to rectification:&lt;/b&gt; The GDPR includes a right for individuals to have inaccurate personal data rectified or completed if it is incomplete.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Right to restrict processing:&lt;/b&gt; In certain circumstances, individuals have the right to request the restriction or suppression of their personal data. Restricted processing means the data can be stored, but not used.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Right to data portability:&lt;/b&gt; You may be required to provide the personal data in a structured, commonly used and machine-readable format. This right only applies to personal data an individual has provided to a controller, where the processing is based on the individual’s consent or for the performance of a contract, and when processing is carried out by automated means.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Right to object:&lt;/b&gt; Individuals may object “on grounds relating to their particular situation” to data processing—even if it’s based on legitimate interests or the performance of a task in the public interest/exercise of official authority (including profiling). They have a right to object to direct marketing (including profiling), as well as to processing of their data for purposes of scientific/historical research and statistics.&lt;br /&gt;
&lt;br /&gt;
Rights related to automated decision making including profiling: this right includes additional rules to protect individuals if a data controller is carrying out solely automated decision-making that has legal or similarly significant effects on them. You can only carry out this type of decision-making where the decision is: necessary for the entry into or performance of a contract; or authorized by Union or Member state law applicable to the controller; or based on the individual’s explicit consent.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2018/07/pci-vs-gdpr-whats-difference.html&quot;&gt;What&#39;s the Difference Between GDPR and PCI?&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;h4&gt;
Who enforces GDPR?&lt;/h4&gt;
There are general supervisory authorities (SA), for example the Information Commissioner’s Office in the UK, but it’s a good idea to start finding out who your specific SA is. The SAs are responsible for issuing fines.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;GDPR 101 blog series&lt;/b&gt;&lt;br /&gt;
Watch for our third and final installment of our GDPR 101 blog series. In it, we will cover the “how” of GDPR: the important steps you’ll need to take and the resources to help you take them.&lt;br /&gt;
&lt;br /&gt;
Also check out our “&lt;a href=&quot;http://blog.securitymetrics.com/2018/02/GDPR-should-I-be-worried.html&quot;&gt;GDPR 101 Part 1: Should I Be Worried&lt;/a&gt;” blog post. It’s an important introduction that will helps set the stage for how you should think about and approach GDPR compliance.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Gary Glover (CISSP, CISA, QSA, PA-QSA) is Director of Security Assessment at &lt;a href=&quot;https://www.securitymetrics.com/&quot; target=&quot;_blank&quot;&gt;SecurityMetrics&lt;/a&gt; with over 10 years of &lt;a href=&quot;https://www.securitymetrics.com/pci-audit&quot; target=&quot;_blank&quot;&gt;PCI audit&lt;/a&gt; experience and 25 years of Star Wars quoting skills. May the Force be with you as you visit his other &lt;a href=&quot;http://blog.securitymetrics.com/search?q=gary+glover&quot; target=&quot;_blank&quot;&gt;blog posts&lt;/a&gt;.&lt;/i&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://2.bp.blogspot.com/-zmJbW-y-bEI/WrwbKAo7tNI/AAAAAAAABSQ/Z8FEy74oP_Ag8CznKAArUXzpyiIKSfnLQCPcBGAYYCw/s1600/2018%2BPCI%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/5278719585223981158'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/5278719585223981158'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2018/04/gdpr-101-part-2-what-are-requirements.html' title='GDPR 101 Part 2: What are the Requirements of GDPR?'/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-QEs4488cm9I/WtUcT9VfMSI/AAAAAAAABVg/2P__dbeKRjwykzeCRWWEyDOv6cgJmNGVgCLcBGAs/s72-c/GDPR%2B101%2Bpart%2B2_Blog.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-4431850591271671833</id><published>2018-04-10T17:13:00.001-07:00</published><updated>2018-08-14T08:23:40.183-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="PCI compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI DSS"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI DSS 3.2"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI requirements"/><title type='text'>What are the 12 requirements of PCI DSS Compliance? </title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/what-are-12-requirements-pci-dss-compliance&#39; /&gt;

&lt;h3&gt;
The 12 PCI Requirements, plus resources to help address them.&amp;nbsp;&lt;/h3&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://4.bp.blogspot.com/-SvO-O9Lx63I/Ws09H4w7V3I/AAAAAAAABUw/c0fhYHJ_aaorm8OtoTXJ3CG3rrt2RJkpwCLcBGAs/s1600/625118904465138.c2g13Wuls2JAeht3kczj_height640.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;366&quot; data-original-width=&quot;640&quot; height=&quot;114&quot; src=&quot;https://4.bp.blogspot.com/-SvO-O9Lx63I/Ws09H4w7V3I/AAAAAAAABUw/c0fhYHJ_aaorm8OtoTXJ3CG3rrt2RJkpwCLcBGAs/s200/625118904465138.c2g13Wuls2JAeht3kczj_height640.png&quot; style=&quot;display: none;&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;a href=&quot;https://3.bp.blogspot.com/-C5jNjj1LKAk/Ws09H74kzuI/AAAAAAAABUs/5vZZGmcCLHwCuuFR8uFkWrj7z9ohF6VUwCLcBGAs/s1600/625118904465134.xz0Ddz3spmQXyiz6WXTW_height640.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;292&quot; data-original-width=&quot;273&quot; height=&quot;200&quot; src=&quot;https://3.bp.blogspot.com/-C5jNjj1LKAk/Ws09H74kzuI/AAAAAAAABUs/5vZZGmcCLHwCuuFR8uFkWrj7z9ohF6VUwCLcBGAs/s200/625118904465134.xz0Ddz3spmQXyiz6WXTW_height640.png&quot; width=&quot;186&quot; /&gt;&lt;/a&gt;The &lt;a href=&quot;https://www.pcisecuritystandards.org/&quot;&gt;PCI DSS&lt;/a&gt; (Payment Card Industry Data Security Standard) is a security standard developed and maintained by the &lt;a href=&quot;https://www.pcisecuritystandards.org/about_us/leadership&quot;&gt;PCI Council&lt;/a&gt;. Its purpose is to help secure and protect the entire payment card ecosystem.&lt;br /&gt;
&lt;br /&gt;
Breaches and data theft are unfortunately common, and negatively impact all payments parties in different ways—from retailers to consumers to banks—so the need for PCI compliance has never been greater.&lt;br /&gt;
&lt;br /&gt;
INFOGRAPHIC: &lt;a href=&quot;https://www.securitymetrics.com/static/resources/orange/PCI_Requirements_Quick_Reference.pdf&quot;&gt;A Quick Look at PCI DSS Compliance&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
No matter where you are in your PCI compliance journey, you&#39;ll need a reference to help organize your thoughts and get headed in the right direction. We hope this article will serve as your “jumping off point” as you start to address the requirements of the PCI DSS.&lt;br /&gt;
&lt;br /&gt;
For more detailed information and interactive IT task checklists, &lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;check out our 2018 Guide to PCI DSS Compliance.&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Before diving into the PCI requirements, you will want to start by determining&amp;nbsp;&lt;a href=&quot;http://blog.securitymetrics.com/2014/07/which-saq-is-right-for-me.html&quot;&gt;which SAQ applies to your business&lt;/a&gt;. While most requirements will stay the same, there are some differences in the work you’ll need to do based on your SAQ.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
1: Protect your system with firewalls&amp;nbsp;&lt;/h4&gt;
&lt;br /&gt;
The first requirement of the PCI DSS is to &lt;a href=&quot;http://blog.securitymetrics.com/2016/04/firewalls-101-5-things-you-should-know.html&quot;&gt;protect your system with firewalls&lt;/a&gt;. Properly configured&amp;nbsp; firewalls protect your card data environment. Firewalls restrict incoming and outgoing network traffic through rules and criteria configured by your organization.&lt;br /&gt;
&lt;br /&gt;
You’ll want to install both hardware firewalls and software firewalls. Both provide a first line of defense for your network. Hardware firewalls are the more robust security option. They can protect an entire network and segment its internal areas. Hardware firewalls are typically more expensive, take time to properly configure, and need to be maintained and reviewed regularly.&lt;br /&gt;
&lt;br /&gt;
Software firewalls are cheaper and easier to maintain. They are meant to protect a single host from internal threats—commonly those from employees’ mobile devices, which can move in and out of the secure environment. If an employee clicks on a link in a phishing email, a software firewall should prevent malware infection.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO:&amp;nbsp;&lt;a href=&quot;http://blog.securitymetrics.com/2016/11/pci-requirement-1-managing-firewalls.html&quot;&gt;Compliance with PCI Requirement 1: Basics of Managing Your Firewall&lt;/a&gt;&lt;br /&gt;
&lt;h4&gt;
&lt;/h4&gt;
&lt;h4&gt;
&lt;br /&gt;&lt;/h4&gt;
&lt;h4&gt;
2: Configure passwords and settings&amp;nbsp;&lt;/h4&gt;
&lt;br /&gt;
You shouldn’t keep vendor-supplied defaults around. Out-of-the-box devices, such as routers or POS systems, come with factory settings like default usernames and passwords. Defaults make device installation and support easier, but they also mean that every model originates with the same username and password. Default passwords are simple to guess, and most are even published on the Internet.&lt;br /&gt;
&lt;br /&gt;
The problem is that third parties sometimes install hardware or software and leave merchants unaware that their entire system is protected by an easy-to-find/crack password. Vendors might also purposely leave weak or default passwords to make service easier. But, that’s like leaving your front door unlocked just to make life more convenient.&lt;br /&gt;
&lt;br /&gt;
Fulfilling requirement 2 involves inventorying and then properly configuring all security settings on all systems and devices. You will need to assign someone to compile and review this information.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2017/01/pci-requirement-2-how-to-get-compliant.html&quot;&gt;PCI Requirement 2: How to Get Compliant&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
3: Protect stored cardholder data&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;&lt;/h4&gt;
&lt;br /&gt;
According to requirement 3, stored card data must be encrypted using industry-accepted algorithms (e.g., AES-256). The problem is many merchants don’t know they store unencrypted primary account numbers (PAN).&lt;br /&gt;
&lt;br /&gt;
Not only must card data be encrypted, the encryption keys themselves must also be protected. For example, using a solid PCI DSS &lt;a href=&quot;https://en.wikipedia.org/wiki/Key_management&quot;&gt;encryption key management process&lt;/a&gt; will help keep you from storing the key in the “lock” itself.&lt;br /&gt;
&lt;br /&gt;
To fulfill this requirement, you need to create and document a current cardholder data (CHD) flow diagram for all card data flows in your organization. A CHD flow diagram is a graphical representation of how card data moves through an organization (see example). As you define your environment, it’s important to ask all organizations and departments if they receive cardholder information, and then document how their answers may change card data flows.&lt;br /&gt;
&lt;br /&gt;
You should regularly run a data discovery tool like &lt;a href=&quot;https://www.securitymetrics.com/card-data-discovery&quot;&gt;PANscan&lt;/a&gt; or &lt;a href=&quot;https://www.securitymetrics.com/pii-data-discovery&quot;&gt;PIIscan&lt;/a&gt;. These tools help identify the location of unencrypted PAN and other sensitive information, so you can securely delete or encrypt it.  &lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2017/01/pci-requirement-3-what-you-need.html&quot;&gt;PCI Requirement 3: What You Need to be Compliant&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
4: Encrypt transmission of cardholder data across open, public networks&amp;nbsp;&lt;/h4&gt;
&lt;br /&gt;
For requirement 4, you need to know where you send cardholder data. Here are common places where primary account numbers (PAN) are sent:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Processors   &lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Backup servers   &lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Third parties that store or handle PAN   &lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Outsourced management of systems or infrastructure   &lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Corporate offices   &lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
You then need to use encryption and have security policies in place when you transmit this cardholder data over open, public networks.&lt;br /&gt;
&lt;br /&gt;
A note about SSL and early TLS web encryption: based on vulnerabilities in web encryption, the PCI Security Standards Council has released policy stating that you need to &lt;a href=&quot;http://blog.securitymetrics.com/2017/08/ssl-to-tls-v12-tips-to-secure-your-data.html&quot;&gt;transition from SSL and early TLS&lt;/a&gt; to secure versions of TLS by June 30, 2018.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2017/03/pci-requirement-4-securing-networks.html&quot;&gt;PCI Requirement 4: Securing Your Networks&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
5: Use and regularly update anti-virus software&lt;/h4&gt;
&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;&lt;br /&gt;
Anti-virus software needs to be installed on all systems commonly affected by malware. Make sure anti-virus or anti-malware programs are updated on a regular basis to detect known malware. Maintaining an up-to-date anti-malware program will prevent known malware from infecting systems.&lt;br /&gt;
&lt;br /&gt;
Be sure you or your POS vendor are regularly running your software’s anti-virus scans.&lt;br /&gt;
&lt;br /&gt;
You should also keep up to date on current and existing malware threats. Using outside sources, such as vendor/anti-virus threat feeds, merchants can find out about emerging malware and attacks on systems. Then you can configure systems to alert and report on suspicious activity, such as new files added to known malware directories or unauthorized access attempts.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2017/04/pci-requirement-5-protecting-system-with-anti-virus.html&quot;&gt;PCI Requirement 5: Protecting Your System with Anti-Virus&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
6: Regularly update and patch systems&lt;/h4&gt;
&lt;br /&gt;
Applications will never be perfect, which is why manufacturers frequently release updates to patch security holes. These patch updates can also be time sensitive. Once a hacker knows they can get through a security hole, they pass that knowledge on to the hacker community, which will then exploit the weakness until the patch has been updated.&lt;br /&gt;
&lt;br /&gt;
Quickly implementing security updates is crucial to your security posture. Patch all critical components in the card flow pathway, including:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Internet browsers   &lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Firewalls   &lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Application software   &lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Databases   &lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;POS terminals   &lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Operating systems   &lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
Be vigilant and consistently update the software associated with your system. Requirement 6.2 states merchants must “install critical patches within a month of release” to maintain compliance. Don’t forget to update critical software installations like credit card payment applications and mobile devices. To stay updated, ask your software vendors to put you on their patch/upgrade notification list.  &lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2017/04/pci-requirement-5-protecting-system-with-anti-virus.html&quot;&gt;PCI Requirement 6: Updating Your Systems&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
7: Restrict access to cardholder data by business need-to-know&lt;/h4&gt;
&lt;br /&gt;
To fulfill requirement 7, you need a role-based access control (RBAC) system, which grants access to card data and systems on a need-to-know basis. Configure administrator and user accounts to prevent exposure of sensitive data to those who don’t need this information.&lt;br /&gt;
&lt;br /&gt;
PCI DSS 3.2 requires a defined and up-to-date list of the roles (employees) with access to the card data environment. On this list, you should include each role, the definition of each role, access to data resources, current privilege level, and what privilege level is necessary for each person to perform normal business responsibilities. Authorized users must fit into one of the roles you outline.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2017/06/employees-need-to-know-basis-pci-requirement-7.html&quot;&gt;Keep Employees on a Need-to-Know Basis: A Look at Requirement 7&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
8: Assign a unique ID to each person with computer access&lt;/h4&gt;
&lt;br /&gt;
According to PCI DSS requirement 8, user IDs and passwords need to be sufficiently complex and unique. You should not use group or shared passwords.&lt;br /&gt;
&lt;br /&gt;
However, your system security should not be based solely on the complexity of a single password. No password should be considered “uncrackable,” which is why, as of February 1, 2018, all non-console administrative access (&lt;a href=&quot;http://blog.securitymetrics.com/2016/01/configuring-your-remote-desktop-wrong.html&quot;&gt;remote access&lt;/a&gt;) to in-scope systems requires &lt;a href=&quot;http://blog.securitymetrics.com/2017/10/understanding-MFA-supplement.html&quot;&gt;multi-factor authentication&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2017/07/pci-requirement-8-combatting-weak-passwords.html&quot;&gt;Combatting Weak Passwords and Usernames&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
9: Restrict physical access to workplace and cardholder data&lt;/h4&gt;
&lt;br /&gt;
Employees may think physical security only applies after hours. However, most data thefts (e.g., social engineering attacks) occur in the middle of the day, when staff is often too busy with their various assignments to notice someone walking out of the office with a server, company laptop, phone, etc.&lt;br /&gt;
&lt;br /&gt;
You are not allowed to store sensitive information like payment card data out in the open. For example, many hotels keep binders full of credit card numbers behind the front desk, or piled on the fax machine, for easy reservation access. Unfortunately, this collection of files not only makes life easier for employees but gives criminals easy access to this information.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2017/12/employee-training-social-engineering.html&quot;&gt;Employee Security Training Tips: Social Engineering&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Requirement 9 states that you must physically limit access to areas with cardholder data, as well as document the following:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Who has access to secure environments and why they need this access   &lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;What, when, where, and why devices are used   &lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;A list of authorized device users   &lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Locations where the device is and is not allowed   &lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;What applications can be accessed on the device   &lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
You will also need to implement automated lockout/timeout controls on workstations, periodically inspect all devices, and most importantly—train your staff regularly about physical security, policies and procedures, and social engineering.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2017/08/pci-dss-requirement-9-physical-security.html&quot;&gt;PCI DSS Requirement 9: Upping Your Physical Security&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
10: Implement logging and log management&lt;/h4&gt;
&lt;br /&gt;
&lt;a href=&quot;http://blog.securitymetrics.com/2018/01/2017-data-breach-trends.html&quot;&gt;We found that in 2017&lt;/a&gt;, non-compliance with requirement 10 was the most common contributor to data breaches. Logs are only useful if they are reviewed.&lt;br /&gt;
&lt;br /&gt;
System event logs are recorded tidbits of information regarding actions taken on computer systems like firewalls, office computers, or printers. To fulfill requirement 10, you must review logs at least daily to search for errors, anomalies, and suspicious activities that deviate from the norm. You’re also required to have a process in place to respond to these anomalies and exceptions.&lt;br /&gt;
&lt;br /&gt;
Log monitoring systems, like Security Information and Event Monitoring tools (SIEM), can help you oversee network activity, inspect system events, alert of suspicious activity, and store user actions that occur inside your systems.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/search?q=logging+and+log+management&quot;&gt;PCI Requirement 10: Logging and Log Management&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;&lt;br /&gt;
&lt;h4&gt;
11: Conduct vulnerability scans and penetration tests&lt;/h4&gt;
&lt;br /&gt;
Your data could be left vulnerable due to defects in web servers, web browsers, email clients, POS software, operating systems, and server interfaces. Yes, fulfilling requirement 6 (installing security updates and patches) can help correct many of these defects and vulnerabilities before attackers have the opportunity to leverage them.   But in order to be sure you’ve successfully patched these vulnerabilities, you need to be able to find them and test them. For that you need to perform regular vulnerability scanning and penetration testing.&lt;br /&gt;
&lt;br /&gt;
A &lt;a href=&quot;https://www.securitymetrics.com/vulnerability-scan&quot;&gt;vulnerability scan&lt;/a&gt; is an automated, high-level test that looks for and reports potential vulnerabilities. All external IPs and domains exposed in the CDE are required to be scanned by a PCI Approved Scanning Vendor (ASV) at least quarterly.&lt;br /&gt;
&lt;br /&gt;
A &lt;a href=&quot;https://www.securitymetrics.com/penetration-testing&quot;&gt;penetration test&lt;/a&gt; is an exhaustive, live examination designed to exploit weaknesses in your system. Just like a hacker, penetration testers analyze network environments, identify potential vulnerabilities, and try to exploit those vulnerabilities (or coding errors). Basically, these analysts attempt to break into your company’s network.&lt;br /&gt;
&lt;br /&gt;
Requirements for frequency and type of penetration test will vary depending on your SAQ, business size, environment, systems, etc.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2017/10/pci-requirement-11-vulnerability-scans.html&quot;&gt;PCI Requirement 11: Vulnerability Scans and Penetration Tests&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
12: Documentation and risk assessments&amp;nbsp;&lt;/h4&gt;
&lt;br /&gt;
The final requirement for PCI compliance is to keep documentation, policies, procedures, and evidence relating to your company’s security practices.&lt;br /&gt;
&lt;br /&gt;
If you perform a PCI audit, you’ll quickly pick up on the fact that there’s a big emphasis on your documented security policies and procedures. During an assessment, QSAs will typically verify that specific requirements are defined in company policies and procedures. Then, they’ll follow predefined testing procedures to verify that those controls are implemented in accordance with the PCI Data Security Standard and with written company policies.&lt;br /&gt;
&lt;br /&gt;
You will need to include the following information in your documentation:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Employee manuals   &lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Policies and procedures   &lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Third-party vendor agreements   &lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Incident response plans   &lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
The second part of requirement 12 is to perform an annual, formal risk assessment that identifies critical assets, threats, and vulnerabilities. This requirement will help you identify, prioritize, and manage your information security risks.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2017/11/pci-dss-requirement-12.html&quot;&gt;PCI DSS Requirement 12: Leverage Policy to Improve Security&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
The process of reaching PCI compliance takes time and can seem like an overwhelming list of demands, but it’s ultimately what will make the difference between a failed cyber-attack on your business and a cyber-attack that sinks your business.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;Guides&lt;/a&gt;, checklists, and templates will help you and your IT teams complete day-to-day tasks associated with each requirement, and &lt;a href=&quot;https://www.securitymetrics.com/security-consulting&quot;&gt;security professionals can advise you &lt;/a&gt;on more complicated issues.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
If you&#39;re interested in a &lt;a href=&quot;https://www.securitymetrics.com/pci-audit&quot;&gt;PCI Audit&lt;/a&gt; or other security services, &lt;a href=&quot;https://www.securitymetrics.com/contact&quot;&gt;contact us here&lt;/a&gt;.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://2.bp.blogspot.com/-zmJbW-y-bEI/WrwbKAo7tNI/AAAAAAAABSQ/Z8FEy74oP_Ag8CznKAArUXzpyiIKSfnLQCPcBGAYYCw/s1600/2018%2BPCI%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/4431850591271671833'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/4431850591271671833'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2018/04/what-are-12-requirements-of-pci-dss.html' title='What are the 12 requirements of PCI DSS Compliance? '/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-SvO-O9Lx63I/Ws09H4w7V3I/AAAAAAAABUw/c0fhYHJ_aaorm8OtoTXJ3CG3rrt2RJkpwCLcBGAs/s72-c/625118904465138.c2g13Wuls2JAeht3kczj_height640.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-3804166942908123960</id><published>2018-04-03T09:59:00.003-07:00</published><updated>2018-08-14T08:24:04.378-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Guide to PCI Compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI DSS"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI DSS 3.2"/><title type='text'>Takeaways from Our 2018 PCI Guide</title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/takeaways-our-2018-pci-guide&#39; /&gt;

&lt;h3&gt;
Important lessons from the SecurityMetrics 2018 Guide to PCI DSS Compliance.&amp;nbsp;&lt;/h3&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://3.bp.blogspot.com/-sesnrqJoxTQ/WsOoDuItKkI/AAAAAAAABTw/KM2nIMyXbzcnXSF4yuQa6if1xhVOFZQZwCEwYBhgL/s1600/PCI%2BGuide%2BTakeaways_Blog.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;182&quot; src=&quot;https://3.bp.blogspot.com/-sesnrqJoxTQ/WsOoDuItKkI/AAAAAAAABTw/KM2nIMyXbzcnXSF4yuQa6if1xhVOFZQZwCEwYBhgL/s320/PCI%2BGuide%2BTakeaways_Blog.jpg&quot; style=&quot;display: none;&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Our 2018 PCI Guide is out and already helping businesses understand the Payment Card Industry Data Security Standard (PCI DSS) and simplify their own compliance journeys.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://4.bp.blogspot.com/-c-Fb54y7Tks/WsOoGldU_II/AAAAAAAABTs/dKSBq_oR59YmYxP98XN4qw4ZD4wBB4hlACLcBGAs/s1600/PCI%2BGuide%2BTakeaways_Image.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;608&quot; data-original-width=&quot;568&quot; height=&quot;200&quot; src=&quot;https://4.bp.blogspot.com/-c-Fb54y7Tks/WsOoGldU_II/AAAAAAAABTs/dKSBq_oR59YmYxP98XN4qw4ZD4wBB4hlACLcBGAs/s200/PCI%2BGuide%2BTakeaways_Image.png&quot; width=&quot;186&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Merchants use our PCI Guide both as a desk-side PCI reference and as a tool to direct and track their organizations’ internal PCI compliance efforts. But, there’s also another side to the Guide. Our ultimate goal is to help you secure data and protect your business, so we’ve included highlights from &lt;a href=&quot;http://blog.securitymetrics.com/2018/01/2017-data-breach-trends.html&quot;&gt;our own research&lt;/a&gt; in the Guide to give you a clearer picture of how compliance and security work together.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;Download the SecurityMetrics 2018 PCI Guide here.&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
This post will cover some of the most important takeaways from our Guide, so you can apply these lessons to the everyday operations of your business.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Forensic Data from 2017 Investigations&lt;/h4&gt;
Our &lt;a href=&quot;https://www.securitymetrics.com/forensics&quot;&gt;PCI Forensic investigators (PFIs)&lt;/a&gt; have been helping businesses analyze and recover from suspected data breaches for over 15 years. In the process, they’ve witnessed the rise and fall of popular cyber-attack trends as well as collected a trove of useful forensic data that can be used to inform your data security implementations.&lt;br /&gt;
&lt;br /&gt;
What we found regarding the average breached merchant:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;The average organization was vulnerable for 1,549 days.  &lt;/li&gt;
&lt;li&gt;Cardholder data was captured for an average of 237 days.  &lt;/li&gt;
&lt;li&gt;Cardholder data was exfiltrated for an average of 264 days.  &lt;/li&gt;
&lt;li&gt;45% of organizations were breached through insecure remote access.  &lt;/li&gt;
&lt;li&gt;39% of organizations had memory-scraping malware installed on their system.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;a href=&quot;http://info.securitymetrics.com/2017-forensics-webinar&quot;&gt;&lt;br /&gt;&lt;/a&gt;
&lt;a href=&quot;http://info.securitymetrics.com/2017-forensics-webinar&quot;&gt;WEBINAR: Lessons Learned from 2017 Forensic Investigations&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
In general, we see that these trends stem directly from non-compliance with the PCI DSS.&lt;br /&gt;
&lt;br /&gt;
Most organizations will experience system attacks from a variety of sources, and some of these attacks will result in data breaches. Some breaches are due to system or technology weakness, others to internal security process failures (e.g., ignoring patches and updates). Whatever the source of the attack or the ultimate reason for compromise, we’ve found a strong correlation between non-compliance and data breaches.&lt;br /&gt;
&lt;br /&gt;
The PCI DSS is specifically designed to protect merchants and organizations that deal with payment card data and associated sensitive information. Following its requirements exactly will greatly diminish the chances of a successful cyber-attack on your systems.&lt;br /&gt;
&lt;br /&gt;
Our Forensic Investigators track which PCI requirements organizations are—or are not—compliant with at the time of a data breach.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://3.bp.blogspot.com/-07eAw4O1iwc/WsOmXiMFGpI/AAAAAAAABTU/rCyEjbEEVOQv9qmwfP878DoqUmy2qWpXQCLcBGAs/s1600/Screen%2BShot%2B2018-04-02%2Bat%2B9.30.19%2BAM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;816&quot; data-original-width=&quot;709&quot; src=&quot;https://3.bp.blogspot.com/-07eAw4O1iwc/WsOmXiMFGpI/AAAAAAAABTU/rCyEjbEEVOQv9qmwfP878DoqUmy2qWpXQCLcBGAs/s1600/Screen%2BShot%2B2018-04-02%2Bat%2B9.30.19%2BAM.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Our PFIs also record whether non-compliance with these requirements directly contributed to the data breach.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://1.bp.blogspot.com/-7UkRKDaj6d0/WsOmcEPnL2I/AAAAAAAABTY/vsHVmLNunFc2ufAuLbH2p2ix_uBhTcyIACLcBGAs/s1600/Screen%2BShot%2B2018-04-02%2Bat%2B9.35.13%2BAM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;824&quot; data-original-width=&quot;723&quot; src=&quot;https://1.bp.blogspot.com/-7UkRKDaj6d0/WsOmcEPnL2I/AAAAAAAABTY/vsHVmLNunFc2ufAuLbH2p2ix_uBhTcyIACLcBGAs/s1600/Screen%2BShot%2B2018-04-02%2Bat%2B9.35.13%2BAM.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
You can see that non-compliance with requirements like &lt;a href=&quot;https://www.pcisecuritystandards.org/document_library?category=pcidss&amp;amp;document=pci_dss&quot;&gt;10 (logging), 11 (vulnerability scans), and 12 (policy/procedures documentation)&lt;/a&gt; frequently contributed to the data breaches themselves.&lt;br /&gt;
&lt;br /&gt;
Further, if there is a successful attack, shrinking the window of compromise will go a long way to lessen the damage a data breach can cause. The longer attackers have access to your data without you knowing, the more they can take and the more profit they stand to make.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Takeaway:&lt;/b&gt; You can shrink the window of compromise by properly implementing security measures like &lt;a href=&quot;http://blog.securitymetrics.com/2017/09/pci-requirement-10-logging.html&quot;&gt;PCI requirement 10&lt;/a&gt;, “Implement Logging and Log Management,” or &lt;a href=&quot;http://blog.securitymetrics.com/2017/06/employees-need-to-know-basis-pci-requirement-7.html&quot;&gt;PCI requirement 7&lt;/a&gt;, “Restrict Access.”&lt;br /&gt;
&lt;a href=&quot;http://info.securitymetrics.com/infographic-data-breach-visualization-2017&quot;&gt;&lt;br /&gt;&lt;/a&gt;
&lt;a href=&quot;http://info.securitymetrics.com/infographic-data-breach-visualization-2017&quot;&gt;Download our 2017 Forensic Data Breach Trends Infographic here.&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Top 10 failing self-assessment questionnaire (SAQ) sections&lt;/h4&gt;
We scanned our merchant database in search of the top 10 areas where SecurityMetrics merchants struggle to become compliant. Starting with the least adopted requirement, these are the results:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2017/11/pci-dss-requirement-12.html&quot;&gt;Requirement 12.10.1&lt;/a&gt;: Create an incident response plan to be implemented in the event of system breach.&lt;/li&gt;
&lt;li&gt;Requirement 12.8.5: Maintain information about which PCI DSS requirements are managed by each service provider, and which are managed by the entity.&lt;/li&gt;
&lt;li&gt;Requirement 12.5.3: Establish, document, and distribute security incident response and escalation procedures to ensure timely and effective handling of all situations.&lt;/li&gt;
&lt;li&gt;Requirement 12.1: Establish, publish, maintain, and disseminate a security policy.&lt;/li&gt;
&lt;li&gt;Requirement 12.6: Implement a formal security awareness program to make all personnel aware of the cardholder data security policy and procedures.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2017/08/pci-dss-requirement-9-physical-security.html&quot;&gt;Requirement 9.9.2.b&lt;/a&gt;: Verify that personnel are aware of procedures for inspecting devices and that devices are periodically inspected for evidence of tampering.&lt;/li&gt;
&lt;li&gt;Requirement 9.9.2.a: Verify that documented processes include procedures for inspecting devices and frequency of inspections.&lt;/li&gt;
&lt;li&gt;Requirement 12.8.4: Maintain a program to monitor service providers’ PCI DSS compliance status at least annually.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2016/11/pci-requirement-1-managing-firewalls.html&quot;&gt;Requirement 1.2.1&lt;/a&gt;: Restrict inbound and outbound traffic to that which is necessary for the cardholder data environment, and specifically deny all other traffic.&lt;/li&gt;
&lt;li&gt;Requirement 12.4: Ensure that the security policy and procedures clearly define information security responsibilities for all personnel.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
2017 showed significant decreases in compliance levels when compared to previous years. None of the investigated breached merchants in 2017 were found to be compliant with PCI DSS. In nearly every case, the vulnerabilities that attackers leveraged to gain access to merchant systems were covered by specific sections of the PCI DSS.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Takeaway:&amp;nbsp;&lt;/b&gt;In other words, had the organization been compliant with those sections of the PCI DSS, the breach likely would not have occurred.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://info.securitymetrics.com/panscan-infographic-2018&quot;&gt;Download our 2017 PANscan Results Infographic here.&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Vulnerability scan results&lt;/h4&gt;
&lt;a href=&quot;https://www.securitymetrics.com/vulnerability-scan&quot;&gt;External vulnerability scans&lt;/a&gt; performed by a PCI Approved Scanning Vendor (ASV) are just one tool in validating PCI compliance. But, the results can also provide valuable insight into common weak spots you should pay special attention.&lt;br /&gt;
&lt;br /&gt;
These are the top 5 areas SecurityMetrics customers failed in vulnerability scans, and one can surmise that these trends extend to businesses who are both currently and not currently working on their security:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;TLS Version 1.0 Protocol Detection&lt;/li&gt;
&lt;li&gt;SSL Medium Strength Cipher Suites Supported&lt;/li&gt;
&lt;li&gt;SSL 64-bit Block Size Cipher Suites Supported (Sweet32)&lt;/li&gt;
&lt;li&gt;SSL Certificate with Wrong Hostname&lt;/li&gt;
&lt;li&gt;SSL Self-Signed Certificate&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;b&gt;Takeaway: &lt;/b&gt;If you haven&#39;t already, make sure your &lt;a href=&quot;http://blog.securitymetrics.com/2017/08/ssl-to-tls-v12-tips-to-secure-your-data.html&quot;&gt;cryptographic protocols&lt;/a&gt;&amp;nbsp;are in line with the &lt;a href=&quot;https://www.pcisecuritystandards.org/pdfs/PCI_SSC_Migrating_from_SSL_and_Early_TLS_Resource_Guide.pdf&quot;&gt;latest PCI Council guidance&lt;/a&gt;.&lt;br /&gt;
&lt;h4&gt;
Your PCI compliance journey&lt;/h4&gt;
When planning and designing your organization’s compliance journey, it helps to understand the bigger picture. PCI DSS requirements were not designed arbitrarily but rather, specifically, to help you avoid data breaches and mitigate their effects if they do happen.&lt;br /&gt;
&lt;br /&gt;
The &lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;Security Metrics 2018 Guide to PCI DSS Compliance&lt;/a&gt; is a powerful tool for understanding and appreciating the connection between compliance and security.&lt;br /&gt;
&lt;br /&gt;
Let us know what you think about the guide! Email us at pr@securitymetrics.com with your feedback.&lt;br /&gt;
&lt;br /&gt;
Interested in a &lt;a href=&quot;https://www.securitymetrics.com/pci-audit&quot;&gt;PCI Audit&lt;/a&gt;, &lt;a href=&quot;https://www.securitymetrics.com/hipaa-audit&quot;&gt;HIPAA Audit&lt;/a&gt;, or our other &lt;a href=&quot;https://www.securitymetrics.com/security-training&quot;&gt;security services&lt;/a&gt;? &lt;a href=&quot;https://www.securitymetrics.com/contact&quot;&gt;Contact us here.&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://2.bp.blogspot.com/-zmJbW-y-bEI/WrwbKAo7tNI/AAAAAAAABSQ/Z8FEy74oP_Ag8CznKAArUXzpyiIKSfnLQCPcBGAYYCw/s1600/2018%2BPCI%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/3804166942908123960'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/3804166942908123960'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2018/04/takeaways-from-our-2018-pci-guide.html' title='Takeaways from Our 2018 PCI Guide'/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-sesnrqJoxTQ/WsOoDuItKkI/AAAAAAAABTw/KM2nIMyXbzcnXSF4yuQa6if1xhVOFZQZwCEwYBhgL/s72-c/PCI%2BGuide%2BTakeaways_Blog.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-2279945324604108012</id><published>2018-03-27T14:47:00.003-07:00</published><updated>2018-08-14T08:25:38.444-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Guide to PCI Compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI DSS"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI DSS 3.2"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI DSS Guide"/><category scheme="http://www.blogger.com/atom/ns#" term="PCI Guide"/><title type='text'>What&#39;s Inside Our 2018 PCI Guide</title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/whats-inside-our-2018-pci-guide&#39; /&gt;

&lt;h3&gt;
The 2018 PCI Guide is here. Learn what’s in it and how it will simplify your PCI process.&amp;nbsp;&lt;/h3&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://3.bp.blogspot.com/-Q4Hdt1xt1BQ/Wrq7y_0a5rI/AAAAAAAABRo/FSrIdT5YkukVIhZjSflwtLQcbzhNX_rgQCLcBGAs/s1600/2018%2BPCI%2BGuide_Blog%2B2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;182&quot; src=&quot;https://3.bp.blogspot.com/-Q4Hdt1xt1BQ/Wrq7y_0a5rI/AAAAAAAABRo/FSrIdT5YkukVIhZjSflwtLQcbzhNX_rgQCLcBGAs/s320/2018%2BPCI%2BGuide_Blog%2B2.jpg&quot; style=&quot;display: none;&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a href=&quot;https://2.bp.blogspot.com/-HAcedxD-vMk/Wrq7phIwKvI/AAAAAAAABRk/Hpyr8W6izwIz8KgXAZXTArui5fRkcyCWwCLcBGAs/s1600/PCI%2BGuide%2Bthumbnail_Image.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;608&quot; data-original-width=&quot;568&quot; height=&quot;200&quot; src=&quot;https://2.bp.blogspot.com/-HAcedxD-vMk/Wrq7phIwKvI/AAAAAAAABRk/Hpyr8W6izwIz8KgXAZXTArui5fRkcyCWwCLcBGAs/s200/PCI%2BGuide%2Bthumbnail_Image.png&quot; width=&quot;186&quot; /&gt;&lt;/a&gt;We’ve officially launched our &lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;2018 Guide to Payment Card Industry Data Security Standard (PCI DSS) Compliance&lt;/a&gt;&lt;/span&gt;. Inside you’ll find fresh insights, tips from auditors, forensic investigation data, interactive checklists, and a new prioritized chart to guide your reading.&lt;br /&gt;
&lt;span style=&quot;background-color: yellow;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;You can download the 2018 SecurityMetrics Guide to PCI Compliance here.&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Here’s a list of 5 of the best features from our 2018 Guide to PCI DSS Compliance:&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
1. A prioritized approach to PCI compliance&lt;/h4&gt;
&lt;br /&gt;
&lt;a href=&quot;https://2.bp.blogspot.com/-ZYOzrdzu3Sg/WrqDNtwiPfI/AAAAAAAABRA/43h69qebp7QyvnvhkpRZIHbQ4rM1Ch4YgCLcBGAs/s1600/Screen%2BShot%2B2018-03-26%2Bat%2B10.55.26%2BAM.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;486&quot; data-original-width=&quot;1218&quot; height=&quot;127&quot; src=&quot;https://2.bp.blogspot.com/-ZYOzrdzu3Sg/WrqDNtwiPfI/AAAAAAAABRA/43h69qebp7QyvnvhkpRZIHbQ4rM1Ch4YgCLcBGAs/s320/Screen%2BShot%2B2018-03-26%2Bat%2B10.55.26%2BAM.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;If you’re working towards &lt;a href=&quot;https://www.securitymetrics.com/pci&quot;&gt;payment card industry compliance&lt;/a&gt; this year, you&#39;ll want to check out our newly added section that begins on page 5, titled “How to Read This Guide.” We’ve added a chart to guide you through the requirements of the PCI DSS.&lt;br /&gt;
&lt;br /&gt;
The chart gives an overview of the&amp;nbsp;&lt;a href=&quot;https://www.pcisecuritystandards.org/documents/Prioritized-Approach-for-PCI_DSS-v3_2.pdf&quot;&gt;PCI Security Standards Council’s Prioritized Approach&lt;/a&gt;. The PCI SSC&#39;s Prioritized Approach consists of six milestones based on high-level compliance and security goals. Our chart breaks down requirements into individual IT tasks and assigns them to their related milestone(s).&lt;br /&gt;
&lt;br /&gt;
This chart is especially useful for PCI compliance officers, CISOs, IT managers—anyone whose job requires that they plan, organize, or present on internal PCI compliance efforts. The Prioritized Approach offers organizations a risk-based roadmap to address issues on a priority basis, while also supporting organizational financial and operational planning.&lt;br /&gt;
&lt;br /&gt;
Depending on where you are in your compliance journey, some milestones may be more significant to you than others. Rather than reading our guide cover to cover, we recommend you use this chart to guide your PCI compliance efforts.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
2. Forensic data from our 2017 investigations&lt;/h4&gt;
&lt;br /&gt;
&lt;a href=&quot;https://1.bp.blogspot.com/-HzqjmfSWKGI/WrqDUZkuVAI/AAAAAAAABRE/pp1QSti-nX8tgKdvvrhexYYSi-hpKgnSwCLcBGAs/s1600/Screen%2BShot%2B2018-03-26%2Bat%2B11.12.08%2BAM.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;649&quot; data-original-width=&quot;529&quot; height=&quot;320&quot; src=&quot;https://1.bp.blogspot.com/-HzqjmfSWKGI/WrqDUZkuVAI/AAAAAAAABRE/pp1QSti-nX8tgKdvvrhexYYSi-hpKgnSwCLcBGAs/s320/Screen%2BShot%2B2018-03-26%2Bat%2B11.12.08%2BAM.png&quot; width=&quot;260&quot; /&gt;&lt;/a&gt;We believe knowledge is power, which is why we share data from our &lt;a href=&quot;http://blog.securitymetrics.com/2018/01/2017-data-breach-trends.html&quot;&gt;2017 forensic data breach investigations&lt;/a&gt; on pages 11-13. By learning which PCI requirements were most commonly/not commonly implemented at the time of a data breach, which non-compliant requirements directly contributed to data breaches, as well as the top SAQ failures, you can appreciate the bigger picture of what PCI compliance means for organizations.&lt;br /&gt;
&lt;br /&gt;
Understanding the patterns that typically go along with data breaches empowers you to make informed decisions about allocating your PCI compliance resources.&lt;br /&gt;
&lt;br /&gt;
WEBINAR: &lt;a href=&quot;http://info.securitymetrics.com/2017-forensics-webinar&quot;&gt;Lessons Learned from 2017 Forensics Investigations&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
We found that 2017 showed significant decreases in compliance levels when compared to previous years and that none of the investigated breached merchants in 2017 were found to be compliant with PCI DSS. And in nearly every case, the vulnerabilities that attackers leveraged to gain access to merchant systems would have been mitigated if the organization had been compliant with the entire PCI DSS.&lt;br /&gt;
&lt;h4&gt;
&lt;br /&gt;3. Interactive IT Checklists&amp;nbsp;&lt;/h4&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://3.bp.blogspot.com/-cgLmoMMDENQ/WrqDseqoi0I/AAAAAAAABRM/BKIryxt8RJcGitBwT6L6d-gNKB4GtUvTQCLcBGAs/s1600/Screen%2BShot%2B2018-03-27%2Bat%2B11.46.48%2BAM.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1152&quot; data-original-width=&quot;1424&quot; height=&quot;258&quot; src=&quot;https://3.bp.blogspot.com/-cgLmoMMDENQ/WrqDseqoi0I/AAAAAAAABRM/BKIryxt8RJcGitBwT6L6d-gNKB4GtUvTQCLcBGAs/s320/Screen%2BShot%2B2018-03-27%2Bat%2B11.46.48%2BAM.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
PCI compliance comes down to the successful completion of a series of tasks. At the end of each requirement section, we include checklists as a way to help IT teams track and manage these action items.&lt;br /&gt;
&lt;br /&gt;
The IT checklists have been one of the most popular and utilized features of our guides. This year, they are “interactive,” meaning you can actually check off tasks within the PDF document. You can also type directly in the assignment and completion fields.&lt;br /&gt;
&lt;br /&gt;
We added the checklists specifically to give you more options to manage and document your organization’s compliance-related IT tasks. The intent is to simplify compliance for everyone: those who determine the tasks, those who assign the tasks, and those who ultimately perform the tasks. This doesn’t replace our PCI audit management tool, but should enhance the overall process of getting compliant.&lt;br /&gt;
&lt;br /&gt;
Interactive IT checklists are found on the following pages: 40, 44, 48, 51, 53, 58, 60, 64, 69, 73, 81, and 86.&lt;br /&gt;
&lt;br /&gt;
INFOGRAPHIC: &lt;a href=&quot;http://info.securitymetrics.com/infographic-piiscan&quot;&gt;How to Discover and Encrypt Sensitive Data&lt;/a&gt;&lt;br /&gt;
&lt;h4&gt;
&lt;br /&gt;4. Tips from auditors&amp;nbsp;&lt;/h4&gt;
&lt;br /&gt;
Our “Tips from Auditors” sections throughout the document give context to the bigger picture of PCI compliance as well as actionable tips from our QSAs, who have years of IT security and audit experience.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://3.bp.blogspot.com/-ePmXv-ySsWA/WrqDIQcnl3I/AAAAAAAABQ8/Vukn_NstyV4XIqEY9SEUWOUGCMlWM2rXACLcBGAs/s1600/Screen%2BShot%2B2018-03-26%2Bat%2B1.00.05%2BPM.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;218&quot; data-original-width=&quot;419&quot; height=&quot;166&quot; src=&quot;https://3.bp.blogspot.com/-ePmXv-ySsWA/WrqDIQcnl3I/AAAAAAAABQ8/Vukn_NstyV4XIqEY9SEUWOUGCMlWM2rXACLcBGAs/s320/Screen%2BShot%2B2018-03-26%2Bat%2B1.00.05%2BPM.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
We include auditor commentary and best practices for each PCI DSS requirement, as well as in other sections of the guide. If you are looking for an overview of what’s important for data security in the payment card industry, these sections would be a perfect place to start.&lt;br /&gt;
&lt;br /&gt;
“Tips from an Auditor” sections can be found on the following pages: 17, 39, 43, 47, 50, 52, 56, 59, 63, 68, 72, 80, 85, and 106.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;br /&gt;5. PCI Data Security Standard updates&lt;/h4&gt;
&lt;br /&gt;
Our PCI guide is written in accordance with the &lt;a href=&quot;https://www.pcisecuritystandards.org/document_library?category=pcidss&amp;amp;document=pci_dss&quot;&gt;latest version of the PCI DSS&lt;/a&gt;, and outlines the supplemental guidance released by the Security Standards Council. Pages 24-30 outline and describe recent important changes and supplements to the PCI DSS, including:&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;•&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2017/10/are-you-ready-for-pci-dss-32.html&quot;&gt;PCI Data Security Standard version 3.2 &lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;•&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2017/08/saq-d-for-service-providers.html&quot;&gt;New service provider requirements &lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;•&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2017/08/ssl-to-tls-v12-tips-to-secure-your-data.html&quot;&gt;Updated SSL/early TLS migration dates &lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;•&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2017/10/understanding-MFA-supplement.html&quot;&gt;February 2017 Multi-factor authentication supplement  &lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;•&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2016/10/2-things-know-about-32-multi-factor-authentication-updates.html&quot;&gt;Multi-factor authentication in or out of the CDE (8.3) &lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;•&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2016/05/pci-dss-32-changes-need-to-know.html&quot;&gt;Clarifying masking criteria (3.3) &lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;•&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Change management process (6.4.6) &lt;br /&gt;
&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;•&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Service provider written agreement (12.8.2) &lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2017/10/are-you-ready-for-pci-dss-32.html&quot;&gt;PCI DSS 3.2 Reminder to Comply&lt;/a&gt;&lt;br /&gt;
&lt;h4&gt;
A powerful PCI help&lt;/h4&gt;
&lt;br /&gt;
Whether you are brand new to PCI compliance or are a seasoned systems administrator, you will find that the 2018 SecurityMetrics Guide to PCI DSS Compliance is a dynamic, hard-working document. We designed it to be a useful tool in the hands of anyone who wants to achieve compliance with the PCI DSS.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;You can download the 2018 SecurityMetrics Guide to PCI Compliance here.&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
We’d love to hear what you think—do new features like the interactive checklists or “Prioritized Approach” reading guide chart help your compliance managers and IT teams? Are there features of the guide you use more than others? Or are there things you’d like to see included in the next edition?&lt;br /&gt;
&lt;br /&gt;
Email pr@securitymetrics.com with your feedback about the guide.&lt;br /&gt;
&lt;br /&gt;
If you’re interested in a &lt;a href=&quot;https://www.securitymetrics.com/pci-audit&quot;&gt;PCI audit&lt;/a&gt; or our &lt;a href=&quot;https://www.securitymetrics.com/vulnerability-scan&quot;&gt;data security services&lt;/a&gt;, &lt;a href=&quot;https://www.securitymetrics.com/contact&quot;&gt;contact us here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://2.bp.blogspot.com/-usQKakOz_To/WrwYcZmJI9I/AAAAAAAABSA/-HaZSliVOicBcoRKNFadK25KSnXdF3qjQCLcBGAs/s1600/2018%2BPCI%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/2279945324604108012'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/2279945324604108012'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2018/03/whats-inside-our-2018-pci-guide.html' title='What&#39;s Inside Our 2018 PCI Guide'/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-Q4Hdt1xt1BQ/Wrq7y_0a5rI/AAAAAAAABRo/FSrIdT5YkukVIhZjSflwtLQcbzhNX_rgQCLcBGAs/s72-c/2018%2BPCI%2BGuide_Blog%2B2.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-6038398398224637955</id><published>2018-03-16T15:09:00.000-07:00</published><updated>2018-08-14T08:28:21.127-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="health network"/><category scheme="http://www.blogger.com/atom/ns#" term="HIPAA"/><category scheme="http://www.blogger.com/atom/ns#" term="HIPAA compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="HIPAA compliance program"/><category scheme="http://www.blogger.com/atom/ns#" term="HIPAA tools"/><title type='text'> No Spreadsheets Needed: Manage HIPAA in SecurityMetrics’ Health Network Portal</title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/no-spreadsheets-needed-manage-hipaa-compliance-securitymetrics-health-network-portal&#39; /&gt;

&lt;h3&gt;
Protect your network, save time on HIPAA, and maintain your reputation.&lt;/h3&gt;
&lt;h4&gt;
HIPAA management for large networks&lt;/h4&gt;
Data security and HIPAA compliance are more important than ever for the healthcare sector. From large health networks to small-town medical practices, protected health information (PHI) remains a high-value target for attackers. &lt;a href=&quot;http://www.healthcareitnews.com/slideshow/biggest-healthcare-breaches-2017-so-far?page=10&quot;&gt;Health organizations were hit hard in 2017&lt;/a&gt;—the healthcare industry experienced &lt;a href=&quot;https://www.idtheftcenter.org/2017-data-breaches&quot;&gt;23.7% of total data breaches that year.&lt;/a&gt; This trend of cyber-attacks and data theft in healthcare seems like it’s here to stay, but complying with HIPAA requirements will go a long way to protect your system from attackers.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://info.securitymetrics.com/hipaa-guide&quot;&gt;Download our 2018 Guide to HIPAA Compliance.&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
If you’re a HIPAA manager, IT Director, or CISO responsible for network-wide HIPAA compliance at your organization, you know that the vulnerabilities of individual members can affect your network as a whole. But, overseeing your network while managing the compliance of each member often amounts to a series of messy, tedious tasks—especially if your main tracking tools are spreadsheets and emails.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://4.bp.blogspot.com/-EQccLmz87K4/Wqw9kIj6dFI/AAAAAAAABQE/-qq25l6DZ_QT-GsAs5A6fy1lbqSC0IfMgCPcBGAYYCw/s1600/Health%2BPortal_Blog.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;182&quot; src=&quot;https://4.bp.blogspot.com/-EQccLmz87K4/Wqw9kIj6dFI/AAAAAAAABQE/-qq25l6DZ_QT-GsAs5A6fy1lbqSC0IfMgCPcBGAYYCw/s320/Health%2BPortal_Blog.jpg&quot; style=&quot;display: none;&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h4&gt;
All-in-one network HIPAA management solution&lt;/h4&gt;
&lt;a href=&quot;https://www.securitymetrics.com/health-network-program?wvideo=566evl39up&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img height=&quot;225&quot; src=&quot;https://embedwistia-a.akamaihd.net/deliveries/be687d9d2cb33daeb5990d64bd7a8872ba1ad1b9.jpg?image_play_button_size=2x&amp;amp;image_crop_resized=960x540&amp;amp;image_play_button=1&amp;amp;image_play_button_color=54bbffe0&quot; style=&quot;height: 225px; width: 400px;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;We designed the &lt;a href=&quot;https://www.securitymetrics.com/health-network-program&quot;&gt;SecurityMetrics Health Network Portal&lt;/a&gt; to be an efficient, organizational portal with tools that facilitate HIPAA management, monitoring, reporting, and tracking. No spreadsheets needed. Plus, HIPAA communications and documentation can be kept on one central platform.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://www.securitymetrics.com/health-network-program&quot;&gt;Learn more about the SecurityMetrics Health Network Portal here.&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Overview dashboard&lt;/h4&gt;
&lt;a href=&quot;https://4.bp.blogspot.com/-szJKuuPLqNU/Wqw-QFsgzHI/AAAAAAAABQI/WtLGUETS0H0tCl4Fajno11AyVwM37HgjQCLcBGAs/s1600/portal%2Bscreen%2Bshot_overview.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;617&quot; data-original-width=&quot;1088&quot; height=&quot;180&quot; src=&quot;https://4.bp.blogspot.com/-szJKuuPLqNU/Wqw-QFsgzHI/AAAAAAAABQI/WtLGUETS0H0tCl4Fajno11AyVwM37HgjQCLcBGAs/s320/portal%2Bscreen%2Bshot_overview.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;The network HIPAA compliance journey begins at the overview dashboard. From this main screen, you can see compliance progress across your network, assign tasks, view scan results and risk summaries, and prepare compliance reports for C-level executives or auditors.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://info.securitymetrics.com/case-study-brightsquid&quot;&gt;How Brightsquid Increased Business with HIPAA Compliance&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a class=&quot;cta-hipaa&quot; href=&quot;http://info.securitymetrics.com/subscribe-hipaa&quot; style=&quot;color: white;&quot; target=&quot;_blank&quot;&gt;Follow for more data security articles like this&lt;/a&gt;
&lt;/div&gt;
&lt;/h4&gt;
&lt;h4&gt;
&lt;/h4&gt;
&lt;h4&gt;
Member Summary&lt;/h4&gt;
Member summaryView progress based on member or location. The member summary tool shows you in real time how individuals’ compliance progress affects the network. You can see which members make the network safer and which ones increase risk. Monitor members’ HIPAA compliance by viewing each of their:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;a href=&quot;https://2.bp.blogspot.com/-FfGufYMiIAI/Wqw-Z8bEcdI/AAAAAAAABQM/igoohdv6QIoK85h6qsfZyiFphZH9soZcQCLcBGAs/s1600/portal%2Bscreen%2Bshot_member.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;905&quot; data-original-width=&quot;1600&quot; height=&quot;181&quot; src=&quot;https://2.bp.blogspot.com/-FfGufYMiIAI/Wqw-Z8bEcdI/AAAAAAAABQM/igoohdv6QIoK85h6qsfZyiFphZH9soZcQCLcBGAs/s320/portal%2Bscreen%2Bshot_member.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;
&lt;li&gt;Breach protection checklist&lt;/li&gt;
&lt;li&gt;Risk analysis&lt;/li&gt;
&lt;li&gt;Risk management plan&lt;/li&gt;
&lt;li&gt;Vulnerability scanning&lt;/li&gt;
&lt;li&gt;Policies and procedures&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2014/05/hipaa-faq.html&quot;&gt;HIPAA FAQs&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Risk Summary&lt;/h4&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://4.bp.blogspot.com/-FjK3xePglgA/Wqw-cKMNNzI/AAAAAAAABQQ/2TtAcNq3qmc8CnXNk0kAy8iVxI-KE8aLwCLcBGAs/s1600/portal%2Bscreen%2Bshot_risk%2Bsummary.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;842&quot; data-original-width=&quot;1196&quot; height=&quot;224&quot; src=&quot;https://4.bp.blogspot.com/-FjK3xePglgA/Wqw-cKMNNzI/AAAAAAAABQQ/2TtAcNq3qmc8CnXNk0kAy8iVxI-KE8aLwCLcBGAs/s320/portal%2Bscreen%2Bshot_risk%2Bsummary.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
The overall security of your network is made up of many members’ tasks and efforts. Our risk summary tool calculates a risk level based on the combined data of every member in your network. This lets you see where you’re at and helps determine what your HIPAA goals might be.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://info.securitymetrics.com/hipaa-program&quot;&gt;Health Network Portal Data Sheet&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;/h4&gt;
&lt;h4&gt;
Business associate overview&lt;/h4&gt;
&lt;a href=&quot;https://3.bp.blogspot.com/--y7MwGWBh3k/Wqw-g9b78tI/AAAAAAAABQU/ytcX8hg7WPckI8TPhXOGXwqWjfY4j2lygCLcBGAs/s1600/portal%2Bscreen%2Bshot_BA.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;930&quot; data-original-width=&quot;1600&quot; height=&quot;185&quot; src=&quot;https://3.bp.blogspot.com/--y7MwGWBh3k/Wqw-g9b78tI/AAAAAAAABQU/ytcX8hg7WPckI8TPhXOGXwqWjfY4j2lygCLcBGAs/s320/portal%2Bscreen%2Bshot_BA.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;Covered entities must maintain a signed up-to-date business associate agreement (BAA) for each business associate they work with. Managing these contracts and tracking down business associates is made simple with the business associate overview tool. You can see at a glance how many business associates you work with and pinpoint which ones have yet to sign BAAs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2017/09/hipaa-business-associate-agreements.html&quot;&gt;Business Associate Agreements 101&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
HIPAA tools for every stage and every day&lt;/h4&gt;
Wherever you are in your HIPAA network compliance journey, the Health Network Portal is an everyday, easy-to-use solution that provides visibility and multi-level views for busy HIPAA managers and compliance officers.&lt;br /&gt;
&lt;br /&gt;
The Health Network Portal guides network-wide compliance efforts and directs attention to potential security gaps, weak spots, and vulnerabilities, which otherwise would have been missed. It’s intended to not only for daily HIPAA management but also to provide reporting resources for meetings, audits, and documentation purposes.&lt;br /&gt;
&lt;br /&gt;
Think the Health Network Portal might be a good fit for your organization? &lt;a href=&quot;https://www.securitymetrics.com/health-network-program#product-quote&quot;&gt;Speak to a specialist&lt;/a&gt; or &lt;a href=&quot;https://www.securitymetrics.com/health-network-program#product-quote&quot;&gt;request a quote for your network here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/hipaa-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://3.bp.blogspot.com/-3ROiSHsLoJk/WigdqVQi9jI/AAAAAAAAAWg/mZsO-dvMJak-m-rVdCoYEXTuUL_9vTa4gCPcBGAYYCw/s1600/2018%2BHIPAA%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/6038398398224637955'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/6038398398224637955'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2018/03/securitymetrics-health-network-portal.html' title=' No Spreadsheets Needed: Manage HIPAA in SecurityMetrics’ Health Network Portal'/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-EQccLmz87K4/Wqw9kIj6dFI/AAAAAAAABQE/-qq25l6DZ_QT-GsAs5A6fy1lbqSC0IfMgCPcBGAYYCw/s72-c/Health%2BPortal_Blog.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-4774456408947810616</id><published>2018-03-14T08:51:00.005-07:00</published><updated>2018-08-14T08:29:13.257-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="EU GDPR"/><category scheme="http://www.blogger.com/atom/ns#" term="GDPR"/><category scheme="http://www.blogger.com/atom/ns#" term="GDPR compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="what is GDPR"/><title type='text'>GDPR FAQs</title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/gdpr-faqs&#39; /&gt;

&lt;img border=&quot;0&quot; data-original-height=&quot;390&quot; data-original-width=&quot;694&quot; height=&quot;179&quot; src=&quot;https://4.bp.blogspot.com/-pkpTkw_Q3OI/WqlF2dAWUUI/AAAAAAAABPk/3hjESFe8Wj8tEul4ic4oSJA3OOxbS4pwACLcBGAs/s320/Screen%2BShot%2B2018-03-12%2Bat%2B2.03.32%2BPM.png&quot; style=&quot;display: none;&quot; width=&quot;320&quot; /&gt;&lt;br /&gt;
&lt;h3&gt;
Our most common questions about the General Data Protection Regulation.&amp;nbsp;&lt;/h3&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-LrCbfcKmF84/WqlBQ4F7dhI/AAAAAAAABPM/rZPi4ttdiNwd13NyPllju900Xhww7rZ9gCLcBGAs/s1600/Ben%2BChristensen_tight.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;882&quot; data-original-width=&quot;882&quot; height=&quot;100&quot; src=&quot;https://2.bp.blogspot.com/-LrCbfcKmF84/WqlBQ4F7dhI/AAAAAAAABPM/rZPi4ttdiNwd13NyPllju900Xhww7rZ9gCLcBGAs/s200/Ben%2BChristensen_tight.jpg&quot; width=&quot;100&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Ben Christensen&lt;br /&gt;
CISA, QSA&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
If you’re like most business owners, you’re probably wondering if and how the new EU General Data Protection Regulation (&lt;a href=&quot;https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/&quot;&gt;GDPR&lt;/a&gt;) applies to you. We’ve received many questions about this new security mandate, and here are answers to our most frequently asked GDPR questions.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
What is GDPR?&lt;/h4&gt;
GDPR stands for General Data Protection Regulation. It was designed to harmonize data privacy laws across Europe, protect and empower all EU citizens with data privacy, and to reshape the way organizations across the region approach data privacy. This mandate replaces the 1995 EU Data Protection Directive and was finally approved by EU parliament on April 14, 2016 after four years of preparation and debate. It went into effect 20 days after its publication in the EU Official Journal—in May of 2016—and will be directly applicable in all member states two years after this date (i.e., May 25, 2018).&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
When will GDPR come into effect?&lt;/h4&gt;
The effective date for the EU GDPR is May 25, 2018.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Who does the GDPR apply to? Does it apply worldwide or just to the EU community?&lt;/h4&gt;
The GDPR applies to any organization (operating in or out of the EU) that processes any personal data, also called personally identifiable information (PII), of EU citizens—whether that organization is a cloud-storage service, university, hospital, merchant, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Does the GDPR apply to organizations outside of the EU that have EU citizens inputting data into their database or website?&lt;/h4&gt;
Yes. Even if the data subject from the EU inputs their own information, the GDPR requirements still apply.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Are payment card details (such as cardholder names and addresses) protected under GDPR?&lt;/h4&gt;
Yes. Personal data includes things like name, address, email, IP address, etc.—data that can directly or indirectly identify a person. Even the magnetic card stripe (also known as track data) contains the cardholder’s name.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2018/02/GDPR-should-I-be-worried.html&quot;&gt;GDPR 101 Part 1: Should I Be Worried?&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
If I’m already PCI compliant, does that cover GDPR?&lt;/h4&gt;
No, but there are data security controls that will cross over. The GDPR scope will likely be much larger than PCI DSS requirements, as it includes all personal data, not just payment card details.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
How does the GDPR impact small businesses? Especially for those with minimal credit card transactions.&lt;/h4&gt;
There may be some requirements of the GDPR--for instance keeping “records of processing activities” (Article 30)--that will not apply to organizations with less than 250 employees. However, there are stipulations to rules like these, and to be safe, you should consult a data security and compliance expert.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
What are the possible penalties for noncompliance with GDPR requirements?&lt;/h4&gt;
Organizations can be fined up to 4% of annual global turnover (aka revenue) or €20 Million—whichever is greater—for violation of GDPR. These are the maximum fines that can be imposed for the most serious infringements, like insufficient customer consent to process data or violation of the core “Privacy by Design” concepts.&lt;br /&gt;
&lt;br /&gt;
According to article 28, there is a tiered approach to fines. A company can be fined 2% of annual global turnover for not having their records in order, 2% for not notifying the supervising authority and data subject about a breach, and 2% for not conducting an impact assessment.&lt;br /&gt;
&lt;br /&gt;
It is important to note that these fines apply to both controllers and processors, and data &#39;clouds&#39; will not be exempt from GDPR enforcement.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
As a result of Brexit, does the UK (and its citizens) still have to follow the GDPR? If the UK doesn&#39;t have to follow the GDPR, how will UK-based organizations be impacted by the GDPR?&lt;/h4&gt;
Since the GDPR applies to the personal data of all EU citizens, businesses in the UK who process EU citizen data post-Brexit would still need to follow its mandates whether or not the UK retains GDPR after Brexit is complete. UK Prime Minister Theresa May announced that the process for the UK to leave the EU would begin on March 29, 2017 and is expected to take at least two years. The effective data for GDPR is May 25, 2018, which means there will be an overlapping window of time when the UK is a member of the EU and the GDPR is in force.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
What is the “Right to Erasure” and how will it impact organizations that are required to keep information for a certain amount of time (e.g., HIPAA requirements)?&lt;/h4&gt;
The “Right to Erasure” is one of the individual rights named in the GDPR. It states that data subjects can request that their personal data be deleted. There are legal and legitimate reasons that organizations could be allowed to keep data beyond retention periods—even if a data subject exercises their right to erasure. For example, an organization may be required to hold records for the IRS, HIPAA requirements, PCI requirements, or legal cases. In these cases, the organization would obviously need a legal basis for keeping such data. It’s best to consult with legal counsel to understand your business’s unique position.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
What other individuals’ rights are set forth in the GDPR?&lt;/h4&gt;
&lt;a href=&quot;https://2.bp.blogspot.com/-gzNYcZBdiCE/WqlI41e8n8I/AAAAAAAABPw/RPgtl3PblO4xMHTLLSSzEmy4jxdBCx_kgCLcBGAs/s1600/Screen%2BShot%2B2018-03-14%2Bat%2B10.07.14%2BAM.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;718&quot; data-original-width=&quot;780&quot; height=&quot;183&quot; src=&quot;https://2.bp.blogspot.com/-gzNYcZBdiCE/WqlI41e8n8I/AAAAAAAABPw/RPgtl3PblO4xMHTLLSSzEmy4jxdBCx_kgCLcBGAs/s200/Screen%2BShot%2B2018-03-14%2Bat%2B10.07.14%2BAM.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/individual-rights/right-to-be-informed/&quot;&gt;Right to be informed &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/individual-rights/right-of-access/&quot;&gt;Right of access &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/individual-rights/right-to-rectification/&quot;&gt;Right of rectification &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/individual-rights/right-to-erasure/&quot;&gt;Right to erasure &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/individual-rights/right-to-restrict-processing/&quot;&gt;Right to restrict processing &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/individual-rights/right-to-data-portability/&quot;&gt;Right to data portability &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/individual-rights/right-to-object/&quot;&gt;Right to object &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/individual-rights/rights-related-to-automated-decision-making-including-profiling/&quot;&gt;Rights&amp;nbsp;related to automated decision making including profiling&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;https://gdpr-info.eu/chapter-3/&quot;&gt;GDPR Articles 12-23&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
How long does a controller have to notify their supervisory authority about a data breach?&lt;/h4&gt;
Supervisory authorities must be told within 72 hours of when the controller becomes aware of a data breach—where feasible, and unless the controller can demonstrate that the breach is unlikely to result in risk to the rights of the data subject. Controllers may also give reasons for delay, if applicable.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
How do we retrospectively gain consent from customers that we already market to on our existing database?&amp;nbsp;&lt;/h4&gt;
Conditions for consent to use data are strengthened overall by the GDPR, and personal data used for marketing purposes must be approved beforehand by the customer in the form of an “opt-in” program. While each business and its operations are different, some may be wondering about old contacts, business cards, or mailing lists with data obtained before GDPR. Depending on your business model, there could be a few ways you might be able to address this problem, however remember that you will need to clear any solutions with legal counsel:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;If you have active customers that put data into a system you control (such as a web-based system) and they visit that system regularly, it seems reasonable to place some sort of consent-flag in a database that could then be set the next time they login to the system. But the concept of collecting consent of active visitors after the fact could work. &lt;/li&gt;
&lt;li&gt;If you own and store a large database/collection of personal data (collected pre-GDPR), this could be more difficult to deal with. You may want to consult a legal expert in that case.&amp;nbsp;  &lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Please explain how you advise a US merchant to comply with both SAQ-D and the GDPR standards, specifically the logging requirements of SAQ-D that seem to contradict the “Right to Erasure.”&lt;/h4&gt;
PCI DSS explicitly requires logging—which is a good thing when it comes to maintaining security, detecting attacks, etc. If you’re in the PCI realm, you should continue to use logging and thorough log management. The “right to erasure” may be a tricky GDPR requirement and tone we feel will need more legal definition and precedence to be established. However, if you foresee this being an issue for your company, you should seek corporate legal counsel.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Does SecurityMetrics offer help with GDPR for small-to-medium businesses?&lt;/h4&gt;
Yes. &lt;a href=&quot;https://www.securitymetrics.com/gdpr-defense&quot;&gt;SecurityMetrics GDPR Defense&lt;/a&gt; is a new product designed to help small-to-medium businesses secure personal data and get on the path to GDPR compliance.&lt;br /&gt;
&lt;br /&gt;
GDPR Defense contains the following tools to help fulfill certain GDPR requirements while also providing a central location to track, maintain, train, and report on those efforts:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;SecurityMetrics PIIscan: &lt;/b&gt;Scans systems and devices for unencrypted PII. Provides file path so users can easily locate, and then delete or encrypt, sensitive data.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;GDPR Checklist:&lt;/b&gt; Defines and breaks down individual GDPR requirements into simple “how to implement” steps. Checklist tracks completion dates of items and then displays that information on the GDPR Implementation Report.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Secure Cloud Storage:&lt;/b&gt; Provides secure central location for policies and procedures as well as internal data mapping documents. GDPR requires organizations to maintain policies and procedures about encryption, data retention, and data breach response. It also requires knowledge of sensitive data locations.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;GDPR Implementation Report: &lt;/b&gt;Shows evidence of efforts to reach compliance in the event of an audit or data breach. Report displays percentage of implementation completed as well as progress over time.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
What can large organizations do to comply with GDPR?&lt;/h4&gt;
If you’re part of a large organization and need help with GDPR, &lt;a href=&quot;https://www.securitymetrics.com/gdpr-defense#product-quote&quot;&gt;learn more about our consulting here.&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
If you have more questions about GDPR, or would like a &lt;a href=&quot;https://www.securitymetrics.com/pci-audit&quot;&gt;PCI audit&lt;/a&gt; or &lt;a href=&quot;https://www.securitymetrics.com/hipaa-audit&quot;&gt;HIPAA audit&lt;/a&gt;, please &lt;a href=&quot;https://www.securitymetrics.com/contact&quot;&gt;contact us&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Ben Christensen (CISA, QSA) has worked in the IT sector for over 19 years. He currently performs security assessments for merchants and service providers looking to become PCI compliant. He is also leading SecurityMetrics&#39; GDPR efforts in developing product offerings and documentation.&amp;nbsp;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://4.bp.blogspot.com/-zmJbW-y-bEI/WrwbKAo7tNI/AAAAAAAABSM/7Vknkuk8AP8bgzzwhutHyZZ5tfru4r-9QCLcBGAs/s1600/2018%2BPCI%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/4774456408947810616'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/4774456408947810616'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2018/03/gdpr-faqs.html' title='GDPR FAQs'/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-pkpTkw_Q3OI/WqlF2dAWUUI/AAAAAAAABPk/3hjESFe8Wj8tEul4ic4oSJA3OOxbS4pwACLcBGAs/s72-c/Screen%2BShot%2B2018-03-12%2Bat%2B2.03.32%2BPM.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-8633620977980960079</id><published>2018-03-06T14:32:00.003-08:00</published><updated>2019-10-31T14:52:00.500-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="2018 PANscan study"/><category scheme="http://www.blogger.com/atom/ns#" term="Credit card data"/><category scheme="http://www.blogger.com/atom/ns#" term="credit card data security"/><category scheme="http://www.blogger.com/atom/ns#" term="Credit card data storage"/><category scheme="http://www.blogger.com/atom/ns#" term="PAN"/><category scheme="http://www.blogger.com/atom/ns#" term="PANscan"/><category scheme="http://www.blogger.com/atom/ns#" term="PANscan data"/><title type='text'>2018 PANscan Results: Storage of Credit Card Data on the Rise</title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/2018-panscan-results-storage-credit-card-data-rise&#39; /&gt;
&lt;link rel=&quot;canonical&quot; href=&quot;https://www.securitymetrics.com/blog/2018-panscan-results-storage-credit-card-data-rise&quot; /&gt;

&lt;h3&gt;
See how much unencrypted card data PANscan® found on business networks in 2017.&amp;nbsp;&lt;/h3&gt;
&lt;h4&gt;
Storage of unencrypted PAN on networks is up&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://4.bp.blogspot.com/-tA30c0-BCWM/Wp8Snvqa6nI/AAAAAAAABLw/_lcS_XVgGIMqwwLjxkXJ3dc8jyje97UsACEwYBhgL/s1600/2018%2BPANscan%2Bdata_Blog.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;113&quot; src=&quot;https://4.bp.blogspot.com/-tA30c0-BCWM/Wp8Snvqa6nI/AAAAAAAABLw/_lcS_XVgGIMqwwLjxkXJ3dc8jyje97UsACEwYBhgL/s200/2018%2BPANscan%2Bdata_Blog.jpg&quot; style=&quot;display: none;&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/h4&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;a href=&quot;https://2.bp.blogspot.com/-xbkWtKS1FZc/Wp8WU5LotzI/AAAAAAAABMU/kM24P3V1l3wXUEGv19xQt397OrFNTf7rgCLcBGAs/s1600/Screen%2BShot%2B2018-03-06%2Bat%2B3.29.16%2BPM.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;186&quot; data-original-width=&quot;190&quot; src=&quot;https://2.bp.blogspot.com/-xbkWtKS1FZc/Wp8WU5LotzI/AAAAAAAABMU/kM24P3V1l3wXUEGv19xQt397OrFNTf7rgCLcBGAs/s1600/Screen%2BShot%2B2018-03-06%2Bat%2B3.29.16%2BPM.png&quot; /&gt;&lt;/a&gt;Primary account numbers (PAN) are the 14-, 15-, or 16-digit credit card numbers used to identify individual cards. If merchants unknowingly store unencrypted PAN on their networks, they may pose a big risk to their business.&lt;br /&gt;
&lt;br /&gt;
Manually searching for PAN can get tedious and overwhelming, but &lt;a href=&quot;https://www.securitymetrics.com/card-data-discovery&quot;&gt;tools like PANscan®&lt;/a&gt; are designed to search quickly and efficiently in the background without slowing down day-to-day operations.&lt;br /&gt;
&lt;br /&gt;
Since 2010, SecurityMetrics PANscan® has discovered over 1.6 billion unencrypted primary account numbers. &lt;a href=&quot;http://info.securitymetrics.com/panscan-infographic-2018&quot;&gt;Our 2018 PANscan study compiles results from PANscan® users in 2017&lt;/a&gt;. We found that&amp;nbsp; credit card data storage is up since last year and has been steadily climbing for the last few years. Remember that these results come only from users of our PANscan® tool--merchants who are already security-minded. This could mean that as a whole, businesses that handle credit card data are faring worse.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://info.securitymetrics.com/panscan-infographic-2018&quot;&gt;Download the 2018 PANscan® Data Analysis Infographic here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
The 2018 PANscan® study&lt;/h4&gt;
We found that in 2017, PANscan® searched 337,118 GBs of data and found over 114 million unencrypted card numbers as well as over 4.5 million track data (i.e., magnetic card stripe data). Sixty-nine percent of users stored unencrypted PAN, and 7% stored unencrypted track data.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://2.bp.blogspot.com/-4DUt5V0EC9k/Wp8RUy0RViI/AAAAAAAABLc/oD6IVY2VEMM8YzpRL0fpd3YQ516MGEwUQCLcBGAs/s1600/Screen%2BShot%2B2018-03-01%2Bat%2B2.38.10%2BPM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;426&quot; data-original-width=&quot;1526&quot; height=&quot;177&quot; src=&quot;https://2.bp.blogspot.com/-4DUt5V0EC9k/Wp8RUy0RViI/AAAAAAAABLc/oD6IVY2VEMM8YzpRL0fpd3YQ516MGEwUQCLcBGAs/s640/Screen%2BShot%2B2018-03-01%2Bat%2B2.38.10%2BPM.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;a href=&quot;http://blog.securitymetrics.com/2017/04/2016-PANscan-study-protect-card-data.html&quot;&gt;In 2016&lt;/a&gt;, 67% of PANscan users stored unencrypted PAN, which means credit card data storage is up 2 points since then (a 2.98% increase). Only five percent of these businesses stored track data in 2016, which means there&#39;s been a 40% increase. &lt;a href=&quot;https://www.pcisecuritystandards.org/document_library?category=pcidss&amp;amp;document=pci_dss&quot;&gt;The PCI DSS&lt;/a&gt;&amp;nbsp;requires that merchants never store track data, for any reason (Requirement 3.2).&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://4.bp.blogspot.com/-Tco19a5Qi4Y/Wp8TW3Qx1GI/AAAAAAAABL0/XffYexaUTDw8Y7PcQsVPbSBkWJYSY_wIwCLcBGAs/s1600/Screen%2BShot%2B2018-03-01%2Bat%2B2.38.25%2BPM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;301&quot; data-original-width=&quot;827&quot; height=&quot;232&quot; src=&quot;https://4.bp.blogspot.com/-Tco19a5Qi4Y/Wp8TW3Qx1GI/AAAAAAAABL0/XffYexaUTDw8Y7PcQsVPbSBkWJYSY_wIwCLcBGAs/s640/Screen%2BShot%2B2018-03-01%2Bat%2B2.38.25%2BPM.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4&gt;
Where did PANscan® find card data?&lt;/h4&gt;
There are several common places PAN data hides. Whether it’s due to poor process or misconfigured software, unencrypted credit card numbers on a network can be traced to:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Error logs&lt;/li&gt;
&lt;li&gt;Accounting departments&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Sales departments&lt;/li&gt;
&lt;li&gt;Marketing departments&lt;/li&gt;
&lt;li&gt;Customer service representatives&lt;/li&gt;
&lt;li&gt;Administrative assistants&lt;/li&gt;
&lt;/ul&gt;
&lt;a href=&quot;https://www.securitymetrics.com/card-data-discovery&quot;&gt;Learn more about PANscan®&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2018/03/whats-inside-our-2018-pci-guide.html&quot;&gt;What&#39;s Inside Our 2018 PCI Guide&lt;/a&gt;&lt;br /&gt;
&lt;h4&gt;
Protecting Customers’ Credit Card Data&lt;/h4&gt;
Keeping unencrypted data on systems is a security risk but it can also be difficult to avoid. Like we mentioned, PAN data can come from departments like marketing, accounting, sales—but it can also be unintentionally stored due to bad handling process.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a class=&quot;cta-pci&quot; href=&quot;http://bit.ly/1gk1QrK&quot; style=&quot;color: white;&quot; target=&quot;_blank&quot;&gt;Follow for more data security articles like this&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Here are seven tips to find and secure credit card data:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Interview Employees:&lt;/b&gt; Find out who has access to what card data and how each department interacts with it.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Create a card-flow diagram:&lt;/b&gt; Map out where card data enters, leaves, is stored, and interacts with/in your system.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Use a data discovery tool:&lt;/b&gt; As previously mentioned, a well-designed software tool can make a world of difference. PANscan® is designed to run light, work fast, and avoid false positives.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Remove or encrypt data:&lt;/b&gt; Protect customers’ credit card numbers by properly removing, deleting, destroying, or encrypting them.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Consider data storage:&lt;/b&gt; Rethink whether you really need to store credit card data in any form on your systems.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Limit access to data:&lt;/b&gt; Only those who absolutely need to access card data for their job should be able to.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2015/03/network-segmentation-pci-scope.html&quot;&gt;Segment your network&lt;/a&gt;: &lt;/b&gt;Separate your card data environment from other systems, using firewalls or other methods. This way you can reduce the potential for data leakage to unauthorized areas.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
For more information about &lt;a href=&quot;https://www.securitymetrics.com/pci&quot;&gt;PCI compliance&lt;/a&gt;, a&amp;nbsp;&lt;a href=&quot;https://www.securitymetrics.com/pci-audit&quot;&gt;PCI audit&lt;/a&gt;, or &lt;a href=&quot;https://www.securitymetrics.com/security-training&quot;&gt;data security&lt;/a&gt;, &lt;a href=&quot;https://www.securitymetrics.com/contact&quot;&gt;contact us here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://2.bp.blogspot.com/-zmJbW-y-bEI/WrwbKAo7tNI/AAAAAAAABSQ/Z8FEy74oP_Ag8CznKAArUXzpyiIKSfnLQCPcBGAYYCw/s1600/2018%2BPCI%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/8633620977980960079'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/8633620977980960079'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2018/03/2018-panscan-results-storage-of-credit.html' title='2018 PANscan Results: Storage of Credit Card Data on the Rise'/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-tA30c0-BCWM/Wp8Snvqa6nI/AAAAAAAABLw/_lcS_XVgGIMqwwLjxkXJ3dc8jyje97UsACEwYBhgL/s72-c/2018%2BPANscan%2Bdata_Blog.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-3058926449470805384</id><published>2018-02-28T08:51:00.003-08:00</published><updated>2018-08-14T08:32:23.940-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="business associate"/><category scheme="http://www.blogger.com/atom/ns#" term="business associate HIPAA"/><category scheme="http://www.blogger.com/atom/ns#" term="guide to hipaa compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="HIPAA"/><category scheme="http://www.blogger.com/atom/ns#" term="HIPAA compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="HIPAA guide"/><title type='text'>2018 HIPAA Guide: Highlights for Business Associates</title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/2018-hipaa-guide-highlights-business-associates&#39; /&gt;

&lt;h3&gt;
A reference for business associates using the SecurityMetrics HIPAA Guide at their organizations.&amp;nbsp;&lt;/h3&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://2.bp.blogspot.com/-VOHYVWwmefc/WpbeqURXkCI/AAAAAAAABJE/zudeSSX_GucDkKgf1NmMcmJOAPebFhEKQCLcBGAs/s1600/Highlights%2Bfor%2BBAs_Blog.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;182&quot; src=&quot;https://2.bp.blogspot.com/-VOHYVWwmefc/WpbeqURXkCI/AAAAAAAABJE/zudeSSX_GucDkKgf1NmMcmJOAPebFhEKQCLcBGAs/s320/Highlights%2Bfor%2BBAs_Blog.jpg&quot; style=&quot;display: none;&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
We released the&amp;nbsp;&lt;a href=&quot;http://info.securitymetrics.com/hipaa-guide&quot;&gt;SecurityMetrics 2018 Guide to HIPAA Compliance&lt;/a&gt;&amp;nbsp;on November 30, 2017.&lt;br /&gt;
&lt;a href=&quot;https://3.bp.blogspot.com/-rNqgJBoiAGk/Wpbd2bRIMLI/AAAAAAAABI4/Q9m4C2zIszg1DZB1T3lpAW0pOHEGvxmDwCLcBGAs/s1600/HIPAA_need%2Bto%2Bknow_Image.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;608&quot; data-original-width=&quot;568&quot; height=&quot;200&quot; src=&quot;https://3.bp.blogspot.com/-rNqgJBoiAGk/Wpbd2bRIMLI/AAAAAAAABI4/Q9m4C2zIszg1DZB1T3lpAW0pOHEGvxmDwCLcBGAs/s200/HIPAA_need%2Bto%2Bknow_Image.png&quot; width=&quot;186&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
Business associates (BA) and small entities will benefit from this desk-side HIPAA reference, especially since they may have limited resources and are often self-taught.&lt;br /&gt;
&lt;br /&gt;
Our HIPAA Guide was created to help business associates with some of the more challenging aspects of HIPAA compliance like the minimum necessary rule, secure data deletion, business associate agreements, and network segmentation.&lt;br /&gt;
&lt;br /&gt;
If you’re a BA and in charge of HIPAA, you can use the following page numbers and HIPAA Guide highlights to help guide you through your more common HIPAA concerns and challenges.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Common business associate concerns (PP. 11-12)&lt;/h4&gt;
&lt;br /&gt;
Reminder: a BA is a person or entity that performs certain functions that involve the use or disclosure of PHI (e.g., IT provider). Business associates can be from legal, actuarial, consulting, data aggregation, management, administrative, accreditation, and/or financial organizations. Some possible business associate functions include:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Claims processing or administration&lt;/li&gt;
&lt;li&gt;Data analysis, processing, or administration&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Utilization review&lt;/li&gt;
&lt;li&gt;Quality assurance&lt;/li&gt;
&lt;li&gt;Billing&lt;/li&gt;
&lt;li&gt;Benefit management&lt;/li&gt;
&lt;li&gt;Practice management&lt;/li&gt;
&lt;li&gt;Repricing&lt;/li&gt;
&lt;/ul&gt;
These are some of the most basic questions business associates face when getting HIPAA compliant:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Do Business Associates have to be HIPAA compliant?&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
When it comes to responsibility, if your organization is considered a business associate, you may think you’re exempt from HIPAA compliance, especially if you don’t consider yourself a part of the healthcare industry. However, the HHS requires any business associates that create, receive, transmit, and/or maintain protected health information (PHI) in any way must be HIPAA compliant.&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Are Business Associates responsible for patient data?&amp;nbsp;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
Business associates are legally bound to protect PHI. You must comply with all data security requirements in HIPAA and follow the Security and Breach Notification Rules (unless contractually obligated to follow the Privacy Rule). You are required to protect PHI just as a covered entity would: by means of network segmentation, secure data destruction, etc.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2014/05/hipaa-faq.html&quot;&gt;HIPAA FAQS&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Minimum necessary requirement (P. 100-102)&lt;/h4&gt;
&lt;br /&gt;
A large portion of the Privacy Rule is based on the minimum necessary requirement, which states that only those who need to see or access PHI to do their jobs should get to see or access it.&lt;br /&gt;
&lt;br /&gt;
BAs often think their covered entity holds the sole responsibility of deciding how much data they receive. This is simply not the case. Both business associates and covered entities have a minimum necessary responsibility under HIPAA.&lt;br /&gt;
&lt;br /&gt;
BAs should only accept and use the minimum amount of data necessary. Even they can face fines from HHS if they accept or demand more data than is necessary from covered entities. As a business associate, if you receive too much data from a covered entity, you are responsible for letting the covered entity know.&lt;br /&gt;
&lt;br /&gt;
Check out page 102 of the HIPAA guide to learn about instances when the minimum necessary rule does not apply.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Permanently destroy or delete PHI (PP. 21, 26-27, 105)&lt;/h4&gt;
&lt;br /&gt;
The first step to managing/deleting old data is deciding how long you need to keep it. Many states have requirements about the amount of time that you must keep patient data. This can apply to uses and disclosures and even the patient record. Entities commonly maintain data for a minimum of a decade. If a patient has passed away, there will be additional requirements for data retention that must also be considered.&lt;br /&gt;
&lt;br /&gt;
The second step is to understand how to permanently destroy or delete data. Most people understand that physical sensitive data should be destroyed permanently by shredding, burning, or pulping.&lt;br /&gt;
 But when it comes to electronic data, merely deleting or moving sensitive information to the Trash or Recycle Bin on your computer will not permanently remove it. Your computer won’t be able to find that file, but it still exists.&lt;br /&gt;
&lt;br /&gt;
The HHS has determined that for electronic PHI, overriding or clearing (i.e., using software or hardware products to overwrite media with non-sensitive data) is the best way to securely delete sensitive patient data on systems still in use.&lt;br /&gt;
&lt;br /&gt;
When thinking about how to permanently delete files from your network, don’t forget about any archived data, including:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Time Machine backups&lt;/li&gt;
&lt;li&gt;Cloud backups&lt;/li&gt;
&lt;li&gt;External hard drive backups&lt;/li&gt;
&lt;li&gt;CD or DVD backups&lt;/li&gt;
&lt;li&gt;Email backups&amp;nbsp;&lt;/li&gt;
&lt;li&gt;FTP backups&lt;/li&gt;
&lt;li&gt;Server backups&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Mirror backups&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Offsite backups&lt;/li&gt;
&lt;/ul&gt;
If media is magnetic (e.g., tapes, hard drives), it should be degaussed or demagnetized.&lt;br /&gt;
&lt;br /&gt;
But if you don’t plan to use the media again, it’s highly recommended to physically destroy it. Some third-party organizations have industrial-sized shredders to dispose of larger hardware.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Business associate agreements (PP. 110-113)&lt;/h4&gt;
&lt;br /&gt;
The HIPAA Final Omnibus Rule requires covered entities to implement or update a business associate agreement (BAA) when a BA creates, receives, maintains, and/or transmits electronic patient data.&lt;br /&gt;
&lt;br /&gt;
In these new or revised BAAs, covered entities, business associates, and subcontractors agree to share responsibility for patient data protection and breach notification. Here are a few examples of what should be included in your business associate agreement:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;A minimum necessary policy&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Business associate’s permitted use of PHI&lt;/li&gt;
&lt;li&gt;Prohibited use of PHI&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Covered entity’s responsibility&lt;/li&gt;
&lt;li&gt;Appropriate safeguards to protect PHI&lt;/li&gt;
&lt;li&gt;Breach reporting guidelines&lt;/li&gt;
&lt;li&gt;Contract termination provisions&lt;/li&gt;
&lt;/ul&gt;
Covered entities typically will not work with you if you refuse to sign a BAA or to comply with HIPAA regulations. You should know what is in the BAA you sign, and what exactly you’re liable for when it comes to protection of PHI.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2017/09/hipaa-business-associate-agreements.html&quot;&gt;Business Associate Agreements 101&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Network segmentation (PP. 12, 46-47)&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Business associates often set up large flat networks, where everything inside the network can connect to everything else. You may have one firewall at the edge of your network, but that’s it. Generally, the more places that have access to patient information, the higher the chances for a HIPAA violation or data breach.&lt;br /&gt;
&lt;br /&gt;
Network segmentation can be achieved through use of specific firewalls and the sectioning off of systems that contain or receive PHI from the rest of the network.&lt;br /&gt;
&lt;br /&gt;
Network segmentation is especially useful for you if you need to protect PHI. If done properly, it can greatly reduce time, energy, money, and potential liability related to HIPAA.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;https://www.securitymetrics.com/pii-data-discovery&quot;&gt;PIIscan Searches Systems for Unencrypted Data&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
HIPAA applies to business associates&lt;/h4&gt;
Even though as a business associate, you may not deal with patients and their data in the same exact way as covered entities, you are still required to comply with HIPAA rules and regulations.&lt;br /&gt;
&lt;br /&gt;
The &lt;a href=&quot;http://info.securitymetrics.com/hipaa-guide&quot;&gt;SecurityMetrics 2018 HIPAA Guide&lt;/a&gt; provides plenty of guidance specifically for business associates to help you keep data safe and move towards HIPAA compliance. Our ultimate goal is to empower individuals at organizations to protect patient data. We want to provide resources that educate employees at all levels about HIPAA rules and regulations.&lt;br /&gt;
&lt;br /&gt;
Have questions about &lt;a href=&quot;https://www.securitymetrics.com/security-training&quot;&gt;data security&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://www.securitymetrics.com/hipaa&quot;&gt;HIPAA compliance&lt;/a&gt;, or interested in a &lt;a href=&quot;https://www.securitymetrics.com/hipaa-audit&quot;&gt;HIPAA audit&lt;/a&gt;? &lt;a href=&quot;https://www.securitymetrics.com/contact-sales&quot;&gt;Contact us&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/hipaa-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://3.bp.blogspot.com/-3ROiSHsLoJk/WigdqVQi9jI/AAAAAAAAAWg/mZsO-dvMJak-m-rVdCoYEXTuUL_9vTa4gCPcBGAYYCw/s1600/2018%2BHIPAA%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/3058926449470805384'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/3058926449470805384'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2018/02/2018-hipaa-guide-what-business.html' title='2018 HIPAA Guide: Highlights for Business Associates'/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-VOHYVWwmefc/WpbeqURXkCI/AAAAAAAABJE/zudeSSX_GucDkKgf1NmMcmJOAPebFhEKQCLcBGAs/s72-c/Highlights%2Bfor%2BBAs_Blog.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-8837053603092532716</id><published>2018-02-20T20:28:00.001-08:00</published><updated>2018-08-15T15:47:27.480-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="card data discovery tool"/><category scheme="http://www.blogger.com/atom/ns#" term="data encryption"/><category scheme="http://www.blogger.com/atom/ns#" term="encryption"/><category scheme="http://www.blogger.com/atom/ns#" term="PII"/><category scheme="http://www.blogger.com/atom/ns#" term="piiscan"/><category scheme="http://www.blogger.com/atom/ns#" term="sensitive data discovery"/><category scheme="http://www.blogger.com/atom/ns#" term="sensitive data discovery tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Unencrypted data"/><title type='text'>PIIscan: Find and Secure Unencrypted Personal Data</title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/piiscan-find-and-secure-unencrypted-personal-data&#39; /&gt;

&lt;h3&gt;
SecurityMetrics PIIscan Helps You Comply with Security Standards and Mandates.&amp;nbsp;&lt;/h3&gt;
&lt;h4&gt;
What is PII, and why do I need to find it?&lt;/h4&gt;
Personally Identifiable Information (PII) is data kept by an organization which can be used to “distinguish or trace an individual’s identity,” &lt;a href=&quot;http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-122.pdf&quot;&gt;according to NIST&lt;/a&gt;. For example, PII could include names, birth dates, birth places, mothers’ maiden names, or social security numbers. “Linked PII” is any information that is linkable to an individual, like educational, medical, employment, or financial information.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://3.bp.blogspot.com/-vfXnZh1NOG0/WoynryNR2DI/AAAAAAAABHQ/09lziqusVqEQN04wNKnquDv3uvp1DmIagCK4BGAYYCw/s1600/PIIscan_Blog.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; display=&quot;none&quot; height=&quot;114&quot; src=&quot;https://3.bp.blogspot.com/-vfXnZh1NOG0/WoynryNR2DI/AAAAAAAABHQ/09lziqusVqEQN04wNKnquDv3uvp1DmIagCK4BGAYYCw/s200/PIIscan_Blog.jpg&quot; style=&quot;display: none;&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;Storing these types of (unencrypted) information on your systems and devices can leave your organization open to fines and make you more vulnerable to data theft.&lt;br /&gt;
&lt;br /&gt;
Organizations can manually search for PII on their systems and devices, but doing so is time-consuming, tedious, and expensive in terms of working hours.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Sensitive Data Discovery Tool: SecurityMetrics PIIscan&lt;/h4&gt;
&lt;div&gt;
PIIscan was created to help organizations quickly find and secure unencrypted PII on their systems. The data discovery tool is now widely available and helps organizations and businesses of all sizes comply with data security mandates and standards in the US and EU.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
This scanner runs light, but performs a big job. According to Product Manager Kai Whitaker, “PIIscan is designed to be quick, small, and powerful. Organizations find value and increase their security through the effective scanning that PIIscan provides.”&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;https://finance.yahoo.com/news/securitymetrics-piiscan-helps-orgs-locate-130000104.html&quot;&gt;SecurityMetrics Releases PIIscan&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4&gt;
&lt;a href=&quot;https://2.bp.blogspot.com/-1fax5gRndt0/WoysCeqUPmI/AAAAAAAABHg/zP2fzXH39wwLaUPnvcbCqjflt1KEXNGqwCLcBGAs/s1600/PIIscan_Infographic_screen%2Bshot.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;encryption, unencrypted data, data encryption, sensitive data discovery, sensitive data discovery tools&quot; border=&quot;0&quot; data-original-height=&quot;927&quot; data-original-width=&quot;627&quot; height=&quot;320&quot; src=&quot;https://2.bp.blogspot.com/-1fax5gRndt0/WoysCeqUPmI/AAAAAAAABHg/zP2fzXH39wwLaUPnvcbCqjflt1KEXNGqwCLcBGAs/s320/PIIscan_Infographic_screen%2Bshot.png&quot; title=&quot;&quot; width=&quot;216&quot; /&gt;&lt;/a&gt;
Unencrypted PII hides in unexpected places&lt;/h4&gt;
Of all the organizations that conducted first-time data discovery scans with SecurityMetrics&amp;nbsp;&lt;a href=&quot;https://www.securitymetrics.com/pii-data-discovery&quot;&gt;PIIscan&lt;/a&gt;, 61% found unencrypted PII in their networks. Many times, this sensitive data shows up in accounting, marketing, or other unexpected areas or departments.&lt;br /&gt;
&lt;br /&gt;
Caches of unencrypted PII are highly valuable to data thieves. PIIscan searches systems, hard drives, and attached storage devices for unencrypted sensitive data. If it does find unencrypted sensitive data, it provides you a path to the file location where the unencrypted information is found.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
GDPR, PCI DSS, and HIPAA&lt;/h4&gt;
If you are fulfilling the requirements of security standards and mandates like the EU’s General Data Protection Regulation (&lt;a href=&quot;https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/&quot;&gt;GDPR&lt;/a&gt;), the Payment Card Industry Data Security Standard (&lt;a href=&quot;http://info.securitymetrics.com/2017-pci-guide&quot;&gt;PCI DSS&lt;/a&gt;), or the Health Insurance Portability and Accountability Act (&lt;a href=&quot;http://info.securitymetrics.com/2018-hipaa-compliance-guide&quot;&gt;HIPAA&lt;/a&gt;), it’s important to know where PII is on your systems and whether it’s encrypted or not.&lt;br /&gt;
&lt;br /&gt;
PIIscan searches not only for PII, but also for payment card data like primary account numbers and magnetic stripe track data. PIIscan finds the following information:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://2.bp.blogspot.com/-CppA_96hzMM/Woyn4fZKsJI/AAAAAAAABHY/HIMwmsLoOZENA36AH8AcrX3OuN6QnoddwCK4BGAYYCw/s1600/PIIscan_Image.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://2.bp.blogspot.com/-CppA_96hzMM/Woyn4fZKsJI/AAAAAAAABHY/HIMwmsLoOZENA36AH8AcrX3OuN6QnoddwCK4BGAYYCw/s200/PIIscan_Image.jpg&quot; width=&quot;186&quot; /&gt;&lt;/a&gt;•&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;USA Social Security Numbers (SSN)&lt;br /&gt;
•&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;UK National Insurance Numbers (NINO)&lt;br /&gt;
•&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Canada Social Insurance Numbers (SIN)&lt;br /&gt;
•&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Australian Tax File Numbers (TFN)&lt;br /&gt;
•&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Australian Business Numbers (ABN)&lt;br /&gt;
•&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Primary account numbers (PAN)&lt;br /&gt;
•&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Magnetic stripe track data&lt;br /&gt;
•&lt;span style=&quot;white-space: pre;&quot;&gt; &lt;/span&gt;Protected Health Information (PHI)&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://blog.securitymetrics.com/2018/02/GDPR-should-I-be-worried.html&quot;&gt;SEE ALSO: GDPR 101 Part 1: Should I Be Worried?&lt;/a&gt;&lt;br /&gt;
&lt;h4&gt;
&lt;/h4&gt;
&lt;h4&gt;
More Tips to help you find and protect PII Data:&lt;/h4&gt;
&lt;br /&gt;
&lt;b&gt;1. Monitor your PII data flow&lt;/b&gt;&lt;br /&gt;
To help find PII flows you might not immediately know about, create and regularly update a PII flow diagram that tracks the processes you go through as you receive, use, store, or transmit sensitive data.&lt;br /&gt;
&lt;br /&gt;
This will help you see where PII enters and exits your organization.   Here are some areas unprotected PII may be hiding:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;&lt;a href=&quot;http://blog.securitymetrics.com/2015/09/printer-security.html&quot;&gt;Printers&lt;/a&gt; &lt;/b&gt;often store old jobs, which could include sensitive data&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Error logs&lt;/b&gt; frequently contain sensitive numbers in plaintext during a failed authentication&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Accounting and marketing&lt;/b&gt; departments may have email or paper forms with PII&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Web browser cache&lt;/b&gt; may store PII inadvertently&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;b&gt;2. Secure and Encrypt PII&lt;/b&gt;&lt;br /&gt;
When possible, avoid using and storing PII. You can also avoid storing sensitive data by using tokenization or outsourcing sensitive data handling to a third party.&lt;br /&gt;
&lt;br /&gt;
But if you do need to keep data, make sure to &lt;a href=&quot;https://www.securitymetrics.com/pii-data-discovery&quot;&gt;find and encrypt PII.&lt;/a&gt; All electronic PII that is received, stored, handled, or transmitted in your systems and work devices must be encrypted. Industry best practice would be to use AES-128, AES-256, or better.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3. Segment Your Networks&lt;/b&gt;&lt;br /&gt;
While not all mandates require network segmentation, it’s considered security best practice to keep your networks that handle sensitive data like PII separate from your other networks.&lt;br /&gt;
&lt;br /&gt;
Whether done physically or through firewall implementation, make sure systems that receive, store, handle, and transmit sensitive data are kept separate from each other. This can be done by regularly doing &quot;segmentation checks.”&lt;br /&gt;
&lt;br /&gt;
Learn more about &lt;a href=&quot;https://www.securitymetrics.com/pii-data-discovery&quot;&gt;sensitive data discovery tools&lt;/a&gt;&amp;nbsp;or call us about a &lt;a href=&quot;https://www.securitymetrics.com/pci-audit&quot;&gt;PCI audit&lt;/a&gt; or &lt;a href=&quot;https://www.securitymetrics.com/guided-hipaa&quot;&gt;HIPAA audit&lt;/a&gt; at&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://2.bp.blogspot.com/-zmJbW-y-bEI/WrwbKAo7tNI/AAAAAAAABSQ/Z8FEy74oP_Ag8CznKAArUXzpyiIKSfnLQCPcBGAYYCw/s1600/2018%2BPCI%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/8837053603092532716'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/8837053603092532716'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2018/02/piiscan-find-and-secure-unencrypted.html' title='PIIscan: Find and Secure Unencrypted Personal Data'/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://3.bp.blogspot.com/-vfXnZh1NOG0/WoynryNR2DI/AAAAAAAABHQ/09lziqusVqEQN04wNKnquDv3uvp1DmIagCK4BGAYYCw/s72-c/PIIscan_Blog.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-2476227841670103833.post-9153836977604914177</id><published>2018-02-13T13:41:00.001-08:00</published><updated>2018-08-13T14:56:46.647-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="EU GDPR"/><category scheme="http://www.blogger.com/atom/ns#" term="GDPR"/><category scheme="http://www.blogger.com/atom/ns#" term="GDPR compliance"/><category scheme="http://www.blogger.com/atom/ns#" term="what is GDPR"/><title type='text'>GDPR 101 Part 1: Should I Be Worried?</title><content type='html'>&lt;meta http-equiv=&#39;refresh&#39; content=&#39;0;URL=https://www.securitymetrics.com/blog/gdpr-101-part-1-should-i-be-worried/&#39;&gt;

&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;182&quot; src=&quot;https://2.bp.blogspot.com/-h7PFs_HSXFc/WoNVTKxwdrI/AAAAAAAABGE/F3fGzJ_zPbUP0U-klTC425H1boirxg2dQCLcBGAs/s320/GDPR%2Bpart%2B1_Blog.jpg&quot; style=&quot;display: none;&quot; width=&quot;320&quot; /&gt;
&lt;br /&gt;

&lt;h3&gt;
What you need to know now about the EU’s General Data Protection Regulation (GDPR).&amp;nbsp;&amp;nbsp;&lt;/h3&gt;

&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;a href=&quot;http://blog.securitymetrics.com/search?q=gary+glover&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1588&quot; data-original-width=&quot;1588&quot; height=&quot;100&quot; src=&quot;https://3.bp.blogspot.com/-fUmCETPmPeI/WlOd-DIR36I/AAAAAAAAAhc/AVpqWDncHf4BvuroeihFk582vnQeETSfACPcBGAYYCw/s320/Gary_Glover_blog.png&quot; width=&quot;100&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Gary Glover&lt;br /&gt;
SVP, Assessments&lt;br /&gt;
CISSP, CISA, QSA, PA-QSA&lt;a href=&quot;http://blog.securitymetrics.com/search?q=gary+glover&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
With the EU’s GDPR compliance date looming (May 25, 2018), businesses are in varying states of readiness and awareness. Many are likely wondering, should I be worried? What changes do I need to make? What does it mean to be GDPR compliant?&lt;br /&gt;
&lt;br /&gt;
This post is the first of a three-part series in which we will cover basics and requirements of the GDPR. This series is based on our recent “GDPR 101” Webinar. &lt;a href=&quot;http://info.securitymetrics.com/l/47362/2018-01-29/61shgc?utm_source=Social&amp;amp;utm_medium=Social&quot;&gt;You can watch and listen here.&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Who does the EU GDPR apply to?&lt;/h4&gt;
&lt;br /&gt;
The EU GDPR applies to any organization that handles the Personally Identifiable Information (PII) of European Union (EU) citizens--whether that organization is in America, Europe, or somewhere else in the world.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
Following GDPR guidelines will be very important for such companies or organizations. It’s also important to understand that cloud services will not be exempt from the GDPR.&lt;br /&gt;
&lt;br /&gt;
SEE ALSO: &lt;a href=&quot;http://blog.securitymetrics.com/2017/07/complying-with-gdpr-what-you-should-know.html&quot;&gt;Complying with the GDPR: What You Should Know&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
What is GDPR?&lt;/h4&gt;
&lt;br /&gt;
&lt;a href=&quot;https://2.bp.blogspot.com/-h7PFs_HSXFc/WoNVTKxwdrI/AAAAAAAABGE/F3fGzJ_zPbUP0U-klTC425H1boirxg2dQCLcBGAs/s1600/GDPR%2Bpart%2B1_Blog.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;834&quot; data-original-width=&quot;1459&quot; height=&quot;182&quot; src=&quot;https://2.bp.blogspot.com/-h7PFs_HSXFc/WoNVTKxwdrI/AAAAAAAABGE/F3fGzJ_zPbUP0U-klTC425H1boirxg2dQCLcBGAs/s320/GDPR%2Bpart%2B1_Blog.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;The GDPR replaces the &lt;a href=&quot;http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML&quot;&gt;1995 EU Data Protection Directive&lt;/a&gt;. The new GDPR legislation is meant to unite and harmonize privacy laws across the EU. Before the GDPR, different businesses throughout the EU did slightly different things for data protection.&lt;br /&gt;
&lt;br /&gt;
After four years of preparation and debate, the GDPR was approved by EU parliament on April 14, 2016. It went into effect 20 days after being approved and will be directly applicable for all member states two years later on May 25, 2018. After this date, organizations that are not following the GDPR could potentially face severe fines.&lt;br /&gt;
&lt;br /&gt;
At this time, no one can guarantee how severe fines will be, or what types of businesses may be examined for non-compliance first, but after May 25th GDPR becomes enforceable.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
GDPR Compliance&lt;/h4&gt;
&lt;br /&gt;
Some aspects of the GDPR are easy to interpret. For example, &lt;a href=&quot;https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/lawful-basis-for-processing/consent/&quot;&gt;the GDPR says&lt;/a&gt; that data owners are required to have an opt-in choice presented to them before a company can begin storing, processing or transmitting their personal information. This requirement is clear, and one could easily determine whether or not that requirement has been met.&lt;br /&gt;
&lt;br /&gt;
However, other aspects are more difficult to interpret. &lt;a href=&quot;https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/accountability-and-governance/data-protection-by-design-and-default/&quot;&gt;The GDPR states,&lt;/a&gt; “protect your data by design and default.” It’s difficult to know if you are perfectly compliant or meeting a specific GDPR requirement according to this statement.&lt;br /&gt;
&lt;br /&gt;
Even though GDPR compliance isn’t currently as well-defined as Payment Card Industry Data Security Standard (PCI DSS) compliance, it’s important to be aware, be concerned, and be reasonable. It’s impossible to say with absolute clarity that an entity is 100% compliant with GDPR, because associated testing procedures are not specifically defined. Perhaps this will come later; various supervisory authorities are working on checklists and similar guidance, which indicates that there will likely be more specific audit protocols as time goes on.&lt;br /&gt;
&lt;br /&gt;
For the time being, you can actively and carefully address GDPR regulations, document your efforts, collect your results, and show risk analysis/assessment results.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Why Should I Care about GDPR?&lt;/h4&gt;
&lt;br /&gt;
GDPR guidelines state that an entity can face fines of up to 20 million Euros or 4% of their Global Annual Turnover (AKA “revenue” in the U.S.), whichever is greater. Note that this is the maximum fine amount, and there doesn’t appear to be additional guidance to describe specific fine structure for various types of data compromise or general lack of preparation, other than the regulation stating that a fine could be less than 4%, (e.g., 2% of revenue or 10 million Euros).&lt;br /&gt;
&lt;br /&gt;
We want to reiterate that we’re not saying the sky is falling. But, you should be aware of these regulations and make plans for any necessary changes.&lt;br /&gt;
&lt;br /&gt;
Part 2 of this blog series will go into more depth on terms and definitions, but it’s important to &lt;a href=&quot;https://ico.org.uk/media/for-organisations/documents/1546/data-controllers-and-data-processors-dp-guidance.pdf&quot;&gt;understand the difference between Data Processors and Data Controllers&lt;/a&gt; and know that the GDPR rules and requirements apply to both of them:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Data Controller:&lt;/b&gt; Entities or individuals that need to process personal data in order to do business. They determine the purposes for which and the manner in which the personal data is processed.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Data Processors:&lt;/b&gt; Processors take and/or process personal data on behalf of the Controller.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;a href=&quot;https://3.bp.blogspot.com/-FHMFrh6fFQo/WoNVVjP3Z_I/AAAAAAAABGI/-RgwpWqLBesyzloeBiS2OwOA7zprIY6pQCLcBGAs/s1600/GDPR%2Bpart%2B1_Image.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;608&quot; data-original-width=&quot;568&quot; height=&quot;320&quot; src=&quot;https://3.bp.blogspot.com/-FHMFrh6fFQo/WoNVVjP3Z_I/AAAAAAAABGI/-RgwpWqLBesyzloeBiS2OwOA7zprIY6pQCLcBGAs/s320/GDPR%2Bpart%2B1_Image.jpg&quot; width=&quot;298&quot; /&gt;&lt;/a&gt;
When Do I Need to Worry about GDPR?&lt;/h4&gt;
&lt;br /&gt;
You have until May 25, 2018 to start complying with GDPR regulations. Right now, we don’t know what types of organizations the governing bodies will go after, or how aggressively. All we know is that after May 25 of this year, they can.&lt;br /&gt;
&lt;br /&gt;
If your company has poor security practices that endanger personal information, it makes sense that you could get in trouble according to these EU laws and regulations. On the other hand, if your company takes data security seriously and is actively moving towards alignment with the GDPR or other data security standards, you will naturally fair better.&lt;br /&gt;
&lt;br /&gt;
Remember, May 25, 2018 is not the end of the world. We all tend to fear the worst when a line is drawn in the sand, but someone has to draw one to get us all moving.&lt;br /&gt;
&lt;br /&gt;
As security professionals, it’s our job to help companies clear up security issues. Our experience shows that addressing security and compliance problems may take time. The community has known about this regulation for two years now, so ignoring these regulations will not make them go away. Get started soon and you will see real progress.&lt;br /&gt;
&lt;br /&gt;
Showing real progress in securing PII is important because this demonstrates you’re working towards compliance. If you were to experience a data breach but couldn’t show any proactive work towards security, enforcement of the regulation could be stricter.&lt;br /&gt;
&lt;br /&gt;
If you’re looking to learn more about the GDPR, the &lt;a href=&quot;https://ico.org.uk/&quot;&gt;Information Commissioner’s Office&lt;/a&gt; (ICO) is a UK organization that was set up to uphold information rights for UK citizens.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://blog.securitymetrics.com/2018/02/piiscan-find-and-secure-unencrypted.html&quot;&gt;SEE ALSO: PIIscan: Find and Secure Unencrypted Personal Data&lt;/a&gt;&lt;br /&gt;
&lt;h4&gt;
Part 2 of The GDPR 101 Blog Series&lt;/h4&gt;
&lt;br /&gt;
Watch for part 2 of our GDPR 101 blog series, which will cover specific terms, requirements, and details of the GDPR.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Gary Glover (CISSP, CISA, QSA, PA-QSA) is Senior VP of Security Assessments at &lt;a href=&quot;https://www.securitymetrics.com/&quot; target=&quot;_blank&quot;&gt;SecurityMetrics&lt;/a&gt; with over 10 years of &lt;a href=&quot;https://www.securitymetrics.com/pci-audit&quot; target=&quot;_blank&quot;&gt;PCI audit&lt;/a&gt; experience and 25 years of Star Wars quoting skills. May the Force be with you as you visit his other &lt;a href=&quot;http://blog.securitymetrics.com/search?q=gary+glover&quot; target=&quot;_blank&quot;&gt;blog posts&lt;/a&gt;.&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://info.securitymetrics.com/pci-guide&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;521&quot; data-original-width=&quot;1421&quot; src=&quot;https://2.bp.blogspot.com/-zmJbW-y-bEI/WrwbKAo7tNI/AAAAAAAABSQ/Z8FEy74oP_Ag8CznKAArUXzpyiIKSfnLQCPcBGAYYCw/s1600/2018%2BPCI%2BGuide%2BCTA-13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/9153836977604914177'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2476227841670103833/posts/default/9153836977604914177'/><link rel='alternate' type='text/html' href='http://blog.securitymetrics.com/2018/02/GDPR-should-I-be-worried.html' title='GDPR 101 Part 1: Should I Be Worried?'/><author><name>Anonymous</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/blank.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-h7PFs_HSXFc/WoNVTKxwdrI/AAAAAAAABGE/F3fGzJ_zPbUP0U-klTC425H1boirxg2dQCLcBGAs/s72-c/GDPR%2Bpart%2B1_Blog.jpg" height="72" width="72"/></entry></feed>