ControlScan Blog


Stay informed with the latest security + compliance updates, news and best practices.



November 15, 2016Published by

Third party relationships make your life easier in a multitude of ways, from streamlining processes, to providing additional human resources, to ensuring operational efficiency. Unfortunately, these relationships also introduce increased business risk related to data security and compliance.If one or more of your third party vendors doesn’t maintain a strong security posture and is consequently compromised, your business could very well end up sharing the burden of recovery. Read this ControlScan blog post for three steps you can take to lessen your business’s third party risk.

  Read More   


July 12, 2016Published by

Event log monitoring—or keeping an eye on your system logs for security and compliance purposes—can be a challenge. Here at ControlScan we see businesses and their IT teams struggling with its implementation and/or maintenance just about every day.

  Read More   


June 6, 2016Published by

Have you been told your organization needs to comply with certain information privacy and/or security standards, such as PCI, HIPAA, etc.? If so, you may find yourself quickly overwhelmed with all the requirements for bringing people, processes and technology into “compliance.” Yes, compliance can suck.

  Read More   


May 20, 2016Published by

Your Company is Under AttackYour company’s networks are being probed, prodded and attacked countless times every day. Unless you’re watching your logs, you’re likely unaware all this activity is taking place. Awareness, being a critical element of an effective defense, is important to cultivate and nurture.The Science Behind the “Pen Test”How do you gain insight […]

  Read More   


May 2, 2016Published by

Split Decisions Cost Big BucksOne of the worst things that can happen to a convenience store manager is their cooler shutting down without their knowledge. Beer gets warm and food spoils, translating into hundreds of dollars lost.But what’s worse than a cooler shutting down? A firewall “shutdown.”Let’s assume a third party comes in to implement […]

  Read More   


March 30, 2016Published by

Do you REALLY know where you stand with compliance and security? Are you faced with the dilemma of digging more deeply into your IT security and compliance posture or simply assuming it’s handled because your providers say they’re PCI compliant? Many online retailers really don’t understand exactly where a provider’s coverage stops and where theirs starts…and […]

  Read More   


January 25, 2016Published by

Whether it is PAN data (credit card numbers), ePHI, PII or intellectual property, the rationale is all the same; disclosing any sensitive data can be a nightmare for your company or product’s future. This post, however, is focused on cardholder data, because businesses with POS environments are the most commonly breached entities that exist and quite frankly, their average security posture is pretty low.

  Read More   


January 17, 2016Published by

Today’s IT professional is faced with managing a traditional network infrastructure while executing strategies to take advantage of emerging technologies like cloud services, mobile applications and Internet of Things (IoT) components. This evolving, complex, connected environment creates new points of vulnerability, challenging IT leaders to invest in human and technological resources.

  Read More   


January 7, 2016Published by

For many the New Year represents a fresh start, but when it comes to information security, 2016 is expected to be more of an evolution than a revolution. Nowhere is this more true than in the payments space, which continues to grapple with cybercrime and fraud in the midst of technology innovation.

  Read More   


November 25, 2015Published by

Social engineers play to people’s wants and needs, focusing on the mental triggers that can make a person do something. Learn what you can do to combat it.

  Read More   


November 9, 2015Published by

Today’s unprecedented breach activity—and the high costs breached companies are paying as a result—are causing executive teams to sit up and take notice. Those responsible for organizational IT are finding themselves under increasing pressure to reinforce and report on a strong security posture to stakeholders.

  Read More