November 15, 2016 •
Third party relationships make your life easier in a multitude of ways, from streamlining processes, to providing additional human resources, to ensuring operational efficiency. Unfortunately, these relationships also introduce increased business risk related to data security and compliance.If one or more of your third party vendors doesn’t maintain a strong security posture and is consequently compromised, your business could very well end up sharing the burden of recovery. Read this ControlScan blog post for three steps you can take to lessen your business’s third party risk.
Internet of Things • Network Security • PCI Compliance
July 12, 2016 •
Event log monitoring—or keeping an eye on your system logs for security and compliance purposes—can be a challenge. Here at ControlScan we see businesses and their IT teams struggling with its implementation and/or maintenance just about every day.
Internet of Things • Network Security • Point of Sale
June 6, 2016 •
Have you been told your organization needs to comply with certain information privacy and/or security standards, such as PCI, HIPAA, etc.? If so, you may find yourself quickly overwhelmed with all the requirements for bringing people, processes and technology into “compliance.” Yes, compliance can suck.
Firewalls • Network Security • Security Awareness
May 20, 2016 •
Your Company is Under AttackYour company’s networks are being probed, prodded and attacked countless times every day. Unless you’re watching your logs, you’re likely unaware all this activity is taking place. Awareness, being a critical element of an effective defense, is important to cultivate and nurture.The Science Behind the “Pen Test”How do you gain insight […]
Network Security • Physical Security • Security Awareness
May 2, 2016 •
Split Decisions Cost Big BucksOne of the worst things that can happen to a convenience store manager is their cooler shutting down without their knowledge. Beer gets warm and food spoils, translating into hundreds of dollars lost.But what’s worse than a cooler shutting down? A firewall “shutdown.”Let’s assume a third party comes in to implement […]
Firewalls • Internet of Things • Vulnerability Management
March 30, 2016 •
Do you REALLY know where you stand with compliance and security? Are you faced with the dilemma of digging more deeply into your IT security and compliance posture or simply assuming it’s handled because your providers say they’re PCI compliant? Many online retailers really don’t understand exactly where a provider’s coverage stops and where theirs starts…and […]
Security Awareness • Website Security
January 25, 2016 •
Whether it is PAN data (credit card numbers), ePHI, PII or intellectual property, the rationale is all the same; disclosing any sensitive data can be a nightmare for your company or product’s future. This post, however, is focused on cardholder data, because businesses with POS environments are the most commonly breached entities that exist and quite frankly, their average security posture is pretty low.
Encryption • Point of Sale
January 17, 2016 •
Today’s IT professional is faced with managing a traditional network infrastructure while executing strategies to take advantage of emerging technologies like cloud services, mobile applications and Internet of Things (IoT) components. This evolving, complex, connected environment creates new points of vulnerability, challenging IT leaders to invest in human and technological resources.
Cloud Security • Network Security • Vulnerability Management
January 7, 2016 •
For many the New Year represents a fresh start, but when it comes to information security, 2016 is expected to be more of an evolution than a revolution. Nowhere is this more true than in the payments space, which continues to grapple with cybercrime and fraud in the midst of technology innovation.
EMV • Point of Sale
November 25, 2015 •
Social engineers play to people’s wants and needs, focusing on the mental triggers that can make a person do something. Learn what you can do to combat it.
Security Awareness • Social Engineering
November 9, 2015 •
Today’s unprecedented breach activity—and the high costs breached companies are paying as a result—are causing executive teams to sit up and take notice. Those responsible for organizational IT are finding themselves under increasing pressure to reinforce and report on a strong security posture to stakeholders.
Network Security • Security Awareness • Vulnerability Management