ControlScan Blog


Stay informed with the latest security + compliance updates, news and best practices.



January 25, 2016Published by

Whether it is PAN data (credit card numbers), ePHI, PII or intellectual property, the rationale is all the same; disclosing any sensitive data can be a nightmare for your company or product’s future. This post, however, is focused on cardholder data, because businesses with POS environments are the most commonly breached entities that exist and quite frankly, their average security posture is pretty low.

  Read More   


January 17, 2016Published by

Today’s IT professional is faced with managing a traditional network infrastructure while executing strategies to take advantage of emerging technologies like cloud services, mobile applications and Internet of Things (IoT) components. This evolving, complex, connected environment creates new points of vulnerability, challenging IT leaders to invest in human and technological resources.

  Read More   


January 7, 2016Published by

For many the New Year represents a fresh start, but when it comes to information security, 2016 is expected to be more of an evolution than a revolution. Nowhere is this more true than in the payments space, which continues to grapple with cybercrime and fraud in the midst of technology innovation.

  Read More   


November 25, 2015Published by

Social engineers play to people’s wants and needs, focusing on the mental triggers that can make a person do something. Learn what you can do to combat it.

  Read More   


November 9, 2015Published by

Today’s unprecedented breach activity—and the high costs breached companies are paying as a result—are causing executive teams to sit up and take notice. Those responsible for organizational IT are finding themselves under increasing pressure to reinforce and report on a strong security posture to stakeholders.

  Read More   


October 23, 2015Published by

Phishing remains a top organizational security vulnerability because it involves the exploitation of human weakness. If you have humans at your workplace—and we all do!—then you are at risk.

  Read More   


September 22, 2015Published by


It’s getting harder and harder to hire people that understand and can evolve with the growing security threat, so for a business what do I select as the technology and then how do I staff appropriately in order to make it all work together. Watch this short video to learn the truth behind security and compliance.

  Read More   


July 15, 2015Published by

You likely couldn’t escape the news that today, July 15, is Amazon Prime Day. But did you know that today is significant for another, more business critical reason? As of today—July 15, 2015—Microsoft no longer supports the Windows Server 2003 operating system. Yes, it’s a big deal.

  Read More   


July 1, 2015Published by

You may have heard that EMV is a safer technology, which is why the banks and card brands want you to use it. So why would I say that EMV is not a security technology?

  Read More   


June 25, 2015Published by

Last week’s news that the popular password manager LastPass had been breached sent many of its users into a panic, rushing to change their “master passwords.” The reality of the situation is, however, that the stolen master password data was well hashed, making it essentially useless to those on the outside. So there’s absolutely no worry then, right? Wrong.

  Read More   


May 21, 2015Published by

In the quick serve and fast casual restaurant space, the technologies we choose to adopt are often driven by customer demand, the need to curtail the rising cost of doing business and the Internet of Things (IoT) explosion.

  Read More   


April 15, 2015Published by

Many businesses are using outdated SSL and TLS versions as a security control because the software they’re running still supports it. But experts warn that these protocol versions, including SSL 2.0, SSL 3.0 and TLS 1.0, are no longer secure and therefore require action on the business’s part.

  Read More