ControlScan
ControlScan
Blog Post
  • When they’re successful, phishing attempts can have a significant impact on you personally, as well as on your workplace. They begin innocently enough—a seemingly legitimate DocuSign request or email from a friend—but they can quickly turn your world upside down. Avoid becoming a victim of phishing by following these 3 best practices. The post Phishing Attempts: Increasingly Prevalent and Sophisti...

ControlScan
ControlScan
SlideShare Presentation
  • Firewall management is an ongoing process that requires IT security expertise, because having a poorly implemented or improperly configured firewall is like not having a firewall at all. And, with businesses introducing new technology and processes over time, continued monitoring and management is critical. If your organization doesn’t have an in-house employee with security-specific knowledge, ...

ControlScan
ControlScan
SlideShare Presentation
  • This healthcare data security webinar covers how log monitoring supports HIPAA compliance and ePHI protection. Healthcare security and compliance experts from ControlScan and LogRhythm discuss how to continuously refine and mature your security strategy while remaining agile enough to respond to the unexpected as the threat landscape continues to change and evolve. Presenters: Steve Robb (@sr...

ControlScan
ControlScan
SlideShare Presentation
  • New technologies offer businesses opportunities to differentiate, create a unique customer experience, and make step change improvements in performance. Unfortunately, adoption continues to outpace the ability to maintain security best practices, thereby creating gaps that are being exploited by innovative cyber attackers. Security as a Service (SECaaS) offers an opportunity to strategically appl...

ControlScan
ControlScan
Blog Post
  • See why Food Giant's 110-store supermarket chain partners with ControlScan.  Watch this ControlScan video to hear Brent Benton, Director of IT for Food Giant Supermarkets, describe his day-to-day activities and the benefits he sees in utilizing PaySafe UTM managed firewall and PCI 1-2-3 managed compliance services from ControlScan.  ControlScan Customer Testimonial: Food Giant Supermarkets Learn [...

ControlScan
ControlScan
Blog Post
  • On October 5th, 1953, the New York Yankees became the only team in baseball history to win five championships in a row. Today I’m pleased to tell you that ControlScan has passed the PCI Approved Scanning Vendor (ASV) revalidation test, also for the fifth consecutive year! This was no easy feat. Read on to learn how we did it. The post ASV Revalidation and the ’53 Yankees appeared first on Control...

ControlScan
ControlScan
Blog Post
  • Last week, it was announced that the Wi-Fi security protocol WPA2 has a serious flaw. WPA2 is the current encryption standard; there is nothing generally available that’s known to be more secure. Wi-Fi has become a necessity for businesses everywhere, so disconnecting and waiting for a solution to the current Wi-Fi security flaw isn’t an option. The answer lies in a layered approach to your securi...

ControlScan
ControlScan
Blog Post
  • What happens when a small business experiences a credit card data breach?  Watch this ControlScan video to hear Carla describe the POS security mistake that led her restaurant to lose more than $100,000 to a small business data breach. Small business owners will find Carla's experience and advice invaluable in helping them avoid what she […] The post The Anatomy of a Small Business Data Breach app...

ControlScan
ControlScan
Blog Post
  • Security threat management is an increasingly complex puzzle. According to the 2017 Threat Monitoring, Detection and Response Report, 62% of IT security professionals say their biggest cybersecurity challenge is detecting advanced threats.  Security threat management is an increasingly complex puzzle of people, processes and technology. How can your team overcome this challenge and stop cyber […] ...

ControlScan
ControlScan
Blog Post
  • These days many organizations do not feel confident about their ability prevent a data breach, mainly because they feel they can’t trust the humans working for them. And for good reason! Cyber criminals continue to exploit the human element, which was blamed for over 400 reported data breaches and 7.6 million+ compromised records in 2016. Regardless of whether the employee is knowingly part of a m...

ControlScan
ControlScan
Blog Post
  • I’ve been an information security assessor (PCI, HIPAA, ISO, etc.) for a long time and it’s always interesting to find out why a company has brought me in to do an assessment. Is the goal to shore up their existing security environment, or just check a compliance box to make one of their clients or vendors happy? The answer to that question will usually determine the assessment’s success. The pos...

ControlScan
ControlScan
Blog Post
  •  Are Organizations Prepared Against Today's Advanced Cybersecurity Threats? Download your free copy of this timely research report. Information security teams worldwide are increasingly concerned about the rapid growth of cyber threats. To address this concern and provide peer insights, Crowd Research Partners and ControlScan, in partnership with the 370,000+ member Information Security Community ...

ControlScan
ControlScan
Blog Post
  • The ability to devalue credit card data has made point-to-point encryption (P2PE) technology a hot topic among franchisors. And what’s not to love? With a PCI P2PE solution in place, your franchise can check off that PCI compliance box as well as rest assured that your payment transactions are safe and secure. But is securing your credit card transactions between the POS and the payment processor ...

ControlScan
ControlScan
Blog Post
  • Payment card data security isn’t a new concept, yet businesses everywhere still can’t get it right. The payment card industry has a growing body of standards, merchants and technology providers strive to follow them, and consumers continue to demand them. But payment card data breaches still happen. Regularly. Why? It's time we upped the ante on our efforts to help merchants protect themselves. Th...

ControlScan
ControlScan
Blog Post
  • Penetration Tests and Vulnerability Scans: Know the important differences. Penetration testing and vulnerability scanning are both required by the Payment Card Industry Data Security Standard (PCI DSS), but there is often confusion about the differences between the two services. This document offers clarification on how to differentiate between penetration tests and vulnerability scans. Vulnerabil...

ControlScan
ControlScan
Blog Post
  • Looking for managed security services ROI? A key value of any reputable Managed Security Service Provider (MSSP) is its ability to maintain a team of security professionals possessing an array of credentials and experience in the various aspects of protecting your business. The ControlScan Managed Security Services ROI infographic is an example of savings over […] The post The ROI of an MSSP appea...

ControlScan
ControlScan
Blog Post
  • What's the difference between an MSP and an MSSP? A Managed Service Provider (MSP) ensures your IT systems are operational, but a Managed Security Service Provider (MSSP) offers true security as a service, ensuring your people and systems are safe, secure and compliant. The ControlScan MSP versus MSSP infographic depicts the differences between the two […] The post MSP versus MSSP: Like Apples & O...

ControlScan
ControlScan
Blog Post
  • Tiny Effort, Enormous Results: How to Successfully Partner with an IT Managed Security Service Provider Today, many small and mid-sized businesses are operating with lean IT staffing and insufficient cybersecurity expertise. To fully protect their businesses from cybercrime, IT leaders are now looking to the Managed Security Service Provider to save the day. But reaping […] The post Tiny Effort, E...

ControlScan
ControlScan
Page Metadata Update

New page title detected.

  • New: The IT security perimeter is changing. As an IT security assessment professional, my job is to look at companies’ data security zones and their network perimeter compliance. I am looking at the normal stuff: Firewalls, servers and hardening standards as required by PCI, HIPAA, ISO 27001, etc.  Without properly implemented and maintained security technologies in place, it’s impossible to protect your perimeter from compromise. But are you truly clear on what that perimeter is? The fact is, the traditional IT security perimeter has been replaced by an ever-changing landscape of mobile devices. IT mobility requires a whole new viewpoint. Mobile devices have expanded the IT security perimeter, making it necessary to redefine how network security is scoped and reviewed. As an example, employees utilize smart phones and tablets that have access to company email; there are apps on these devices that allow access to a secure portal where sensitive company information is stored; and who kn
ControlScan
ControlScan
Page Metadata Update

New page title detected.

  • New: The IT security perimeter is changing. As an IT security assessment professional, my job is to look at companies’ data security zones and their network perimeter compliance. I am looking at the normal stuff: Firewalls, servers and hardening standards as required by PCI, HIPAA, ISO 27001, etc.  Without properly implemented and maintained security technologies in place, it’s impossible to protect your perimeter from compromise. But are you truly clear on what that perimeter is? The fact is, the traditional IT security perimeter has been replaced by an ever-changing landscape of mobile devices. IT mobility requires a whole new viewpoint. Mobile devices have expanded the IT security perimeter, making it necessary to redefine how network security is scoped and reviewed. As an example, employees utilize smart phones and tablets that have access to company email; there are apps on these devices that allow access to a secure portal where sensitive company information is stored; and who kn
ControlScan
ControlScan
Page Metadata Update

New page title detected.

  • New: The IT security perimeter is changing. As an IT security assessment professional, my job is to look at companies’ data security zones and their network perimeter compliance. I am looking at the normal stuff: Firewalls, servers and hardening standards as required by PCI, HIPAA, ISO 27001, etc.  Without properly implemented and maintained security technologies in place, it’s impossible to protect your perimeter from compromise. But are you truly clear on what that perimeter is? The fact is, the traditional IT security perimeter has been replaced by an ever-changing landscape of mobile devices. IT mobility requires a whole new viewpoint. Mobile devices have expanded the IT security perimeter, making it necessary to redefine how network security is scoped and reviewed. As an example, employees utilize smart phones and tablets that have access to company email; there are apps on these devices that allow access to a secure portal where sensitive company information is stored; and who kn
ControlScan
ControlScan
Page Metadata Update

New page title detected.

  • New: The IT security perimeter is changing. As an IT security assessment professional, my job is to look at companies’ data security zones and their network perimeter compliance. I am looking at the normal stuff: Firewalls, servers and hardening standards as required by PCI, HIPAA, ISO 27001, etc.  Without properly implemented and maintained security technologies in place, it’s impossible to protect your perimeter from compromise. But are you truly clear on what that perimeter is? The fact is, the traditional IT security perimeter has been replaced by an ever-changing landscape of mobile devices. IT mobility requires a whole new viewpoint. Mobile devices have expanded the IT security perimeter, making it necessary to redefine how network security is scoped and reviewed. As an example, employees utilize smart phones and tablets that have access to company email; there are apps on these devices that allow access to a secure portal where sensitive company information is stored; and who kn
ControlScan
ControlScan
Page Metadata Update

New page title detected.

  • New: The IT security perimeter is changing. As an IT security assessment professional, my job is to look at companies’ data security zones and their network perimeter compliance. I am looking at the normal stuff: Firewalls, servers and hardening standards as required by PCI, HIPAA, ISO 27001, etc.  Without properly implemented and maintained security technologies in place, it’s impossible to protect your perimeter from compromise. But are you truly clear on what that perimeter is? The fact is, the traditional IT security perimeter has been replaced by an ever-changing landscape of mobile devices. IT mobility requires a whole new viewpoint. Mobile devices have expanded the IT security perimeter, making it necessary to redefine how network security is scoped and reviewed. As an example, employees utilize smart phones and tablets that have access to company email; there are apps on these devices that allow access to a secure portal where sensitive company information is stored; and who kn
ControlScan
ControlScan
Page Metadata Update

New page title detected.

  • New: The IT security perimeter is changing. As an IT security assessment professional, my job is to look at companies’ data security zones and their network perimeter compliance. I am looking at the normal stuff: Firewalls, servers and hardening standards as required by PCI, HIPAA, ISO 27001, etc.  Without properly implemented and maintained security technologies in place, it’s impossible to protect your perimeter from compromise. But are you truly clear on what that perimeter is? The fact is, the traditional IT security perimeter has been replaced by an ever-changing landscape of mobile devices. IT mobility requires a whole new viewpoint. Mobile devices have expanded the IT security perimeter, making it necessary to redefine how network security is scoped and reviewed. As an example, employees utilize smart phones and tablets that have access to company email; there are apps on these devices that allow access to a secure portal where sensitive company information is stored; and who kn
ControlScan
ControlScan
Page Metadata Update

New page title detected.

  • New: The IT security perimeter is changing. As an IT security assessment professional, my job is to look at companies’ data security zones and their network perimeter compliance. I am looking at the normal stuff: Firewalls, servers and hardening standards as required by PCI, HIPAA, ISO 27001, etc.  Without properly implemented and maintained security technologies in place, it’s impossible to protect your perimeter from compromise. But are you truly clear on what that perimeter is? The fact is, the traditional IT security perimeter has been replaced by an ever-changing landscape of mobile devices. IT mobility requires a whole new viewpoint. Mobile devices have expanded the IT security perimeter, making it necessary to redefine how network security is scoped and reviewed. As an example, employees utilize smart phones and tablets that have access to company email; there are apps on these devices that allow access to a secure portal where sensitive company information is stored; and who kn

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.