ControlScan Blog


Stay informed with the latest security + compliance updates, news and best practices.



October 27, 2020Published by

I’d like you to think about something: What, in your mind, is going to be the next mass exploitation of cardholder data affecting the secure e-commerce of small and medium online retailers? What simple mistake or mistakes are being consistently made by these retailers that will lead to the next rash of mass theft of credit card data? We’ve actually just seen a sign of the coming attacks.

  Read More   


October 16, 2020Published by

Over the last few years, organizational board members have taken an increasing interest in cybersecurity as a financial risk. If you think about it, this makes sense because securing your company’s data stops the bleed of shareholder value. The value of data is changing, so the level of protection you need to apply is changing. Companies are looking at these things to maintain their brand and viability.

  Read More   


September 21, 2020Published by

Early on in my security career, while studying for my CISSP certification, the author of the book I was reading presented a concept of how to treat risk once it is known. Management has the choice of treating, accepting, deferring, or denying the risks that are found or identified. While most all security frameworks require […]

  Read More   


September 17, 2020Published by

This week was an exciting one for us here at ControlScan, because we officially announced the general availability of ControlScan MDR Essential. A new tier of our Managed Detection and Response (MDR) product suite, MDR Essential is aimed at cost-conscious small and mid-sized businesses (SMBs) and the channel partners that serve them.

  Read More   


September 8, 2020Published by

As we refine our remote work arrangements, our arsenal of communication devices—and our digital footprint—grows. Unfortunately, all these communication tools create additional IT vulnerabilities and make our businesses a more prominent target for cyber attackers to exploit. In this post I’ll share common ways in which an attacker bypasses network, software and physical controls in today’s extended workplace environment.

  Read More   


September 2, 2020Published by

Who would have ever thought that in 2020, we would have had to execute a disaster recovery plan because of a pandemic on an international scale? I am sure most organizations planned for the technology aspect of an outage as well as the ability to meet SLAs and recovery point expectations. But did you plan for the loss of your staff?

  Read More   


August 18, 2020Published by

Any parent with more than one child understands that maturity does not necessarily have a direct relationship with age. Every person is unique in their maturation process and matures at their own pace. (And anyone with teen and pre-teen boys may be asking, “What is maturity and how can my boys get some?”) The same can be applied to your business.

  Read More   


August 14, 2020Published by

I must admit that when I sat down to write this blog post I felt a bit silly writing out the title “The Million Dollar Laptop.” This is not a post about a wildly overpriced and new, barely changed, or updated piece of tech that Apple is releasing, or some exorbitant gaming laptop that you are hoping to purchase to play Fortnite or Minecraft. No, this is about the simple neglect of a lost device. Neglect that cost a healthcare organization $1,040,000.00.

  Read More