ControlScan Blog


Stay informed with the latest security + compliance updates, news and best practices.



July 24, 2017Published by

The ability to devalue credit card data has made point-to-point encryption (P2PE) technology a hot topic among franchisors. And what’s not to love? With a PCI P2PE solution in place, your franchise can check off that PCI compliance box as well as rest assured that your payment transactions are safe and secure.But is securing your credit card transactions between the POS and the payment processor all your business should worry about? Does implementing P2PE make every other security technology irrelevant to your business?

  Read More   


May 20, 2016Published by

Your Company is Under Attack Your company’s networks are being probed, prodded and attacked countless times every day. Unless you’re watching your logs, you’re likely unaware all this activity is taking place. Awareness, being a critical element of an effective defense, is important to cultivate and nurture. The Science Behind the “Pen Test” How do […]

  Read More   


November 18, 2015Published by


Moving infrastructure and applications to the cloud enables a whole new level of connectedness for your organization and customers. Its accessibility and on-demand scalability make it an ideal platform for many evolving businesses. But, because it changes much of what we know about the traditional IT environment, there are some very real risks involved—even if hosting with a major service provider. Learn more about balancing the risk and reward of going to the cloud.

  Read More   


July 1, 2015Published by

You may have heard that EMV is a safer technology, which is why the banks and card brands want you to use it. So why would I say that EMV is not a security technology?

  Read More   


May 21, 2015Published by

In the quick serve and fast casual restaurant space, the technologies we choose to adopt are often driven by customer demand, the need to curtail the rising cost of doing business and the Internet of Things (IoT) explosion.

  Read More   


April 17, 2015Published by

Earlier this year, information began to filter out to SMBs regarding America’s shift to EMV payment technology. Unfortunately, you may have found these communications left you with more questions than answers. While it may be confusing, your business’s shift to EMV is essential to its long-term success.

  Read More   


February 4, 2015Published by

The rapid growth and infusion of the Internet of Things (IoT) in everyday life has correspondingly seeped into the workings of everyday business. Security cameras, energy management systems, digital menu boards, kiosks, LED light bulbs, thermostats, medical devices, etc., are examples of Internet-connected components that, when connected to a business network, become points of vulnerability (PoVs) and therefore must be securely managed.

  Read More   


December 12, 2014Published by

It’s a Tuesday afternoon and the lunch rush is in full swing at your store. Customers form four neat rows at the counter and a line of cars partially encircles the building, inching forward as your drive-through staff scrambles to fulfill each order. You are making the rounds between kitchen and counter, ensuring that all stations are running like clockwork.

  Read More