ControlScan Blog


Posts Tagged: Firewalls



October 23, 2017Published by

Last week, it was announced that the Wi-Fi security protocol WPA2 has a serious flaw. WPA2 is the current encryption standard; there is nothing generally available that’s known to be more secure.Wi-Fi has become a necessity for businesses everywhere, so disconnecting and waiting for a solution to the current Wi-Fi security flaw isn’t an option. The answer lies in a layered approach to your security efforts.

  Read More   


July 24, 2017Published by

The ability to devalue credit card data has made point-to-point encryption (P2PE) technology a hot topic among franchisors. And what’s not to love? With a PCI P2PE solution in place, your franchise can check off that PCI compliance box as well as rest assured that your payment transactions are safe and secure.But is securing your credit card transactions between the POS and the payment processor all your business should worry about? Does implementing P2PE make every other security technology irrelevant to your business?

  Read More   


September 30, 2016Published by

Cybersecurity Unknowns: It’s not the “who” but the “what.” When you stop and think about your business’s IT security, do you often wonder who the unnamed faces are behind the relentless barrage of cyber attacks out there? Everyone has an opinion: “Government target—must be a nation-state” or “Little guy—must be a disgruntled ex-employee.” Our assumptions, […]

  Read More   


June 6, 2016Published by

Have you been told your organization needs to comply with certain information privacy and/or security standards, such as PCI, HIPAA, etc.? If so, you may find yourself quickly overwhelmed with all the requirements for bringing people, processes and technology into “compliance.” Yes, compliance can suck.

  Read More   


May 2, 2016Published by

Split Decisions Cost Big BucksOne of the worst things that can happen to a convenience store manager is their cooler shutting down without their knowledge. Beer gets warm and food spoils, translating into hundreds of dollars lost.But what’s worse than a cooler shutting down? A firewall “shutdown.”Let’s assume a third party comes in to implement […]

  Read More   


September 28, 2015Published by


Omnipresent data is presenting major challenges for today’s CIOs. The constant evolution of data-driven business practices requires the appropriate checks and balances throughout the entire organization and across every channel.

  Read More   


September 22, 2015Published by


It’s getting harder and harder to hire people that understand and can evolve with the growing security threat, so for a business what do I select as the technology and then how do I staff appropriately in order to make it all work together. Watch this short video to learn the truth behind security and compliance.

  Read More   


July 15, 2015Published by

You likely couldn’t escape the news that today, July 15, is Amazon Prime Day. But did you know that today is significant for another, more business critical reason? As of today—July 15, 2015—Microsoft no longer supports the Windows Server 2003 operating system. Yes, it’s a big deal.

  Read More   


December 12, 2014Published by

It’s a Tuesday afternoon and the lunch rush is in full swing at your store. Customers form four neat rows at the counter and a line of cars partially encircles the building, inching forward as your drive-through staff scrambles to fulfill each order. You are making the rounds between kitchen and counter, ensuring that all stations are running like clockwork.

  Read More   


December 2, 2014Published by

Last week, Inc.com featured a great piece by Electronic Transactions Association CEO Jason Oxman. “A Cybersecurity Checklist for Online Retailers” lists important steps online startups and small businesses can take to protect sensitive data. As the U.S. migrates to EMV (i.e., chip cards), it is expected that fraud activity in the world of ecommerce will increase significantly.

  Read More   


November 20, 2014Published by

If 2014 will be remembered as the “year of the breach,” then 2015 is shaping up nicely to become the “year of the Service Provider.” Two especially high-profile breaches—Target and Home Depot—both originated with the theft of network credentials from third party vendors. You may be working hard to protect your network, but are your service providers?

  Read More   


October 26, 2014Published by

In today’s SMB organizations, IT managers have an overwhelming number of competing priorities. Strategic initiatives to improve the customer experience vie with mission-critical activities such as ensuring maximum operational uptime and efficiency, deploying system upgrades and updates, and executing new technology strategies aimed at building the business. Yet cyber criminals don’t discriminate among those they target; businesses of all sizes are under a constant barrage of attacks from malware, Trojans and viruses.

  Read More   


October 24, 2014Published by

The best way to truly strengthen your business’s security posture is to have a sober understanding of your risk and then meet that understanding with practical steps to protect your business against data thieves. With that in mind, here are 5 best practices you can begin implementing today.

  Read More