ControlScan Blog


Posts Tagged: Internet of Things



November 15, 2016Published by

Third party relationships make your life easier in a multitude of ways, from streamlining processes, to providing additional human resources, to ensuring operational efficiency. Unfortunately, these relationships also introduce increased business risk related to data security and compliance.If one or more of your third party vendors doesn’t maintain a strong security posture and is consequently compromised, your business could very well end up sharing the burden of recovery. Read this ControlScan blog post for three steps you can take to lessen your business’s third party risk.

  Read More   


July 12, 2016Published by

Event log monitoring—or keeping an eye on your system logs for security and compliance purposes—can be a challenge. Here at ControlScan we see businesses and their IT teams struggling with its implementation and/or maintenance just about every day.

  Read More   


        Featured        

June 3, 2016Published by

2015 became known as “the year of the healthcare breach,” with healthcare hit hard and representing over 39 percent of known breach events. Healthcare organizations of every size are realizing they can no longer afford to ignore the risks they are exposed to on a daily basis. It’s critical that today’s healthcare organizations protect patient […]

  Read More   


May 2, 2016Published by

Split Decisions Cost Big Bucks One of the worst things that can happen to a convenience store manager is their cooler shutting down without their knowledge. Beer gets warm and food spoils, translating into hundreds of dollars lost. But what’s worse than a cooler shutting down? A firewall “shutdown.” Let’s assume a third party comes […]

  Read More   


April 4, 2016Published by

The healthcare industry has become the focus of intentional, targeted attacks. The healthcare data security threat landscape, once characterized by insider carelessness and petty theft, has turned much darker. Healthcare IT professionals have found it difficult to keep up with the broadening attack vectors. It’s no surprise, given the depth and breadth of the typical […]

  Read More   


January 18, 2016Published by

Buzz is growing about a new HTTP coming to market. This new version of Hypertext Transfer Protocol, HTTP/2, is attracting much fanfare because it promises greater speed and efficiency. The Internet isn’t “broken,” so why fix it?

  Read More   


November 18, 2015Published by


Moving infrastructure and applications to the cloud enables a whole new level of connectedness for your organization and customers. Its accessibility and on-demand scalability make it an ideal platform for many evolving businesses. But, because it changes much of what we know about the traditional IT environment, there are some very real risks involved—even if hosting with a major service provider. Learn more about balancing the risk and reward of going to the cloud.

  Read More   


May 21, 2015Published by

In the quick serve and fast casual restaurant space, the technologies we choose to adopt are often driven by customer demand, the need to curtail the rising cost of doing business and the Internet of Things (IoT) explosion.

  Read More   


February 4, 2015Published by

The rapid growth and infusion of the Internet of Things (IoT) in everyday life has correspondingly seeped into the workings of everyday business. Security cameras, energy management systems, digital menu boards, kiosks, LED light bulbs, thermostats, medical devices, etc., are examples of Internet-connected components that, when connected to a business network, become points of vulnerability (PoVs) and therefore must be securely managed.

  Read More   


October 24, 2014Published by

“Excuse me, do you have WiFi?” While you may find the increased frequency of that question irritating, there’s no denying it: Your customers crave connectivity. And if you don’t provide it today, they will go elsewhere tomorrow.

  Read More