ControlScan Blog


Posts Tagged: Malware



November 17, 2017Published by

When they’re successful, phishing attempts can have a significant impact on you personally, as well as on your workplace. They begin innocently enough—a seemingly legitimate DocuSign request or email from a friend—but they can quickly turn your world upside down.Avoid becoming a victim of phishing by following these 3 best practices.

  Read More   


July 24, 2017Published by

The ability to devalue credit card data has made point-to-point encryption (P2PE) technology a hot topic among franchisors. And what’s not to love? With a PCI P2PE solution in place, your franchise can check off that PCI compliance box as well as rest assured that your payment transactions are safe and secure.But is securing your credit card transactions between the POS and the payment processor all your business should worry about? Does implementing P2PE make every other security technology irrelevant to your business?

  Read More   


        Featured        

March 29, 2017Published by

The popularity of ransomware among cyber thieves continues to grow, not just in America but around the globe. Ransomware victims paid over a billion dollars in 2016 for decryption keys in the hopes that their data would be unlocked. Sometimes it was, sometimes it wasn’t. Read this blog post to learn the five things your business can do now to avoid becoming a victim of ransomware.

  Read More   


February 19, 2017Published by

Your business relies on antivirus technology to keep the bad guys out, all the time and every time. But what if I told you that cybersecurity professionals have been noticing a downward trend in antivirus software effectiveness for a while now?The fact is, malware has advanced to become more complex and automated, while the malware protection most businesses have come to rely on has not kept pace. What’s next in malware protection for your business?

  Read More   


December 1, 2016Published by

Employees are one of the most overlooked and most dangerous areas of security risk in an organization. The human element is susceptible to all types of attack and error, not to mention their ability to act with malicious intent.While human security risk can never be completely eliminated, it can be significantly reduced. Read this ControlScan blog post to learn how.

  Read More   


May 12, 2016Published by

Internet connectivity drives the way today’s businesses operate. From communicating via email, to processing electronic payment transactions, to managing employee payrolls, nearly everything we do touches the Internet in some way. Unfortunately, the same technology that serves as our business backbone also empowers criminal activity.

  Read More   


April 4, 2016Published by

Ransomware continues to make news headlines. In response to the growing ransomware threat, government agencies are issuing business alerts to raise awareness and offer guidance. Some of these recent alerts include: United States Computer Emergency Readiness Team (US-CERT) —  “Ransomware and Recent Variants” Alert Federal Bureau of Investigation (FBI) — “Ransomware on the Rise” Podcast […]

  Read More   


April 8, 2015Published by

While your bank is doing all it can to keep cybercriminals from accessing your merchant account, your own staff could be undermining the bank’s efforts.

  Read More   


February 20, 2015Published by

The Internet is abuzz with the news that Lenovo has been installing an adware named Superfish on a number of consumer laptops. The adware not only injects third-party ads on Google searches and websites without the user’s permission, but also has the capability to intercept and hijack SSL/TLS connections to websites, due to the installation of a self-signing certificate authority on affected machines.

  Read More   


February 4, 2015Published by

The rapid growth and infusion of the Internet of Things (IoT) in everyday life has correspondingly seeped into the workings of everyday business. Security cameras, energy management systems, digital menu boards, kiosks, LED light bulbs, thermostats, medical devices, etc., are examples of Internet-connected components that, when connected to a business network, become points of vulnerability (PoVs) and therefore must be securely managed.

  Read More   


October 21, 2014Published by

According to independent research by the Identity Theft Resource Center (ITRC), 259 Medical/Healthcare facilities experienced a data breach event between January 1 and October 14 of this year. That is a staggering number, given that ITRC reported a total of 28 events for the entirety of 2013.

  Read More