ControlScan Blog


Posts Tagged: Network Security



May 1, 2016Published by

Is anyone else worried? At a recent security industry event I heard an SVP from Symantec talk about results from their latest study of attack activity. They saw attack volumes drop off significantly on the weekends and holidays, indicating that these attackers are operating as 9-to-5 businesses. What’s more, Symantec found that cyber criminals are […]

  Read More   


April 12, 2016Published by

Looking to implement a SIEM platform? One of the best ways to maximize your SIEM technology investment is to deploy the solution through a trusted MSSP.

  Read More   


April 4, 2016Published by

The healthcare industry has become the focus of intentional, targeted attacks. The healthcare data security threat landscape, once characterized by insider carelessness and petty theft, has turned much darker. Healthcare IT professionals have found it difficult to keep up with the broadening attack vectors. It’s no surprise, given the depth and breadth of the typical […]

  Read More   


February 26, 2016Published by


Taking care to not disclose patient information is critical to the success of any healthcare organization. In this post and accompanying video clip, I discuss the security issues I commonly run across in the healthcare setting, as well as actionable tips for preventing their occurrence.

  Read More   


February 8, 2016Published by


Most SMBs simply don’t have access to business critical security technologies and expertise. But ignoring the problem doesn’t make it go away and in fact, doing so can be quite dangerous given today’s security threat landscape. In this blog post and accompanying video, I explain how ControlScan transitioned to its current status as a trusted managed security service provider (MSSP) to meet this important need.

  Read More   


January 17, 2016Published by

Today’s IT professional is faced with managing a traditional network infrastructure while executing strategies to take advantage of emerging technologies like cloud services, mobile applications and Internet of Things (IoT) components. This evolving, complex, connected environment creates new points of vulnerability, challenging IT leaders to invest in human and technological resources.

  Read More   


November 9, 2015Published by

Today’s unprecedented breach activity—and the high costs breached companies are paying as a result—are causing executive teams to sit up and take notice. Those responsible for organizational IT are finding themselves under increasing pressure to reinforce and report on a strong security posture to stakeholders.

  Read More   


October 5, 2015Published by


Companies are innovating in every channel; however, integrating all of these new data sources presents serious security risks. Acknowledging this, many companies have elevated the issue of data security all the way to their Boards of Directors. Learn why business leaders are getting serious about security.

  Read More   


September 28, 2015Published by


Omnipresent data is presenting major challenges for today’s CIOs. The constant evolution of data-driven business practices requires the appropriate checks and balances throughout the entire organization and across every channel.

  Read More   


September 22, 2015Published by


It’s getting harder and harder to hire people that understand and can evolve with the growing security threat, so for a business what do I select as the technology and then how do I staff appropriately in order to make it all work together. Watch this short video to learn the truth behind security and compliance.

  Read More   


July 15, 2015Published by

You likely couldn’t escape the news that today, July 15, is Amazon Prime Day. But did you know that today is significant for another, more business critical reason? As of today—July 15, 2015—Microsoft no longer supports the Windows Server 2003 operating system. Yes, it’s a big deal.

  Read More   


June 23, 2015Published by

Today’s IT manager has an overwhelming number of competing priorities. Strategic initiatives to improve the customer experience vie with mission-critical activities such as ensuring maximum operational uptime and efficiency, deploying system upgrades and updates, and executing new technology strategies aimed at building the business.

  Read More   


June 17, 2015Published by

Password managers are a critical component of authentication security. The average user has no less than 40 online accounts, and people who work in IT can easily have over 1000 accounts. Unless you somehow possess the mental capacity to memorize unique, random passwords for all of those accounts, you need a way to securely create and manage passwords for you.

  Read More   


April 15, 2015Published by

Many businesses are using outdated SSL and TLS versions as a security control because the software they’re running still supports it. But experts warn that these protocol versions, including SSL 2.0, SSL 3.0 and TLS 1.0, are no longer secure and therefore require action on the business’s part.

  Read More