ControlScan Blog


Posts Tagged: Physical Security



May 20, 2016Published by

Your Company is Under AttackYour company’s networks are being probed, prodded and attacked countless times every day. Unless you’re watching your logs, you’re likely unaware all this activity is taking place. Awareness, being a critical element of an effective defense, is important to cultivate and nurture.The Science Behind the “Pen Test”How do you gain insight […]

  Read More   


        Featured        

April 12, 2016Published by



Chances are you’ve helped someone get into a building without verifying whether or not they should be allowed in, or even asking if they had a legitimate reason for being there. It might have been at a hotel, or the building in which you work, or a building where you had a meeting. […]

  Read More   


February 26, 2016Published by


Taking care to not disclose patient information is critical to the success of any healthcare organization. In this post and accompanying video clip, I discuss the security issues I commonly run across in the healthcare setting, as well as actionable tips for preventing their occurrence.

  Read More   


January 28, 2015Published by

There are many product companies and service providers offering Security Awareness Training services. In fact, just today ControlScan announced its broadened Security Awareness Training Service. Of course when you have a plethora of options, it can be challenging to zero in on the right service provider.

  Read More   


January 23, 2015Published by

How do you quantify ROI from Security Awareness Training of your employees? This is a question that every IT Security Manager has in his/her mind. Compliance mandates and government legislation exhort companies to roll out Security Awareness Training to employees, but is it worth the investment ?

  Read More   


November 20, 2014Published by

If 2014 will be remembered as the “year of the breach,” then 2015 is shaping up nicely to become the “year of the Service Provider.” Two especially high-profile breaches—Target and Home Depot—both originated with the theft of network credentials from third party vendors. You may be working hard to protect your network, but are your service providers?

  Read More   


October 24, 2014Published by

The best way to truly strengthen your business’s security posture is to have a sober understanding of your risk and then meet that understanding with practical steps to protect your business against data thieves. With that in mind, here are 5 best practices you can begin implementing today.

  Read More