ControlScan Blog


Posts Tagged: Point of Sale



December 19, 2018Published by

Recently I sat down with CSP Magazine technology writer Jackson Lewis to talk about the technology “arms race” retailers and law enforcement are in with skimming criminals. We refer to it as such because, like every other area of cybersecurity, there is a continual one-upping of technology going on between the good guys and the bad guys. When it comes to fuel pump skimmers, however, there may be an end in sight…

  Read More   


March 29, 2018Published by

Outpacing cybercriminals’ tools and techniques is tough work, and that’s why the payments industry is embracing payment security innovation. ControlScan Executive Chairman Tom Wimsett recently sat down with Jason Oxman, CEO of the ETA, to discuss the challenges facing acquirers, ISOs, processors and payment facilitators as they work to assist merchants with security and compliance.

  Read More   


        Featured        

July 16, 2017Published by

Payment card data security isn’t a new concept, yet businesses everywhere still can’t get it right. The payment card industry has a growing body of standards, merchants and technology providers strive to follow them, and consumers continue to demand them.But payment card data breaches still happen. Regularly. Why?It’s time we upped the ante on our efforts to help merchants protect themselves.

  Read More   


July 12, 2016Published by

Event log monitoring—or keeping an eye on your system logs for security and compliance purposes—can be a challenge. Here at ControlScan we see businesses and their IT teams struggling with its implementation and/or maintenance just about every day.

  Read More   


January 25, 2016Published by

Whether it is PAN data (credit card numbers), ePHI, PII or intellectual property, the rationale is all the same; disclosing any sensitive data can be a nightmare for your company or product’s future. This post, however, is focused on cardholder data, because businesses with POS environments are the most commonly breached entities that exist and quite frankly, their average security posture is pretty low.

  Read More   


January 7, 2016Published by

For many the New Year represents a fresh start, but when it comes to information security, 2016 is expected to be more of an evolution than a revolution. Nowhere is this more true than in the payments space, which continues to grapple with cybercrime and fraud in the midst of technology innovation.

  Read More   


October 5, 2015Published by


Companies are innovating in every channel; however, integrating all of these new data sources presents serious security risks. Acknowledging this, many companies have elevated the issue of data security all the way to their Boards of Directors. Learn why business leaders are getting serious about security.

  Read More   


July 1, 2015Published by

You may have heard that EMV is a safer technology, which is why the banks and card brands want you to use it. So why would I say that EMV is not a security technology?

  Read More   


May 21, 2015Published by

In the quick serve and fast casual restaurant space, the technologies we choose to adopt are often driven by customer demand, the need to curtail the rising cost of doing business and the Internet of Things (IoT) explosion.

  Read More   


April 17, 2015Published by

Earlier this year, information began to filter out to SMBs regarding America’s shift to EMV payment technology. Unfortunately, you may have found these communications left you with more questions than answers. While it may be confusing, your business’s shift to EMV is essential to its long-term success.

  Read More   


February 4, 2015Published by

The rapid growth and infusion of the Internet of Things (IoT) in everyday life has correspondingly seeped into the workings of everyday business. Security cameras, energy management systems, digital menu boards, kiosks, LED light bulbs, thermostats, medical devices, etc., are examples of Internet-connected components that, when connected to a business network, become points of vulnerability (PoVs) and therefore must be securely managed.

  Read More   


December 12, 2014Published by

It’s a Tuesday afternoon and the lunch rush is in full swing at your store. Customers form four neat rows at the counter and a line of cars partially encircles the building, inching forward as your drive-through staff scrambles to fulfill each order. You are making the rounds between kitchen and counter, ensuring that all stations are running like clockwork.

  Read More   


November 17, 2014Published by

Users of Apple’s iOS (smartphone and tablets) and OS X (Macs) devices have traditionally thought of themselves as being fairly immune from viruses, Trojans and other infections and attacks. The past week’s flurry of articles on WireLurker (and the related Masque attack) called that assumption into question for many, however.

  Read More   


October 27, 2014Published by

ControlScan recently released a new report detailing its latest research findings on mobile technology adoption among SMBs. The report, Mobile at the Point of Sale: How SMBs are Adopting Mobile Devices to Accept Card-Present Payments, is based on input from more than 6,000 US-based SMBs responding to the company’s 2014 Mobile Payment Acceptance Survey.

  Read More