ControlScan Blog


Posts Tagged: Vulnerability Management



July 14, 2020Published by

In the world of healthcare, like any business environment, there is an important difference between being secure and being compliant. Sure, healthcare data security and HIPAA compliance share similarities, but one does not equal the other. Here’s how to build healthcare data security into your HIPAA compliance.

  Read More   


December 12, 2017Published by

Penetration tests have always had a higher price tag, but their overall cost to you is about to increase in 2018. Here’s what’s changing and how you can keep these costs contained in 2018 and beyond.

  Read More   


October 30, 2017Published by

On October 5th, 1953, the New York Yankees became the only team in baseball history to win five championships in a row. Today I’m pleased to tell you that ControlScan has passed the PCI Approved Scanning Vendor (ASV) revalidation test, also for the fifth consecutive year!This was no easy feat. Read on to learn how we did it.

  Read More   


October 7, 2016Published by

One of the easiest ways you can protect business accounts from unauthorized use is to incorporate multi-factor authentication, or MFA. But how do you use it in a way that has a meaningful impact on your organization’s security risk reduction efforts?

  Read More   


June 13, 2016Published by


What’s Your Data Security Approach? Growth and change is inherent to any healthy organization, but that positive change can have a negative impact on the security of your organization’s data. Have you considered what it really takes for your organization to be secure? If not, it’s probably time to ask some hard questions, the first […]

  Read More   


June 3, 2016Published by

2015 became known as “the year of the healthcare breach,” with healthcare hit hard and representing over 39 percent of known breach events. Healthcare organizations of every size are realizing they can no longer afford to ignore the risks they are exposed to on a daily basis. It’s critical that today’s healthcare organizations protect patient […]

  Read More   


May 2, 2016Published by

Split Decisions Cost Big BucksOne of the worst things that can happen to a convenience store manager is their cooler shutting down without their knowledge. Beer gets warm and food spoils, translating into hundreds of dollars lost.But what’s worse than a cooler shutting down? A firewall “shutdown.”Let’s assume a third party comes in to implement […]

  Read More   


April 12, 2016Published by

Looking to implement a SIEM platform? One of the best ways to maximize your SIEM technology investment is to deploy the solution through a trusted MSSP.

  Read More   


April 4, 2016Published by

The healthcare industry has become the focus of intentional, targeted attacks. The healthcare data security threat landscape, once characterized by insider carelessness and petty theft, has turned much darker. Healthcare IT professionals have found it difficult to keep up with the broadening attack vectors. It’s no surprise, given the depth and breadth of the typical […]

  Read More   


February 8, 2016Published by


Most SMBs simply don’t have access to business critical security technologies and expertise. But ignoring the problem doesn’t make it go away and in fact, doing so can be quite dangerous given today’s security threat landscape. In this blog post and accompanying video, I explain how ControlScan transitioned to its current status as a trusted managed security service provider (MSSP) to meet this important need.

  Read More   


January 17, 2016Published by

Today’s IT professional is faced with managing a traditional network infrastructure while executing strategies to take advantage of emerging technologies like cloud services, mobile applications and Internet of Things (IoT) components. This evolving, complex, connected environment creates new points of vulnerability, challenging IT leaders to invest in human and technological resources.

  Read More   


November 9, 2015Published by

Today’s unprecedented breach activity—and the high costs breached companies are paying as a result—are causing executive teams to sit up and take notice. Those responsible for organizational IT are finding themselves under increasing pressure to reinforce and report on a strong security posture to stakeholders.

  Read More   


October 23, 2015Published by

Phishing remains a top organizational security vulnerability because it involves the exploitation of human weakness. If you have humans at your workplace—and we all do!—then you are at risk.

  Read More   


October 5, 2015Published by


Companies are innovating in every channel; however, integrating all of these new data sources presents serious security risks. Acknowledging this, many companies have elevated the issue of data security all the way to their Boards of Directors. Learn why business leaders are getting serious about security.

  Read More