ControlScan Blog


Posts Tagged: Vulnerability Management



September 28, 2015Published by


Omnipresent data is presenting major challenges for today’s CIOs. The constant evolution of data-driven business practices requires the appropriate checks and balances throughout the entire organization and across every channel.

  Read More   


September 22, 2015Published by


It’s getting harder and harder to hire people that understand and can evolve with the growing security threat, so for a business what do I select as the technology and then how do I staff appropriately in order to make it all work together. Watch this short video to learn the truth behind security and compliance.

  Read More   


September 15, 2015Published by

In the brave new world of BYOD, organizations should alert their Android users to the following: A security vulnerability called Stagefright, which was first discovered several months ago, has a new variant that is being seen in the wild. Stagefright allows an attacker to control and steal data from Android devices by simply sending an infected multimedia message (MMS).

  Read More   


July 15, 2015Published by

You likely couldn’t escape the news that today, July 15, is Amazon Prime Day. But did you know that today is significant for another, more business critical reason? As of today—July 15, 2015—Microsoft no longer supports the Windows Server 2003 operating system. Yes, it’s a big deal.

  Read More   


June 23, 2015Published by

Today’s IT manager has an overwhelming number of competing priorities. Strategic initiatives to improve the customer experience vie with mission-critical activities such as ensuring maximum operational uptime and efficiency, deploying system upgrades and updates, and executing new technology strategies aimed at building the business.

  Read More   


April 15, 2015Published by

Many businesses are using outdated SSL and TLS versions as a security control because the software they’re running still supports it. But experts warn that these protocol versions, including SSL 2.0, SSL 3.0 and TLS 1.0, are no longer secure and therefore require action on the business’s part.

  Read More   


December 2, 2014Published by

Last week, Inc.com featured a great piece by Electronic Transactions Association CEO Jason Oxman. “A Cybersecurity Checklist for Online Retailers” lists important steps online startups and small businesses can take to protect sensitive data. As the U.S. migrates to EMV (i.e., chip cards), it is expected that fraud activity in the world of ecommerce will increase significantly.

  Read More   


October 26, 2014Published by

In today’s SMB organizations, IT managers have an overwhelming number of competing priorities. Strategic initiatives to improve the customer experience vie with mission-critical activities such as ensuring maximum operational uptime and efficiency, deploying system upgrades and updates, and executing new technology strategies aimed at building the business. Yet cyber criminals don’t discriminate among those they target; businesses of all sizes are under a constant barrage of attacks from malware, Trojans and viruses.

  Read More   


October 21, 2014Published by

According to independent research by the Identity Theft Resource Center (ITRC), 259 Medical/Healthcare facilities experienced a data breach event between January 1 and October 14 of this year. That is a staggering number, given that ITRC reported a total of 28 events for the entirety of 2013.

  Read More   


October 20, 2014Published by

Lately it seems we’ve been operating in a world of “another week, another breach.” The constant bombardment of news featuring our favorite brands getting hacked typically creates one of two reactions: “Yeah, but I’m a little shop, so that can’t happen to me” or “I might as well not bother trying to prevent the inevitable.”

  Read More