Why Penetration Tests are Critical for Accurately Assessing Security Risk

October 10, 2017 • Published Categories Best PracticesTags ,
Penetration tests look for vulnerabilities within various endpoints

How do you conduct your IT risk assessments? In a recent ControlScan customer survey, we asked IT leaders about risk assessments. Specifically, we wanted to know how often businesses are conducting them, as well as if they are doing so formally by using an external … Read more

PCI Learnings from the Verizon 2017 Data Breach Digest

April 12, 2017 • Published Categories Best PracticesTags , , ,
PCI Learning from the Verizon 2017 Data Breach Digest

The story behind the DBD. Each spring, the information security community looks forward to the release of the latest Verizon Data Breach Investigation Report (DBIR). This year we have some advanced data breach info as we await the DBIR: The Verizon 2017 Data Breach Digest … Read more

How to Accept Mobile Payments and Remain PCI Compliant

December 16, 2016 • Published Categories Best PracticesTags
Accepting mobile payments and PCI compliance

Near Field Communication (NFC) technology has been integrated into more and more mobile devices in recent years, meaning instances of mobile contactless payments are continuing to grow as more retailers accept mobile payments in-store. However, with new financial technologies come new ways for criminals to potentially defraud … Read more

Taking Back Control With Controlled Access

September 27, 2016 • Published Categories Best PracticesTags , ,
Next-Generation Access Control

Guest post by Simon Parker, Minerva Building a Case for Next-Generation Access Control Identities are stolen more during the holidays than any other time of the year. That’s because this is the season in which shoppers use their credit and debit cards the most. And … Read more

How to Protect Your Business from Ransomware

June 30, 2016 • Published Categories Best PracticesTags , ,
Ransomware

Guest post by Vlad de Ramos, AIM Corporate Solutions In what experts and Johnny Mnemonic have told us years before, information is now the most valuable asset in the digital age. Curiously, this became literal with the rise and resurgence of ransomware. Hide Yo’ Data … Read more