ControlScan Blog


Posts published by: Steve Robb



Author ControlScan Blog

Steve Robb • SVP, Security Marketing & Product

Steve Robb has worked in the high-tech sector throughout his career, holding various positions in both product and services companies. He joined ControlScan in January of 2009 and has held multiple key roles in the company. Read More



March 31, 2017Published by

Historically speaking, tax season is prime for tax-themed scams and social engineering attacks. Specifically, the number of W-2 phishing scams have peaked recently. Attackers and social engineers begin by targeting finance and HR departments with spear phishing emails that spoof C-level executives and request employee W-2 forms.

  Read More   


September 30, 2016Published by

Cybersecurity Unknowns: It’s not the “who” but the “what.” When you stop and think about your business’s IT security, do you often wonder who the unnamed faces are behind the relentless barrage of cyber attacks out there? Everyone has an opinion: “Government target—must be a nation-state” or “Little guy—must be a disgruntled ex-employee.” Our assumptions, […]

  Read More   


July 12, 2016Published by

Event log monitoring—or keeping an eye on your system logs for security and compliance purposes—can be a challenge. Here at ControlScan we see businesses and their IT teams struggling with its implementation and/or maintenance just about every day.

  Read More   


June 6, 2016Published by

Have you been told your organization needs to comply with certain information privacy and/or security standards, such as PCI, HIPAA, etc.? If so, you may find yourself quickly overwhelmed with all the requirements for bringing people, processes and technology into “compliance.” Yes, compliance can suck.

  Read More   


June 3, 2016Published by

2015 became known as “the year of the healthcare breach,” with healthcare hit hard and representing over 39 percent of known breach events. Healthcare organizations of every size are realizing they can no longer afford to ignore the risks they are exposed to on a daily basis. It’s critical that today’s healthcare organizations protect patient […]

  Read More   


May 20, 2016Published by

Your Company is Under Attack Your company’s networks are being probed, prodded and attacked countless times every day. Unless you’re watching your logs, you’re likely unaware all this activity is taking place. Awareness, being a critical element of an effective defense, is important to cultivate and nurture. The Science Behind the “Pen Test” How do […]

  Read More   


May 12, 2016Published by

Internet connectivity drives the way today’s businesses operate. From communicating via email, to processing electronic payment transactions, to managing employee payrolls, nearly everything we do touches the Internet in some way. Unfortunately, the same technology that serves as our business backbone also empowers criminal activity.

  Read More   


May 1, 2016Published by

Is anyone else worried? At a recent security industry event I heard an SVP from Symantec talk about results from their latest study of attack activity. They saw attack volumes drop off significantly on the weekends and holidays, indicating that these attackers are operating as 9-to-5 businesses. What’s more, Symantec found that cyber criminals are […]

  Read More   


April 4, 2016Published by

The healthcare industry has become the focus of intentional, targeted attacks. The healthcare data security threat landscape, once characterized by insider carelessness and petty theft, has turned much darker. Healthcare IT professionals have found it difficult to keep up with the broadening attack vectors. It’s no surprise, given the depth and breadth of the typical […]

  Read More   


April 4, 2016Published by

Ransomware continues to make news headlines.In response to the growing ransomware threat, government agencies are issuing business alerts to raise awareness and offer guidance. Some of these recent alerts include:United States Computer Emergency Readiness Team (US-CERT) —  “Ransomware and Recent Variants” AlertFederal Bureau of Investigation (FBI) — “Ransomware on the Rise” PodcastAnd here is a […]

  Read More   


January 17, 2016Published by

Today’s IT professional is faced with managing a traditional network infrastructure while executing strategies to take advantage of emerging technologies like cloud services, mobile applications and Internet of Things (IoT) components. This evolving, complex, connected environment creates new points of vulnerability, challenging IT leaders to invest in human and technological resources.

  Read More   


November 18, 2015Published by


Moving infrastructure and applications to the cloud enables a whole new level of connectedness for your organization and customers. Its accessibility and on-demand scalability make it an ideal platform for many evolving businesses. But, because it changes much of what we know about the traditional IT environment, there are some very real risks involved—even if hosting with a major service provider. Learn more about balancing the risk and reward of going to the cloud.

  Read More   


July 15, 2015Published by

You likely couldn’t escape the news that today, July 15, is Amazon Prime Day. But did you know that today is significant for another, more business critical reason? As of today—July 15, 2015—Microsoft no longer supports the Windows Server 2003 operating system. Yes, it’s a big deal.

  Read More   


April 15, 2015Published by

Many businesses are using outdated SSL and TLS versions as a security control because the software they’re running still supports it. But experts warn that these protocol versions, including SSL 2.0, SSL 3.0 and TLS 1.0, are no longer secure and therefore require action on the business’s part.

  Read More   


November 20, 2014Published by

If 2014 will be remembered as the “year of the breach,” then 2015 is shaping up nicely to become the “year of the Service Provider.” Two especially high-profile breaches—Target and Home Depot—both originated with the theft of network credentials from third party vendors. You may be working hard to protect your network, but are your service providers?

  Read More