Blog

/Blog

Three Things to Add to Your Tax Filing Checklist

There’s more to think about this tax season than simply filing by April 18. Just ask the CEO of Sunrun.

Earlier this year, a hacker posed as the head of the residential solar company to request W-2 tax form data from the payroll department. And since it was nearing tax season, it seemed legitimate. Sensitive data […]

By |March 27th, 2017|Blog|0 Comments

A surprising Super Bowl victory for adults with developmental disabilities

If you’re a fan of American football, then you know that the Atlanta Falcons had a surprisingly victorious season. You also probably know where you’ll be watching them face the New England Patriots in Super Bowl LI this Sunday in Houston, Texas.

But there will be another exciting team victory at NRG Stadium this Sunday – […]

By |February 3rd, 2017|Blog|0 Comments

Why Election Hacking Should Matter to Every Business Leader

It’s everywhere in the news: Russia has been blamed for meddling with the 2016 American presidential election.

Reactions are all over the place too. Trump calls the accusation “ridiculous.” Cyber experts say direct hacking of voting booths is “unlikely.” They point out the decentralized design in which booths aren’t connected to the Internet or each even […]

By |December 20th, 2016|Blog|0 Comments

The 2016 Holiday Must-Have List

We all know the universal rule of thumb for gift-giving: “It’s the thought that counts.”

But I think kids everywhere would agree there’s also a universal gift-giving faux pas. It’s when a child rips open a gift and squeals in delight to find a shiny new toy all for him – only to discover batteries […]

By |December 7th, 2016|Blog, Uncategorized|0 Comments

The big phish: Don’t get hooked by ransomware or B.E.C.

For as long as the internet has been a primary mode of doing business, cyber criminals have used phishing scams to steal money and information from consumers and businesses. But recently, cyber thieves have innovated new variations on traditional phishing scams such as ransomware and business email compromise.

What is phishing?

Phishing scams occur when criminals pose […]

By |July 11th, 2016|Blog|0 Comments

Six ways to prevent or limit the impact of a cyberattack

Cybersecurity threats happen – and often. It’s gotten to the point that we can read a story every day about shady characters hacking into company information.

In fact, it’s been reported that LinkedIn is a recent target. More than 100 million people are reportedly in danger of having their login information exploited. Hackers have even found […]

By |May 31st, 2016|Blog|0 Comments

Do these three things today to secure your company data

We hear about hackers breaking into company networks nearly every day. They damage, steal, and release sensitive data. They put our companies and customers at risk. If you’re a business leader or IT professional, it’s important that you stay informed on how best to approach cybersecurity in your organization.

Expert on the front lines

For this reason, Blue Lance […]

By |April 13th, 2016|Blog|2 Comments

Monitoring Windows/AD Authentications and Logon Activity

Microsoft Windows operating systems uses a variety of authentication technologies that allow users access to resources on the network. These authentication protocols include Kerberos, NT LAN Manager (NTLM), Negotiate, Schannel (secure channel) and Digest which are all part of the Windows security architecture.

LT Auditor+ 2013 is able to completely audit all activity associated with Kerberos […]

By |January 14th, 2016|Blog|0 Comments

Inactive Active Directory User Accounts

Active Directory (AD) users’ IDs that have not been used for extended periods of time pose a threat to any organization, as these IDs could be used to gain illegal access to the network.  Most security policies and compliance regulations also mandate that Active Directory user accounts be disabled after a certain period of inactivity. […]

By |January 14th, 2016|Blog|0 Comments