Uncategorized

/Uncategorized

The Silent Accomplice in Your Office Environment

Part two of a three-part series on credentials access assessments

You probably hear all the time about the increasing sophistication of cyber attackers. But did you know that a whopping 85 percent of attacks are preventable? That’s what the United States Computer Emergency Readiness Team estimated in a 2015 report.

The truth is that most cyber dangers […]

By |March 10th, 2017|Uncategorized|0 Comments

Disgruntled versus happy employees: Why they both pose cyber risks

Part one of a two-part series on a credentials access assessment

It’s probably the worst nightmare of any employer: When a former employee with a grudge hacks your company.

According to the Federal Bureau of Investigation and the Homeland Security Department, this kind of revenge is on the rise. “Companies victimized by current or former employees incur […]

By |February 28th, 2017|Uncategorized|0 Comments

The most dangerous myth about cybercrime

“It won’t happen to me.”

When it comes to cybercrime, this is the most common myth. It’s also the most dangerous myth.

That’s because the evidence tells us otherwise. Statistical research says that at least 18 people are victims of cybercrime per second. That means that in the time it takes you to read this article, about […]

By |January 25th, 2017|Uncategorized|0 Comments

The 2016 Holiday Must-Have List

We all know the universal rule of thumb for gift-giving: “It’s the thought that counts.”

But I think kids everywhere would agree there’s also a universal gift-giving faux pas. It’s when a child rips open a gift and squeals in delight to find a shiny new toy all for him – only to discover batteries […]

By |December 7th, 2016|Blog, Uncategorized|0 Comments

Once More into the Breach

 

You may have heard the big news. It was announced in September that 500 million Yahoo accounts had been hacked, resulting in one of the most catastrophic data breaches in U.S. history.

 

What was compromised?

 

Yahoo’s statement on the hack indicated that the stolen information includes names, email addresses, telephone numbers, dates of birth, and even the answers […]

By |November 23rd, 2016|Uncategorized|0 Comments

Highlights from Congressman Michael McCaul’s Speech: Corporate Governance and Risk Management

On October 26, 2016, the Greater Houston Partnership proudly hosted a “Cybersecurity: Corporate Governance and Risk Management” breakfast at Partnership Tower in downtown Houston. Thanks to all of our participants, the event was a great success.

One highlight of the gathering was the address given by Michael McCaul, a U.S. Congressman and Chairman of the House Homeland […]

By |November 1st, 2016|Uncategorized|0 Comments

Houston Cybersecurity Event: Corporate Governance and Risk Management Breakfast

Nearly every day, hackers are breaking into company networks to damage, steal, and release sensitive data, potentially putting your company and your customers at risk. If you’re a business leader or IT professional, it’s critical that you stay informed on how best to approach cybersecurity in your organization.

That’s why we recommend Cybersecurity: Corporate Governance and […]

By |October 17th, 2016|Uncategorized|0 Comments

Highlights from The Future of Leadership Luncheon

This is the first of a two-year term in which I’ll serve as the Chairman of the Board for the Center for Houston’s Future (CHF), a think tank of diverse business and civic leaders working together to solve problems in our region. Together, we face challenges in healthcare, education, arts and culture, public safety, natural […]

By |April 21st, 2016|Breaking News, Uncategorized, Upcoming Events|0 Comments

Detailed Security Folder Permissions with LT Auditor+ Windows Assessment

Overview
This document details how to scan and generate a LT Auditor+ Windows Folder Security Permissions Report to display individual group members for all assigned Group Security Principals on specified folders.

Prerequisites

LT Auditor+ 2013 framework installed
Windows Assessment v2.0 and above

Setup Instructions

Download and extract the SecurityFolderDetails.zip update from http://bldownloads.blob.core.windows.net/support/SecurityFolderDetails.zip to display the following folders
 

Update the […]

By |August 21st, 2015|Uncategorized|0 Comments