Uncategorized

/Uncategorized

Detect SolarWinds SUNBURST Malware and Protect your Network with BLUE LANCE’s LT Auditor+

Overview

On 12/13/2020, FireEye released a malware report on a new malware variant called “Sunburst Backdoor” that precipitated the Department of Homeland Security’s CISA (Cybersecurity and Infrastructure Agency) to issue an emergency directive.

The Sunburst malware ‘trojanized’ a legitimate application file called ‘SolarWinds.Orion.Core.BusinessLayer.dll’ from SolarWind’s Orion software which was subsequently distributed to their customers. Once infected, this […]

By |January 4th, 2021|Uncategorized|0 Comments

Protecting and Monitoring Home Workers Workstations’ increases Security & Compliance

You planned for ongoing modernization of your corporate network and infrastructure but who knew that the PANDEMIC was coming to eat your lunch … and dinner?

What to do when you are not able to give company owned laptops to everyone!

At least two major steps are necessary to enhance the security of your home workers’ workstations […]

By |June 30th, 2020|Uncategorized|0 Comments

YOUR INSIDER THREAT JUST MOVED OUTSIDE YOUR FIREWALL !

YOUR INSIDER THREAT JUST MOVED OUTSIDE YOUR FIREWALL !
You must increase protection of your Home Workers. BLUE LANCE HELPS

 

Auditing & Compliance must now expand to include remote workstations!

 

BLUE LANCE is taking immediate steps to assist businesses in securing their networks and remote working employees during the upcoming months.

 

Auditing & Compliance must now expand to include remote workstations!

Track all […]

By |May 5th, 2020|Blog, Uncategorized|0 Comments

Ransomware research shows attacks are expensive and pervasive.

Ransomware research shows that the costs of ransomware attacks and recovery continue to be very expensive and pervasive. A recent report by the security team at KPN, a Dutch telecommunications provider indicates their research over a large number of ransomware attacks using just one particular attack tool found that the average ransomware demand was $260,000. […]

By |January 28th, 2020|Uncategorized|0 Comments

Fostering Cybersecurity Education and Discussion with C-Level Banking Executives

I had a conversation with a C-level banker last week who asked me what my mission, our company’s mission is. Here is how I replied:
Fostering education and discussion about affordable and effective cybersecurity and compliance solutions among C-level executives in small to mid-sized regional banks is critical. C-level executives are ultimately responsible for their organization’s […]

By |November 20th, 2019|Uncategorized|0 Comments

Harvey, Irma, and You: Protecting Your Business from Cyber Criminals after a Natural Disaster

It’s a sad reality: When a natural disaster hits, it brings on more than a storm surge. Surges in cybercrime rise as well.

This year has been particularly devastating for natural disasters. Our very own Houston was hit hard by Hurricane Harvey. Florida was pummeled, causing record level flooding when Hurricane Irma made landfall. Mexico has […]

By |October 23rd, 2017|Uncategorized|0 Comments

I$ Thi$ P@$$w0rd C0mp1ex En0ugh?

A series on password policies

Have you seen the password joke that’s gone viral? It’s a computer prompt saying, “Sorry, but your password must contain an uppercase letter, haiku, gang sign and hieroglyph.”

It wouldn’t be so funny if it wasn’t so true. It can seem like passwords are taken entirely too seriously. Which makes complexity requirements […]

By |July 24th, 2017|Uncategorized|0 Comments

The Silent Accomplice in Your Office Environment

Part two of a three-part series on system access assessments

You probably hear all the time about the increasing sophistication of cyber attackers. But did you know that a whopping 85 percent of attacks are preventable? That’s what the United States Computer Emergency Readiness Team estimated in a 2015 report.

The truth is that most cyber dangers […]

By |March 10th, 2017|Uncategorized|0 Comments

Disgruntled versus happy employees: Why they both pose cyber risks

Part one of a three-part series on system access assessments

It’s probably the worst nightmare of any employer: When a former employee with a grudge hacks your company.

According to the Federal Bureau of Investigation and the Homeland Security Department, this kind of revenge is on the rise. “Companies victimized by current or former employees incur costs ‘from […]

By |February 28th, 2017|Uncategorized|0 Comments

The most dangerous myth about cybercrime

“It won’t happen to me.”

When it comes to cybercrime, this is the most common myth. It’s also the most dangerous myth.

That’s because the evidence tells us otherwise. Statistical research says that at least 18 people are victims of cybercrime per second. That means that in the time it takes you to read this article, about […]

By |January 25th, 2017|Uncategorized|0 Comments