Blue Lance

Archive for admin

The 2016 Holiday Must-Have List

We all know the universal rule of thumb for gift-giving: “It’s the thought that counts.” But I think kids everywhere would agree there’s also a universal gift-giving faux pas. It’s when a child rips open a gift and squeals in delight to find a shiny new toy all for him – only to discover batteries […]

Once More into the Breach

  You may have heard the big news. It was announced in September that 500 million Yahoo accounts had been hacked, resulting in one of the most catastrophic data breaches in U.S. history.   What was compromised?   Yahoo’s statement on the hack indicated that the stolen information includes names, email addresses, telephone numbers, dates of […]

Highlights from Congressman Michael McCaul’s Speech: Corporate Governance and Risk Management

On October 26, 2016, the Greater Houston Partnership proudly hosted a “Cybersecurity: Corporate Governance and Risk Management” breakfast at Partnership Tower in downtown Houston. Thanks to all of our participants, the event was a great success. One highlight of the gathering was the address given by Michael McCaul, a U.S. Congressman and Chairman of the House […]

Houston Cybersecurity Event: Corporate Governance and Risk Management Breakfast

Nearly every day, hackers are breaking into company networks to damage, steal, and release sensitive data, potentially putting your company and your customers at risk. If you’re a business leader or IT professional, it’s critical that you stay informed on how best to approach cybersecurity in your organization. That’s why we recommend Cybersecurity: Corporate Governance […]

The big phish: Don’t get hooked by ransomware or B.E.C.

For as long as the internet has been a primary mode of doing business, cyber criminals have used phishing scams to steal money and information from consumers and businesses. But recently, cyber thieves have innovated new variations on traditional phishing scams such as ransomware and business email compromise. What is phishing? Phishing scams occur when […]

Six ways to prevent or limit the impact of a cyberattack

Cybersecurity threats happen – and often. It’s gotten to the point that we can read a story every day about shady characters hacking into company information. In fact, it’s been reported that LinkedIn is a recent target. More than 100 million people are reportedly in danger of having their login information exploited. Hackers have even […]

Highlights from The Future of Leadership Luncheon

This is the first of a two-year term in which I’ll serve as the Chairman of the Board for the Center for Houston’s Future (CHF), a think tank of diverse business and civic leaders working together to solve problems in our region. Together, we face challenges in healthcare, education, arts and culture, public safety, natural […]

Do these three things today to secure your company data

We hear about hackers breaking into company networks nearly every day. They damage, steal, and release sensitive data. They put our companies and customers at risk. If you’re a business leader or IT professional, it’s important that you stay informed on how best to approach cybersecurity in your organization. Expert on the front lines For this […]

Monitoring Windows/AD Authentications and Logon Activity

Microsoft Windows operating systems uses a variety of authentication technologies that allow users access to resources on the network. These authentication protocols include Kerberos, NT LAN Manager (NTLM), Negotiate, Schannel (secure channel) and Digest which are all part of the Windows security architecture. LT Auditor+ 2013 is able to completely audit all activity associated with […]

Newsletter

Let's get started and
enjoy the power of LT Auditor MP

© Copyright 2025, BLUE LANCE 2.0. All Rights Reserved.