Blue Lance

/Blue Lance

About Blue Lance

This author has not yet filled in any details.
So far has created 25 blog entries.

Harvey, Irma, and You: Protecting Your Business from Cyber Criminals after a Natural Disaster

It’s a sad reality: When a natural disaster hits, it brings on more than a storm surge. Surges in cybercrime rise as well.

This year has been particularly devastating for natural disasters. Our very own Houston was hit hard by Hurricane Harvey. Florida was pummeled, causing record level flooding when Hurricane Irma made landfall. Mexico has […]

By |October 23rd, 2017|Uncategorized|0 Comments

Yes, the Equifax Data Breach Can Hurt Your Business Too

If you’ve tuned into the news lately, chances are you’ve heard about the Equifax data breach. Here’s what happened.

On July 29, as many as 143 million Americans’ Social Security numbers, birth dates, addresses, and other pieces of sensitive information were reported stolen from Equifax. Credit card numbers were also leaked. The stolen data caused millions […]

By |October 2nd, 2017|Blog|0 Comments

When Age Matters in Your Organization

A series on password policies

Many people consider it a harmless rite of passage to lie about their age. In fact, in a study of 1,000 college students, nearly two-thirds admitted to using fake IDs to get around the legal drinking age.

Unfortunately, this kind of get-around isn’t relegated to our youth. When it comes to password […]

By |September 11th, 2017|Blog|0 Comments

Hackers and Hurricane Harvey

How to Prevent Cyber Crime during a Natural Disaster

August 29, 2017 (Houston) – Hurricane Harvey just crippled much of the Gulf coast region in Texas – and the damage isn’t over yet. With over 30,000 people displaced to temporary shelters and thousands of calls flooding 911 dispatchers, all eyes are on rescue efforts.

As a business […]

By |August 29th, 2017|Blog|0 Comments

I$ Thi$ P@$$w0rd C0mp1ex En0ugh?

A series on password policies

Have you seen the password joke that’s gone viral? It’s a computer prompt saying, “Sorry, but your password must contain an uppercase letter, haiku, gang sign and hieroglyph.”

It wouldn’t be so funny if it wasn’t so true. It can seem like passwords are taken entirely too seriously. Which makes complexity requirements […]

By |July 24th, 2017|Uncategorized|0 Comments

When Familiarity Breeds Contempt from Your Cyber Enemies

A series on password policies

We’re all creatures of habit. We tend to eat at the same restaurants, sit in our same spots, and place the same dinner orders. Researchers have found that these autopilot responses can be helpful. They free our minds to focus on more important decisions.

So it’s no surprise that we’re creatures of […]

By |June 27th, 2017|Blog|0 Comments

The password mistake you’re still making

A series on password policies

Passwords. They’re exhausting, aren’t they?

Because a simple password just isn’t enough to protect our companies anymore. In this era of cyber-attacks, we’re told our password must be strong. And complex. And long. And ever-changing. And . . .

And we’re tired. In fact, seven out of 10 people have stopped trusting that […]

By |June 2nd, 2017|Blog|0 Comments

Your rogue password could expose your organization

Understanding the relationship between your people, policies and password settings

Let’s talk about your password. Yes, the one you’ve configured to override the company policy.

We understand why you’ve gone rogue. You have a legitimate reason for changing your settings so that you never have to change your password. Maybe you’re making sure that your backup processes […]

By |May 22nd, 2017|Blog|0 Comments

Dormant Doormats: Two Things You Should Know about the Amazon Hacking

Amazon is known for its ease in delivering purchases to our doormats. But now the retail giant is in the news for another kind of ease – and it’s not good.

Hackers have figured out that Amazon’s third-party sellers are easy to hack. Cyber criminals recently accessed hundreds of accounts, posted fake items for sale, and […]

By |April 27th, 2017|Blog|0 Comments

Hacking into your organization might be this easy

Part three of a three-part series on system access assessments

Even with cybersecurity as a hot topic in recent years, hacking into your system might still be embarrassingly easy. How easy, you ask?

This easy: Within minutes, an auditor we know was able to log into a coffee company’s huge IBM system.

He discovered the security problem while […]

By |April 6th, 2017|Blog|0 Comments