Ransomware: The New Reality of Cyber Attacks

By |February 23rd, 2023|

What is ransomware?

Ransomware attacks have grown in prevalence and complexity, posing a serious danger to both individuals and organizations. This form of malware encrypts a victim’s data and demands a ransom in exchange for the […]

Mitigating Ransomware in Healthcare

By |January 25th, 2023|

Why Ransomware is common in the healthcare industry?

Healthcare organizations are often targeted by cyberattacks because they have a large amount of high value information that can be stolen or used for malicious purposes. This information […]

Auditing Privileged Access Management

By |January 3rd, 2023|

What is Privileged Access Management?

Privileged Access Management (PAM) is a security practice designed to secure and manage the access rights of users who have elevated privileges within an organization. These privileges, often referred to as […]

Insider Threat Mitigation During Tough Economic Cycles

By |December 19th, 2022|

The global economy is currently facing a potential recession, with many analysts and experts predicting a downturn in the near future. During a recession, companies may face financial pressures and may be forced to cut […]

How to Reduce Ransomware Risk by Assessing Inactive Accounts & Privileged Groups

By |September 1st, 2022|

Inactive accounts are active accounts that have not been used for an extended period (dormant) or have never been used, while privileged groups contain accounts with high privileges. Examples of privileged groups are Domain Admins, […]

Comments Off on How to Reduce Ransomware Risk by Assessing Inactive Accounts & Privileged Groups

How to Audit Ransomware Risk

By |August 22nd, 2022|

The protection of data and information assets is a key, ongoing focus for organizations around the world. Using encryption technology, limitations to access, and various high-level efforts, as quickly as organizations put a security practice […]

Comments Off on How to Audit Ransomware Risk

How to Investigate Ransomware Risk

By |July 25th, 2022|

Knowing how to investigate ransomware risk is absolutely critical to maintaining a safe online presence in today’s fast-paced world. With unprecedented numbers of people conducting business online, there is a parallel and unfortunate trend showing […]

Comments Off on How to Investigate Ransomware Risk

How to Assess Ransomware Risk with LT Auditor+

By |June 16th, 2022|

Ransomware attacks continue to increase every day. Cyber threats are hitting more businesses in the United States and worldwide. According to 2022 – Verizon Data Breach Investigation Report- “this year Ransomware has continued its upward […]

Detect SolarWinds SUNBURST Malware and Protect your Network with BLUE LANCE’s LT Auditor+

By |January 4th, 2021|


On 12/13/2020, FireEye released a malware report on a new malware variant called “Sunburst Backdoor” that precipitated the Department of Homeland Security’s CISA (Cybersecurity and Infrastructure Agency) to issue an emergency directive.

The Sunburst malware ‘trojanized’ […]

Protecting and Monitoring Home Workers Workstations’ increases Security & Compliance

By |June 30th, 2020|

You planned for ongoing modernization of your corporate network and infrastructure but who knew that the PANDEMIC was coming to eat your lunch … and dinner?

What to do when you are not able to give […]