Blog

/Blog

Highlights from Congressman Michael McCaul’s Speech: Corporate Governance and Risk Management

By |November 1st, 2016|

On October 26, 2016, the Greater Houston Partnership proudly hosted a “Cybersecurity: Corporate Governance and Risk Management” breakfast at Partnership Tower in downtown Houston. Thanks to all of our participants, the event was a great success.

One […]

Houston Cybersecurity Event: Corporate Governance and Risk Management Breakfast

By |October 17th, 2016|

Nearly every day, hackers are breaking into company networks to damage, steal, and release sensitive data, potentially putting your company and your customers at risk. If you’re a business leader or IT professional, it’s critical […]

The big phish: Don’t get hooked by ransomware or B.E.C.

By |July 11th, 2016|

For as long as the internet has been a primary mode of doing business, cyber criminals have used phishing scams to steal money and information from consumers and businesses. But recently, cyber thieves have innovated […]

Six ways to prevent or limit the impact of a cyberattack

By |May 31st, 2016|

Cybersecurity threats happen – and often. It’s gotten to the point that we can read a story every day about shady characters hacking into company information.

In fact, it’s been reported that LinkedIn is a recent […]

Highlights from The Future of Leadership Luncheon

By |April 21st, 2016|

This is the first of a two-year term in which I’ll serve as the Chairman of the Board for the Center for Houston’s Future (CHF), a think tank of diverse business and civic leaders working […]

Do these three things today to secure your company data

By |April 13th, 2016|

We hear about hackers breaking into company networks nearly every day. They damage, steal, and release sensitive data. They put our companies and customers at risk. If you’re a business leader or IT professional, it’s important […]

Monitoring Windows/AD Authentications and Logon Activity

By |January 14th, 2016|

Microsoft Windows operating systems uses a variety of authentication technologies that allow users access to resources on the network. These authentication protocols include Kerberos, NT LAN Manager (NTLM), Negotiate, Schannel (secure channel) and Digest which […]

Inactive Active Directory User Accounts

By |January 14th, 2016|

Active Directory (AD) users’ IDs that have not been used for extended periods of time pose a threat to any organization, as these IDs could be used to gain illegal access to the network.  Most […]

Auditing and Monitoring Active Directory Group Policies

By |January 14th, 2016|

Group Policy is a core component of Active Directory (AD) used to centrally manage an organizations’ security, application, and user settings. Group Policy settings are divided into user and computer sections, and a policy can […]