Blog

/Blog

How to Assess Ransomware Risk with LT Auditor+

Ransomware attacks continue to increase every day. Cyber threats are hitting more businesses in the United States and worldwide. According to 2022 – Verizon Data Breach Investigation Report- “this year Ransomware has continued its upward trend with an almost 13% increase–a rise as big as the last five years combined (for a total of 25% […]

By |June 16th, 2022|Blog|0 Comments

YOUR INSIDER THREAT JUST MOVED OUTSIDE YOUR FIREWALL !

YOUR INSIDER THREAT JUST MOVED OUTSIDE YOUR FIREWALL !
You must increase protection of your Home Workers. BLUE LANCE HELPS

 

Auditing & Compliance must now expand to include remote workstations!

 

BLUE LANCE is taking immediate steps to assist businesses in securing their networks and remote working employees during the upcoming months.

 

Auditing & Compliance must now expand to include remote workstations!

Track all […]

By |May 5th, 2020|Blog, Uncategorized|0 Comments

Blue Lance Is Giving Schools and Colleges Cybersecurity Tools For Free

_______________________________________________________________________________________________________________________________

“COVID-19 should not be allowed to disrupt the education of our kids. They should be able to continue learning safely from home during this time”

Umesh Verma, CEO, BLUE LANCE

_______________________________________________________________________________________________________________________________

As schools shut down in an effort to contain the COVID-19 virus, Verma made the decision to help keep schools operating securely so that students could continue […]

By |April 11th, 2020|Blog|0 Comments

Cybersecurity tools are complicated and expensive! What does a business leader do?

The cost of breach events is estimated at nearly $900,000 for even small and mid-sized businesses. It is a huge expense and it continues to climb. A ransomware attack can be a truly existential event for companies which don’t have financial and technical resources and business continuation and recovery plans in place.

How do small and […]

By |January 20th, 2020|Blog|0 Comments

Surviving a Breach

Banking Viability in a threatening world of Cyber-Insecurity
You will be breached, there is no doubt. What you do about it is critical.

Cybersecurity is creating a lot of noise and many claims are being made about how to protect your bank. Defense in depth is often the core standard for protection. You have to surveil your […]

By |October 15th, 2019|Blog|0 Comments

Banking Viability in a threatening world of Cyber-Insecurity:

How can you cost effectively secure your Bank’s business information, protect your assets and reputation and ensure your long-term viability?

A mature Cybersecurity posture and business recovery preparations are necessary to survive in today’s threatening environment of world-wide attackers intent on taking your money, ransoming your business information and destroying your Bank’s reputation.

BLUE LANCE is a […]

By |October 4th, 2019|Blog|0 Comments

Yes, the Equifax Data Breach Can Hurt Your Business Too

If you’ve tuned into the news lately, chances are you’ve heard about the Equifax data breach. Here’s what happened.

On July 29, as many as 143 million Americans’ Social Security numbers, birth dates, addresses, and other pieces of sensitive information were reported stolen from Equifax. Credit card numbers were also leaked. The stolen data caused millions […]

By |October 2nd, 2017|Blog|0 Comments

When Age Matters in Your Organization

A series on password policies

Many people consider it a harmless rite of passage to lie about their age. In fact, in a study of 1,000 college students, nearly two-thirds admitted to using fake IDs to get around the legal drinking age.

Unfortunately, this kind of get-around isn’t relegated to our youth. When it comes to password […]

By |September 11th, 2017|Blog|0 Comments

Hackers and Hurricane Harvey

How to Prevent Cyber Crime during a Natural Disaster

August 29, 2017 (Houston) – Hurricane Harvey just crippled much of the Gulf coast region in Texas – and the damage isn’t over yet. With over 30,000 people displaced to temporary shelters and thousands of calls flooding 911 dispatchers, all eyes are on rescue efforts.

As a business […]

By |August 29th, 2017|Blog|0 Comments

When Familiarity Breeds Contempt from Your Cyber Enemies

A series on password policies

We’re all creatures of habit. We tend to eat at the same restaurants, sit in our same spots, and place the same dinner orders. Researchers have found that these autopilot responses can be helpful. They free our minds to focus on more important decisions.

So it’s no surprise that we’re creatures of […]

By |June 27th, 2017|Blog|0 Comments