Blog

/Blog

PCI DSS Compliance Update Regarding Transfer of Responsibilities to Merchants

The new technology used in credit cards is the chip technology. Cards with chips are known as EMV cards. EMV stands for Europay, MasterCard, Visa. EMV cards come in two flavors – chip and PIN or chip and signature. MasterCard acquired Europay in 2002. EMV cards are in use in Europe since 1992. Unlike the […]

By |December 23rd, 2014|Blog|0 Comments

Cyber Attacks – Today’s Biggest Business Monster

“Cyber attacks are the most menacing threat organizations face today.”

Everyday law enforcement agencies shut down businesses because their computing systems have been turned into attack weapons , critical infrastructure shut down and highly sensitive information stolen by cyber criminals costing organizations millions. The FBI says the average time a security breach goes undetected is 320 […]

By |September 19th, 2013|Blog|Comments Off on Cyber Attacks – Today’s Biggest Business Monster

Cyber Threat: The Impact on Small and Medium Businesses

Small and medium businesses will want to attend this week’s GHP President’s Council luncheon – Cyber Threat: The Impact on Small and Medium Businesses.  The first of more cyber security presentations Houston can expect from Blue Lance in 2013.

The President’s Council is convening on Thursday, May 30, and you are invited. GHP President and CEO Bob Harvey presides over luncheons […]

By |May 29th, 2013|Blog|Comments Off on Cyber Threat: The Impact on Small and Medium Businesses

Cybersecurity Readiness Can’t Wait!

Yesterday the NYSE went into a free fall because of a bogus AP tweet resulting from a spear phishing attack. The stock market quickly recovered once the phishing attack was exposed. However, it was not without incident.

Due to the pervasiveness of today’s cyber threats, its time to shore up cybersecurity readiness enabling your organization to:

detect […]

By |April 24th, 2013|Blog|Comments Off on Cybersecurity Readiness Can’t Wait!

Cyber Theft-Targeting Intellectual Property

Cyber Theft Can Cripple Business in 2013
 

Cyber theft is the biggest external threat for companies by targeting their confidential information/intellectual property. In 2012,  $13 billion was lost in cyber  theft.

Cyber-espionage is one of the fastest growing crimes in the United States. Government and corporate secrets are targeted daily. Domestic and international cyber thieves target organizations […]

By |January 27th, 2013|Blog|Comments Off on Cyber Theft-Targeting Intellectual Property

Cyber Warfare – the threat to businesses

 Is Cyber Warfare Our Vulnerable Point in 2013?
The threat of being hacked for a hacker’s personal gain has been eclipsed with the advent of Nation States sponsored hacking factories. There is a growing concern that the next major war will include sophisticated Cyber warfare techniques and weapons. It makes sense.  The USA, China and Russia […]

By |January 9th, 2013|Blog|Comments Off on Cyber Warfare – the threat to businesses

Closing Door on a Cyberheist, Opening Door for Cyber Self Governance

…a story of a cyberheist concludes…or does it?

“Thank you, Marie” said Veronica. “We also want you to know that we have obtained a new solution called LT Auditor+ that will allow us to more effectively minimize today’s cyber threats with powerful, proactive self governance.”

“Would it be alright if I am here when Mr. Burrough returns?” […]

By |January 3rd, 2013|Blog|Comments Off on Closing Door on a Cyberheist, Opening Door for Cyber Self Governance