Uncategorized

/Uncategorized

YOUR INSIDER THREAT JUST MOVED OUTSIDE YOUR FIREWALL !

YOUR INSIDER THREAT JUST MOVED OUTSIDE YOUR FIREWALL !
You must increase protection of your Home Workers. BLUE LANCE HELPS

 

Auditing & Compliance must now expand to include remote workstations!

 

BLUE LANCE is taking immediate steps to assist businesses in securing their networks and remote working employees during the upcoming months.

 

Auditing & Compliance must now expand to include remote workstations!

Track all […]

By |May 5th, 2020|Blog, Uncategorized|0 Comments

Ransomware research shows attacks are expensive and pervasive.

Ransomware research shows that the costs of ransomware attacks and recovery continue to be very expensive and pervasive. A recent report by the security team at KPN, a Dutch telecommunications provider indicates their research over a large number of ransomware attacks using just one particular attack tool found that the average ransomware demand was $260,000. […]

By |January 28th, 2020|Uncategorized|0 Comments

Fostering Cybersecurity Education and Discussion with C-Level Banking Executives

I had a conversation with a C-level banker last week who asked me what my mission, our company’s mission is. Here is how I replied:
Fostering education and discussion about affordable and effective cybersecurity and compliance solutions among C-level executives in small to mid-sized regional banks is critical. C-level executives are ultimately responsible for their organization’s […]

By |November 20th, 2019|Uncategorized|0 Comments

Harvey, Irma, and You: Protecting Your Business from Cyber Criminals after a Natural Disaster

It’s a sad reality: When a natural disaster hits, it brings on more than a storm surge. Surges in cybercrime rise as well.

This year has been particularly devastating for natural disasters. Our very own Houston was hit hard by Hurricane Harvey. Florida was pummeled, causing record level flooding when Hurricane Irma made landfall. Mexico has […]

By |October 23rd, 2017|Uncategorized|0 Comments

I$ Thi$ P@$$w0rd C0mp1ex En0ugh?

A series on password policies

Have you seen the password joke that’s gone viral? It’s a computer prompt saying, “Sorry, but your password must contain an uppercase letter, haiku, gang sign and hieroglyph.”

It wouldn’t be so funny if it wasn’t so true. It can seem like passwords are taken entirely too seriously. Which makes complexity requirements […]

By |July 24th, 2017|Uncategorized|0 Comments

The Silent Accomplice in Your Office Environment

Part two of a three-part series on system access assessments

You probably hear all the time about the increasing sophistication of cyber attackers. But did you know that a whopping 85 percent of attacks are preventable? That’s what the United States Computer Emergency Readiness Team estimated in a 2015 report.

The truth is that most cyber dangers […]

By |March 10th, 2017|Uncategorized|0 Comments

Disgruntled versus happy employees: Why they both pose cyber risks

Part one of a three-part series on system access assessments

It’s probably the worst nightmare of any employer: When a former employee with a grudge hacks your company.

According to the Federal Bureau of Investigation and the Homeland Security Department, this kind of revenge is on the rise. “Companies victimized by current or former employees incur costs ‘from […]

By |February 28th, 2017|Uncategorized|0 Comments

The most dangerous myth about cybercrime

“It won’t happen to me.”

When it comes to cybercrime, this is the most common myth. It’s also the most dangerous myth.

That’s because the evidence tells us otherwise. Statistical research says that at least 18 people are victims of cybercrime per second. That means that in the time it takes you to read this article, about […]

By |January 25th, 2017|Uncategorized|0 Comments

The 2016 Holiday Must-Have List

We all know the universal rule of thumb for gift-giving: “It’s the thought that counts.”

But I think kids everywhere would agree there’s also a universal gift-giving faux pas. It’s when a child rips open a gift and squeals in delight to find a shiny new toy all for him – only to discover batteries […]

By |December 7th, 2016|Blog, Uncategorized|0 Comments

Once More into the Breach

 

You may have heard the big news. It was announced in September that 500 million Yahoo accounts had been hacked, resulting in one of the most catastrophic data breaches in U.S. history.

 

What was compromised?

 

Yahoo’s statement on the hack indicated that the stolen information includes names, email addresses, telephone numbers, dates of birth, and even the answers […]

By |November 23rd, 2016|Uncategorized|0 Comments