Blog

HITRUST Version 11 – What you need to know!

HITRUST CSF 9.1 expands the Alliance’s mission to create a program that secures information “across all industries.” Here’s what’s new.

Blog

SOC for Cybersecurity 101: Key Differences from SOC 2 and Risk Assessments

LBMC Information Security’s Mark Burnette explains the differences between SOC for cybersecurity and risk assessments, as well as tips for how your organization could benefit from from an SOC for Cybersecurity analysis.

Blog

Cybersecurity and your Supply Chain

As Cybercrime has escalated, cyber conscious organizations have concentrated efforts… Read more »

Blog

Cyber Monday Internet Safety Tips

It is really important to be safe when you shop online. With online shopping comes some risks, and there are a few things you can do to protect yourself.

Blog

Manufacturing Security: Know the Risks and How to Protect

The manufacturing industry overall has historically lagged behind in cybersecurity…. Read more »

Blog

How Dressing Like Batman Can Help You Be Better at Cybersecurity

In the spirit of Halloween, LBMC Information Security’s Mark Burnette shares a personal story about how dressing like Batman can help you be better at cybersecurity.

Blog

Keeping Your Digital Identity Secure

The internet is a great resource for information and entertainment,… Read more »

Blog

How to Build a Cybersecurity Program from the Ground Up

LBMC Information Security’s Mark Burnette outlines simple steps organizations can take to build a cybersecurity program from the ground up.

Blog

6 Myths About PCI Compliance Regulations

Let’s clear up six of the most common misconceptions – and get to the bottom of how PCI compliance regulations really work.