Blog

Discover the Right SOC Report for Your Organization

The first step to SOC completion is selecting the right report. Depending on your circumstances, one may be required over another.

Blog

PCI Compliance Fees, Fines, and Penalties: What Happens After a Breach?

What exactly happens to a business when it’s caught out of compliance? This article covers PCI compliance fees, fines and penalties that could happen after a breach.

Blog

The Impact of Remote Work on IT Attestation Audits

Remember earlier this year when everything was business as usual?… Read more »

Blog

How to Respond When a Security Breach Occurs

Preparation for a security breach is a vital component to mitigating cyber threats.

Blog

Data Security: Building a Good Mobile Device Security Policy

Why worry about a mobile device security policy? Let’s discuss establishing a good set of organizational policies related to mobile computing devices.

Blog

Why Multi-Factor Authentication Is a Must

LBMC Information Security explains multi-factor authentication, its benefits, and how it can be applied for organizations.

Blog

Incident Response Tabletop Exercises Improve Security Programs

Incident response tabletop exercises are one of the most valuable scenario-based approaches to improving your security program. Learn more.

Blog

What Healthcare Organizations Need to Know About PCI Compliance for Mobile Payments

With HIPAA compliance programs in place, healthcare companies are now focusing attention towards PCI 3.1 compliance.

Blog

Tips to Reduce the Risk of Data Theft in Your Company

This article covers tips for companies to reduce the risk of data theft and help keep IT systems and sensitive information protected from compromise.

Blog

4 Steps for Effective Information Technology

For those CPAs who deal with their organization’s IT functions, this article will provide you with key considerations to ensure your IT department fulfills its objectives.