Blog

3 Ways to Protect Your Data on Facebook

The Facebook Cambridge Analytica data breach affected 50 million users. Here’s what happened and how you can protect yourself.

Blog

Why and How to Disclose Data Breaches

LBMC Information Security’s Mark Burnette provides insights into how to disclose a data breach in a way that aligns with industry and state regulations.

Blog

What is Internal Network Pen Testing and Why Do You Need It?

LBMC Information Security’s Matt Smith highlights the growing importance of internal network penetration testing and how organizations can use it to protect against insider threats.

Blog

PODCAST: 5 Reasons Why Organizations Don’t Detect a Cyber Breach

Incident response consultants are often contacted by clients who are… Read more »

Blog

Security Concerns with Bitcoin and Other Cryptocurrencies

LBMC Information Security shares a basic and brief overview of Bitcoin, cryptocurrencies, and what to know about the growing security concerns surrounding this new cultural wave.

Blog

4 of the Most Expensive Cyber Attacks of 2017

LBMC Information Security looks back at some of the largest (and most expensive) data breaches of the year and ways they could’ve been prevented.

Blog

Cybersecurity: Lessons Learned from Equifax Data Breach

In examining the root cause of the Equifax data breach, here are three key things to consider when examining your business’ cybersecurity program.

Blog

The Equifax Data Breach: How Did It Happen?

LBMC Information Security’s Mark Burnette examines the root cause of this data breach and offers three key things to consider in avoiding future data breaches.

Blog

Risk Assessments and Developing a Formal Process

The real objective of a risk assessment is to help management make well-informed decisions about security safeguards that should be in place in the company.