Blog

How to Identify a Phone Phishing Scam

LBMC Information Security shares a real-life phone phishing scam account and some tips for how to be prepared in case it happens to you.

Blog

Manufacturers Protect Against Cyber Attacks

It is important to remember that cybersecurity is not just the responsibility of the IT department within an organization. Everyone in the company can (and should) play a part in protecting against threats and helping to avoid malware infections and cyber breaches.

Blog

How to Not Get Hacked

Data compromises are arguably a business’ biggest threat. We’ve watched… Read more »

Resource

PODCAST: New Tools for PCI Compliance

From a high level, PCI compliance is a security and… Read more »

Blog

Network Compromise Analysis: Lessons Learned from Breaches

If you listen to country music on occasion, you might… Read more »

Blog

Digital Forensics—Multi-Factor Authentication and Your Environment, Lawyer Ethical Duties, and More

LBMC Information Security highlights information about how multi-factor authentication affects your environment and recent digital forensics litigation and eDiscovery case law links.

Resource

PODCAST: 2018 Was Second-Most Active Year for Data Breaches

In this podcast, LBMC Information Security’s Bill Dean addresses why 2018 was one of the biggest years for data breaches to date.

Blog

Digital Forensics—Company Legal Processes, Digital Laws, 2018 Data Breaches, and More

LBMC Information Security highlights information about the company legal processes, digital laws and cybersecurity, and recent digital forensics litigation and eDiscovery case law links.

Blog

Digital Forensics—Ransomware History, Rising Risks for Law Firms, and More

LBMC Information Security highlights information about the history of ransomware, rising cyber risks for law firms, and recent digital forensics litigation and eDiscovery case law links.

Blog

Digital Forensics—Vishing, Cloud Takeouts, Metadata, and More

LBMC Information Security highlights information about vishing (or phone phishing scams), cloud takeouts, metadata, and recent digital forensics litigation and eDiscovery case law links.