Blog

How to Not Get Hacked

Data compromises are arguably a business’ biggest threat. We’ve watched… Read more »

Resource

PODCAST: New Tools for PCI Compliance

From a high level, PCI compliance is a security and… Read more »

Blog

Network Compromise Analysis: Lessons Learned from Breaches

If you listen to country music on occasion, you might… Read more »

Blog

Digital Forensics—Multi-Factor Authentication and Your Environment, Lawyer Ethical Duties, and More

LBMC Information Security highlights information about how multi-factor authentication affects your environment and recent digital forensics litigation and eDiscovery case law links.

Resource

PODCAST: 2018 Was Second-Most Active Year for Data Breaches

In this podcast, LBMC Information Security’s Bill Dean addresses why 2018 was one of the biggest years for data breaches to date.

Blog

Digital Forensics—Company Legal Processes, Digital Laws, 2018 Data Breaches, and More

LBMC Information Security highlights information about the company legal processes, digital laws and cybersecurity, and recent digital forensics litigation and eDiscovery case law links.

Blog

Digital Forensics—Ransomware History, Rising Risks for Law Firms, and More

LBMC Information Security highlights information about the history of ransomware, rising cyber risks for law firms, and recent digital forensics litigation and eDiscovery case law links.

Blog

Digital Forensics—Vishing, Cloud Takeouts, Metadata, and More

LBMC Information Security highlights information about vishing (or phone phishing scams), cloud takeouts, metadata, and recent digital forensics litigation and eDiscovery case law links.

Blog

eDiscovery or Digital Forensics?

Here’s a brief explanation and comparison of both, as well as a few key reasons that it’s important to know the difference and choose the right experts carefully.

Resource

PODCAST: Targeted Attacks Compared to Opportunistic Attacks

In this podcast, LBMC Information Security’s Bill Dean addresses this question while diving deeper into the key differences between targeted attacks and opportunistic attacks.