Resource

PODCAST: Kaspersky vs the U.S. Government

In this podcast, LBMC Information Security’s Bill Dean discusses Kaspersky’s current battle with the U.S Government, offering several helpful takeaways for cybersecurity professionals.

Resource

PODCAST: Ransomware and Unintended Disclosure

In this podcast, LBMC Information Security’s Bill Dean explains how quick breach recovery hurt this organization and the steps that can be taken to avoid it happening for your own organization.

Blog

Navigating through a complex healthcare environment

As the healthcare industry continues to evolve as does physician practices/ healthcare entities demand for business advisors with expertise in an array of service areas. LBMC currently firm devotes more than 35 percent of its time to the health care industry.

Resource

PODCAST: Another Massive Data Email Breach

In this podcast, LBMC Information Security’s Bill Dean discusses the numerous ways these data breaches are also a risk to your organization.

Resource

PODCAST: The Risks of Remote Access

In this podcast, LBMC Information Security’s Bill Dean discusses the direct risks associated with remote access to Windows servers.

Resource

PODCAST: Attacker Dwell Time

In this podcast, LBMC Information Security’s Bill Dean discusses attacker dwell time and some methods that can be implemented to address it.

Resource

PODCAST: Combating Insider Threats

In this podcast, LBMC Information Security’s Bill Dean addresses insider threats, while offering suggestions on how to combat them with digital forensics.

Resource

PODCAST: Combating Business Email Compromise Attacks

In this podcast, LBMC Information Security’s Bill Dean addresses BEC attacks and offers a few solutions for how to combat business email attackers.

Resource

PODCAST: The Value of Incident Response Tabletop Exercises

In this podcast, LBMC Information Security’s Bill Dean addresses the value of incident response tabletop exercises.

Blog

History of Ransomware and How to Protect Your Organization

The evolution of ransomware from an ineffective nuisance to a sophisticated, lucrative business tool for criminals has been impressive, to say the least.