Blog

SOC for Cybersecurity 101: Key Differences from SOC 2 and Risk Assessments

LBMC Information Security’s Mark Burnette explains the differences between SOC for cybersecurity and risk assessments, as well as tips for how your organization could benefit from from an SOC for Cybersecurity analysis.

Blog

Cyber Monday Internet Safety Tips

It is really important to be safe when you shop online. With online shopping comes some risks, and there are a few things you can do to protect yourself.

Blog

How Dressing Like Batman Can Help You Be Better at Cybersecurity

In the spirit of Halloween, LBMC Information Security’s Mark Burnette shares a personal story about how dressing like Batman can help you be better at cybersecurity.

Blog

Keeping Your Digital Identity Secure

The internet is a great resource for information and entertainment,… Read more »

Blog

How to Build a Cybersecurity Program from the Ground Up

LBMC Information Security’s Mark Burnette outlines simple steps organizations can take to build a cybersecurity program from the ground up.

Blog

6 Myths About PCI Compliance Regulations

Let’s clear up six of the most common misconceptions – and get to the bottom of how PCI compliance regulations really work.

Blog

Three Tenets of Information Security

The CIA triad of confidentiality, integrity, and availability is at the heart of information security.

Blog

Why You Should Not Use an Admin Account

An account with administrative access has the power to make major changes to a system, good and bad. While an administrator would hopefully not do anything nefarious to his/her company’s systems purposefully, the act of using administrative accounts for daily activities can lead to just that.

Blog

MEDIA: Advisory teams may be the vital strategic partner you didn’t know you needed

As disruption continues to hit with increasing speed and impact,… Read more »

Blog

Webinar: Why Cybersecurity Programs Fail

Whether we want to admit it or not, many organizations’… Read more »