Blog

Overcoming Analysis Paralysis in Choosing a Security Framework

“Which security framework should we use for our cybersecurity program?”… Read more »

Resource

PODCAST: Key Insights on PCI DSS Version 4.0

At the PCI North America Community Meeting in September of… Read more »

Blog

A Step-by-Step Guide to Talking About Cybersecurity Budget Cuts

Despite the increasing awareness for and importance of creating an… Read more »

Blog

Security Leadership Series: 3 (Ineffective) Tactics for Proving the Value of Your Cybersecurity Program

Have you ever felt the need to calculate the value… Read more »

Blog

Cybersecurity is More Than Compliance

LBMC Information Security’s Mark Burnette explains why compliance shouldn’t be the driving factor in evaluating the effectiveness of your cybersecurity program.

Blog

Security Leadership Series: Don’t Be the Only Person Carrying the Mantle for Cybersecurity

The key to success for an effective cybersecurity leader can be found in cultivating those relationships. When your advocates support your ideas and initiatives, your influence spreads.

Blog

Developing an Effective Security Awareness Program

An effective security awareness program must have a variety of communication methods. Six of these highly important topics which will be covered in this article are physical security, password security, phishing, malware, wireless security, and safe internet browsing.

Blog

Security Leadership Series: Take a Partnership Approach to Cybersecurity

Here are two ways you can create partnerships within your organization that support the work you’re doing to build a comprehensive information security program.

Blog

Why You Should Not Use an Admin Account

An account with administrative access has the power to make major changes to a system, good and bad. While an administrator would hopefully not do anything nefarious to his/her company’s systems purposefully, the act of using administrative accounts for daily activities can lead to just that.

Blog

The University of Pittsburgh Data Breach: What We Can Learn

LBMC Information Security’s Mark Burnette analyzes a Pennsylvania Supreme Court Ruling that employers in Pennsylvania are “legally responsible for protecting workers’ sensitive data” and offers a 5-step process for better securing data.