Blog

4 Steps for Effective Information Technology

For those CPAs who deal with their organization’s IT functions, this article will provide you with key considerations to ensure your IT department fulfills its objectives.

Blog

How to Prevent Hackers During the Holidays

LBMC Information Security shares tips for how retailers and banks can prepare for the surge in cyber attacks around the holidays.

Blog

Will Blockchain Revolutionize the Way We Approach Healthcare Security?

Companies operating in blockchain technology have begun to rethink and reshape their funding model in response to regulatory pressures. It is essential to have your tax advisor involved from the beginning of the ICO process.

Blog

PODCAST: Key Insights on PCI DSS Version 4.0

At the PCI North America Community Meeting in September of… Read more »

Blog

3 Ways to Protect Your Data on Facebook

The Facebook Cambridge Analytica data breach affected 50 million users. Here’s what happened and how you can protect yourself.

Blog

Why and How to Disclose Data Breaches

LBMC Information Security’s Mark Burnette provides insights into how to disclose a data breach in a way that aligns with industry and state regulations.

Blog

Security Concerns with Bitcoin and Other Cryptocurrencies

LBMC Information Security shares a basic and brief overview of Bitcoin, cryptocurrencies, and what to know about the growing security concerns surrounding this new cultural wave.

Blog

4 of the Most Expensive Cyber Attacks of 2017

LBMC Information Security looks back at some of the largest (and most expensive) data breaches of the year and ways they could’ve been prevented.

Blog

Cybersecurity: Lessons Learned from Equifax Data Breach

In examining the root cause of the Equifax data breach, here are three key things to consider when examining your business’ cybersecurity program.

Blog

The Equifax Data Breach: How Did It Happen?

LBMC Information Security’s Mark Burnette examines the root cause of this data breach and offers three key things to consider in avoiding future data breaches.