Blog

Key Differences Between SOC 2 and SOC for Cybersecurity

While there are some similarities between a SOC 2 report and the new SOC for Cybersecurity reports, LBMC Information Security’s Mark Burnette shares the primary ways these examination reports differ.

Blog

4 of the Most Expensive Cyber Attacks of 2017

LBMC Information Security looks back at some of the largest (and most expensive) data breaches of the year and ways they could’ve been prevented.

Blog

Cybersecurity: Lessons Learned from Equifax Data Breach

In examining the root cause of the Equifax data breach, here are three key things to consider when examining your business’ cybersecurity program.

Blog

The Equifax Data Breach: How Did It Happen?

LBMC Information Security’s Mark Burnette examines the root cause of this data breach and offers three key things to consider in avoiding future data breaches.

Blog

What’s the Difference Between SOC for Cybersecurity & Risk Assessments?

LBMC Information Security’s Mark Burnette explains the differences between SOC for cybersecurity and risk assessments, as well as tips for how your organization could benefit from from an SOC for Cybersecurity analysis.

Blog

4 Ways To Excel at Cybersecurity

At the Tennessee Chamber of Commerce & Industry’s Cybersecurity Conference in Nashville, LBMC Information Security’s Mark Burnette shared four specific strategies to achieving cybersecurity success.

Blog

How to Explain PCI Compliance Penalties to Beginners

Though the Payment Card Industry Data Security Standards (or PCI DSS) applies to every merchant who accepts payment cards, many merchants lack understanding. This article covers four points to convey to a beginner.

Blog

Risk Assessments and Developing a Formal Process

The real objective of a risk assessment is to help management make well-informed decisions about security safeguards that should be in place in the company.