Blog

Security Concerns with Bitcoin and Other Cryptocurrencies

LBMC Information Security shares a basic and brief overview of Bitcoin, cryptocurrencies, and what to know about the growing security concerns surrounding this new cultural wave.

Blog

What to Know About the Spectre and Meltdown Chip Flaws

LBMC Information Security shares essential information about the Spectre and Meltdown chip flaws relating to how these vulnerabilities happened, who’s at risk, and how to protect yourself.

Blog

The Value of an Outside Perspective on Your IT Department and Approach

Here are three specific ways an outside perspective can be beneficial when it comes to managing your IT security program.

Blog

Is Your POS Card Payment System Protected Against Malware?

What can a retailer do to reduce its susceptibility to POS-based malware? This article shares eight tips.

Blog

Key Differences Between SOC 2 and SOC for Cybersecurity

While there are some similarities between a SOC 2 report and the new SOC for Cybersecurity reports, LBMC Information Security’s Mark Burnette shares the primary ways these examination reports differ.

Blog

Cybersecurity: Lessons Learned from Equifax Data Breach

In examining the root cause of the Equifax data breach, here are three key things to consider when examining your business’ cybersecurity program.

Blog

The Equifax Data Breach: How Did It Happen?

LBMC Information Security’s Mark Burnette examines the root cause of this data breach and offers three key things to consider in avoiding future data breaches.

Blog

What’s the Difference Between SOC for Cybersecurity & Risk Assessments?

LBMC Information Security’s Mark Burnette explains the differences between SOC for cybersecurity and risk assessments, as well as tips for how your organization could benefit from from an SOC for Cybersecurity analysis.

Blog

Tennessee Clarifies Safe Harbor in its Amended Data Breach Notification Law

Tennessee restored the safe harbor provision with an update to the breach notification law. It states that firms do not need to disclose an event if the stolen data has been encrypted in accordance with the current version of the FIPS 140-2.

Blog

4 Ways To Excel at Cybersecurity

At the Tennessee Chamber of Commerce & Industry’s Cybersecurity Conference in Nashville, LBMC Information Security’s Mark Burnette shared four specific strategies to achieving cybersecurity success.