Blog

What is Cybersecurity and Cybersecurity Insurance?

While cybersecurity insurance can help protect organizations after a data breach, it should never be a substitute for cybersecurity and risk management.

Blog

Data Security: Building a Good Mobile Device Security Policy

Why worry about a mobile device security policy? Let’s discuss establishing a good set of organizational policies related to mobile computing devices.

Blog

HIPAA Security Compliance and OCR Audits

Here are the basics for you to keep in mind as you examine the rules and make your decisions about getting ready for the upcoming OCR audits.

Blog

OCR Audit Preparation Checklist for Healthcare

The OCR HIPAA Audit program is designed to analyze processes, controls, and policies of selected covered entities and business associates. The OCR has established a comprehensive audit protocol that contains the requirements to be assessed through these performance audits.

Blog

4 of the Most Expensive Cyber Attacks of 2017

LBMC Information Security looks back at some of the largest (and most expensive) data breaches of the year and ways they could’ve been prevented.

Blog

Risk Assessment 101: What Cybersecurity Professionals Should Know

This article answers why risk assessments have become a primary point of concern for cybersecurity professionals with three reasons: It’s mandatory, a best practice, and supports greater business objectives.

Blog

Ransomware Poses New Challenges for Tax Compliance

According to the IRS, business identity theft is growing and individual identity theft or tax fraud is diminishing.

Blog

Ten Tips to Consider for Reducing Risk from Employees

While it’s true you cannot totally eliminate the IT security risks from a trusted insider, you can certainly do some things to help reduce it.