Blog

What is Cybersecurity and Cybersecurity Insurance?

While cybersecurity insurance can help protect organizations after a data breach, it should never be a substitute for cybersecurity and risk management.

Blog

6 Essential Steps for an Effective Cybersecurity Risk Assessment

How do you get a comprehensive evaluation of your company’s vulnerability level? And, where do you start? Let’s look at some answers to these questions using the NIST 800-30, as it outlines six steps for an effective cybersecurity risk assessment.

Blog

Data Security: Building a Good Mobile Device Security Policy

Why worry about a mobile device security policy? Let’s discuss establishing a good set of organizational policies related to mobile computing devices.

Blog

Ballast Software FAQs

If you have questions or need support, contact the BALLAST… Read more »

Blog

HIPAA Security Compliance and OCR Audits

Here are the basics for you to keep in mind as you examine the rules and make your decisions about getting ready for the upcoming OCR audits.

Blog

OCR Audit Preparation Checklist for Healthcare

The OCR HIPAA Audit program is designed to analyze processes, controls, and policies of selected covered entities and business associates. The OCR has established a comprehensive audit protocol that contains the requirements to be assessed through these performance audits.

Blog

4 of the Most Expensive Cyber Attacks of 2017

LBMC Information Security looks back at some of the largest (and most expensive) data breaches of the year and ways they could’ve been prevented.

Blog

Risk Assessment 101: What Cybersecurity Professionals Should Know

This article answers why risk assessments have become a primary point of concern for cybersecurity professionals with three reasons: It’s mandatory, a best practice, and supports greater business objectives.

Blog

Ransomware Poses New Challenges for Tax Compliance

According to the IRS, business identity theft is growing and individual identity theft or tax fraud is diminishing.

Blog

The Best Defense Is a Good Offense: An Intro to BALLAST

LBMC Information Security’s now offers a cloud-based risk assessment software platform called Ballast. With Ballast, you can ditch the spreadsheets, and completely automate your organization’s risk assessment process.