Accounting standards update (“ASU”) No. 2016-14 changed how not-for-profits communicate… Read more »
Category: Compliance and Audit
LBMC Information Security’s Mark Burnette explains why compliance shouldn’t be the driving factor in evaluating the effectiveness of your cybersecurity program.
Cybersecurity insurance might be helpful in an emergency, but it should never replace a comprehensive cybersecurity program.
This article highlights two major factors organizations should consider when choosing a HITRUST assessor.
Maintaining awareness around cybersecurity laws and regulations is a full-time job. Here’s how to do it correctly.
LBMC Information Security gives a brief overview of the HITRUST RightStart Program for startups.
LBMC Information Security’s Mark Burnette analyzes a Pennsylvania Supreme Court Ruling that employers in Pennsylvania are “legally responsible for protecting workers’ sensitive data” and offers a 5-step process for better securing data.
A culture of compliance and security starts with tone-at-the-top. Here are some specific steps to develop healthy security culture at your company.
Here are the four essential steps to developing a comprehensive cybersecurity program.
So, you had a HIPAA breach. Here’s how to handle it effectively.