Beware: Myths about Data Security and HIPAA Compliance

A critical first step in putting a compliant data security solution in place is separating fact from fiction. This article covers four common misassumptions you’ll want to know.

HIPAA Security Compliance: How risk tolerant are you?

By going beyond HIPAA security compliance and examining the underlying risks that the controls address, it’s easier to make decisions in an otherwise ‘loosely’ defined set of regulations.

Protect your end users from cyber-attacks

Protecting your company against end-user attacks requires a two-pronged approach. Read the article for a list of steps to take.

Why the GDPR Should be on Your Radar

LBMC Information Security outlines how the GDPR will impact cybersecurity in the United States and how it differs from current industry regulations.

PODCAST: IIA Knoxville—Risky Business

In this podcast from the Institute of Internal Audit meeting in Knoxville, LBMC Information Security’s Bill Dean and Mark Fulford discuss the importance of risk management, including the effectiveness of risk assessments.