Resource

PODCAST: IIA Knoxville—Dear President Trump

In this podcast, LBMC Information Security’s Mark Burnette discusses his elevator pitch to President Donald Trump on what the President should be doing to address cybersecurity issues at the federal level.

Blog

Will Blockchain Revolutionize the Way We Approach Healthcare Security?

LBMC Information Security explores how blockchain could revolutionize healthcare security and provides potential use cases for hospitals and providers.

Blog

Security Concerns with Bitcoin and Other Cryptocurrencies

LBMC Information Security shares a basic and brief overview of Bitcoin, cryptocurrencies, and what to know about the growing security concerns surrounding this new cultural wave.

Blog

What to Know About the Spectre and Meltdown Chip Flaws

LBMC Information Security shares essential information about the Spectre and Meltdown chip flaws relating to how these vulnerabilities happened, who’s at risk, and how to protect yourself.

Resource

PODCAST: SOC for Cybersecurity

In this podcast, LBMC Information Security’s Mark Burnette and Drew Hendrickson discuss SOC for Cybersecurity reports and what organizations and IT professionals should know about this new report and how it could help their organizations.

Blog

Podcast: New Cybersecurity Threats for Healthcare and Hospitals

With the wave of highly publicized cyberattacks on healthcare, the challenges of data security and compliance have only multiplied. Mark Burnette, Shareholder with LBMC Information Security, talks about some of these challenges.

Blog

4 Steps for Effective Information Technology

For those CPAs who deal with their organization’s IT functions, this article will provide you with key considerations to ensure your IT department fulfills its objectives.

Blog

How to Protect Your Business During the Holiday Hacking Surges

LBMC Information Security shares tips for how retailers and banks can prepare for the surge in cyber attacks around the holidays.

Blog

The Value of an Outside Perspective on Your IT Department and Approach

Here are three specific ways an outside perspective can be beneficial when it comes to managing your IT security program.

Blog

Is Your POS Card Payment System Protected Against Malware?

What can a retailer do to reduce its susceptibility to POS-based malware? This article shares eight tips.