Blog

Key Differences Between SOC 2 and SOC for Cybersecurity

While there are some similarities between a SOC 2 report and the new SOC for Cybersecurity reports, LBMC Information Security’s Mark Burnette shares the primary ways these examination reports differ.

Blog

Cybersecurity: Lessons Learned from Equifax Data Breach

In examining the root cause of the Equifax data breach, here are three key things to consider when examining your business’ cybersecurity program.

Blog

PCI Compliance Fees, Fines, and Penalties: What Happens After a Breach?

What exactly happens to a business when it’s caught out of compliance? This article covers PCI compliance fees, fines and penalties that could happen after a breach.

Blog

Tips to Reduce the Risk of Data Theft In Your Company

This article covers tips for companies to reduce the risk of data theft and help keep IT systems and sensitive information protected from compromise.

Blog

The Equifax Data Breach: How Did It Happen?

LBMC Information Security’s Mark Burnette examines the root cause of this data breach and offers three key things to consider in avoiding future data breaches.

Blog

What’s the Difference Between SOC for Cybersecurity & Risk Assessments?

LBMC Information Security’s Mark Burnette explains the differences between SOC for cybersecurity and risk assessments, as well as tips for how your organization could benefit from from an SOC for Cybersecurity analysis.

Blog

Tennessee Clarifies Safe Harbor in its Amended Data Breach Notification Law

Tennessee restored the safe harbor provision with an update to the breach notification law. It states that firms do not need to disclose an event if the stolen data has been encrypted in accordance with the current version of the FIPS 140-2.

Blog

4 Ways To Excel at Cybersecurity

At the Tennessee Chamber of Commerce & Industry’s Cybersecurity Conference in Nashville, LBMC Information Security’s Mark Burnette shared four specific strategies to achieving cybersecurity success.

Blog

6 Ways Everyone Can Help Protect Against Cyber Attacks

It is important to remember that cybersecurity is not just the responsibility of the IT department within an organization. Everyone in the company can (and should) play a part in protecting against threats and helping to avoid malware infections and cyber breaches.

Blog

How to Explain PCI Compliance Penalties to Beginners

Though the Payment Card Industry Data Security Standards (or PCI DSS) applies to every merchant who accepts payment cards, many merchants lack understanding. This article covers four points to convey to a beginner.