
LBMC Information Security highlights information about how multi-factor authentication affects your environment and recent digital forensics litigation and eDiscovery case law links.
LBMC Information Security highlights information about how multi-factor authentication affects your environment and recent digital forensics litigation and eDiscovery case law links.
LBMC Information Security’s Mark Burnette explains why compliance shouldn’t be the driving factor in evaluating the effectiveness of your cybersecurity program.
Cybersecurity insurance might be helpful in an emergency, but it should never replace a comprehensive cybersecurity program.
LBMC Information Security highlights information about the company legal processes, digital laws and cybersecurity, and recent digital forensics litigation and eDiscovery case law links.
Maintaining awareness around cybersecurity laws and regulations is a full-time job. Here’s how to do it correctly.
The key to success for an effective cybersecurity leader can be found in cultivating those relationships. When your advocates support your ideas and initiatives, your influence spreads.
LBMC Information Security highlights information about the history of ransomware, rising cyber risks for law firms, and recent digital forensics litigation and eDiscovery case law links.
Here are two ways you can create partnerships within your organization that support the work you’re doing to build a comprehensive information security program.
Each cybersecurity vendor poses a specific risk to every business. Here’s how to identify and manage those risks.
LBMC Information Security’s Mark Burnette analyzes a Pennsylvania Supreme Court Ruling that employers in Pennsylvania are “legally responsible for protecting workers’ sensitive data” and offers a 5-step process for better securing data.