Resource

Webinar: Purple-Teaming & Attack Simulation

In this webinar presentation, LBMC Information Security’s Bill Dean discusses the practices of purple-teaming and attack simulation in relation to penetration testing.

Resource

PODCAST: Attack Simulation

In this podcast, LBMC Information Security’s Bill Dean discusses attack simulation, or what some people label adversary simulation.

Resource

PODCAST: Purple-Teaming

In this podcast, LBMC Information Security’s Bill Dean helps purple-teaming, as well some of the benefits involved with the practice.

Blog

What You Should Know About Purple-Teaming and Attack Simulations

Purple-teaming can help your network reach a new level of security. LBMC Information Security explains how.

Blog

Data Security: Business IT Policy for Mobile Devices

If you can’t remember the last time you signed your business’ IT policy, use this checklist to spur conversation about your business’ data security.

Resource

PODCAST: Why Employees Are Your Number One Risk

LBMC Information Security’s Bill Dean explains why ongoing employee security training is crucial to ensuring employees know how to spot a hacking attempt, ultimately protecting your organization from a potential cyber-attack.

Blog

How to Identify a Phone Phishing Scam

LBMC Information Security shares a real-life phone phishing scam account and some tips for how to be prepared in case it happens to you.

Resource

PODCAST: Phishing Emails with 100% Click Rate

In this podcast, LBMC Information Security’s Bill Dean shares some reasons why training employees to spot phishing emails, messages, and pre-texting calls can’t be done just once or once a year.

Blog

The What, Why, and How of Digital Forensics in 2018

LBMC Information Security’s Bill Dean explains the detailed process of digital forensics analysis and why it’s important for businesses to consider.

Resource

PODCAST: 5 Reasons Why Organizations Don’t Detect a Cyber Breach

In this podcast, LBMC Information Security’s Bill Dean shares five key reasons why organizations don’t detect cyber breaches, as well as some helpful tips for being prepared in the event of a cyber-attack.