Resource

PODCAST: Law Firms are Cybersecurity Targets

In this podcast, LBMC Information Security’s Bill Dean highlights some specific examples of law firm data breaches and why law firms are such large targets for cyber-thieves.

Resource

PODCAST: Information Security Questions for SMBs

In this podcast, LBMC Information Security’s Bill Dean discusses some information security basics that many organizations are overlooking.

Resource

PODCAST: Manufacturing and Industrial Sectors Are Cybersecurity Targets

In this podcast, LBMC Information Security’s Bill Dean discusses how the manufacturing and industrial sectors are prime targets for cyber-attackers.

Resource

PODCAST: Attacking the InfoSec Supply Chain

In this podcast, LBMC Information Security’s Bill Dean offers valuable insight on attackers who focus on the InfoSec supply chain.

Resource

PODCAST: Kaspersky vs the U.S. Government

In this podcast, LBMC Information Security’s Bill Dean discusses Kaspersky’s current battle with the U.S Government, offering several helpful takeaways for cybersecurity professionals.

Resource

PODCAST: Ransomware and Unintended Disclosure

In this podcast, LBMC Information Security’s Bill Dean explains how quick breach recovery hurt this organization and the steps that can be taken to avoid it happening for your own organization.

Resource

PODCAST: Another Massive Data Email Breach

In this podcast, LBMC Information Security’s Bill Dean discusses the numerous ways these data breaches are also a risk to your organization.

Resource

PODCAST: The Risks of Remote Access

In this podcast, LBMC Information Security’s Bill Dean discusses the direct risks associated with remote access to Windows servers.

Resource

PODCAST: Attacker Dwell Time

In this podcast, LBMC Information Security’s Bill Dean discusses attacker dwell time and some methods that can be implemented to address it.

Resource

PODCAST: Combating Insider Threats

In this podcast, LBMC Information Security’s Bill Dean addresses insider threats, while offering suggestions on how to combat them with digital forensics.