Blog

Mitigating Privileged User Insider Threats

Before an organization can address privileged user insider threats and implement the right monitoring and mitigation best practices, it must first define the privileged user.

Blog

NEWS: Great Place to Work® Names LBMC One of the 2021 Best Workplaces in Consulting and Professional Services™

LBMC Makes its Debut on Prestigious National List Great Place… Read more »

Blog

Merging employee benefit plans in corporate mergers and acquisitions

According to Forbes and Fortune, global M & A activity… Read more »

Blog

What should be considered from a cybersecurity perspective before entering an acquisition?

Due diligence is very much like a home inspection when… Read more »

Blog

Information security due diligence in a potential acquisition

While evaluating the target company’s financial statements and other key indicators, it’s also important to assess the firm’s cybersecurity risk exposure.

Blog

Webinar: Tips for Working Remotely

Even before the  pandemic, many of us were working from… Read more »

Blog

Prepare for an Audit of Financial Statements

The objective of a financial statement audit is the expression… Read more »

Blog

Ransomware: Advancing to the Next Level

Ransomware is arguably the most devastating cybersecurity threat that organizations have ever faced, and it is not like other typical cybersecurity threats. LBMC has partnered with leading law firms to discuss the technical and legal issues revolving around ransomware.

Blog

Three Reasons a Daily Money Manager is Right for You

Keeping track of your money can often feel like a… Read more »

Blog

Cryptocurrency and Tax Planning

Most of us are familiar with some forms of digital… Read more »