LMG Security Blog


Breaches, Digital Forensics, Microsoft Office 365, News, Phishing, Ransomware, Tools

The Office 365 Magic Unicorn Tool Lives!

Compliance, Cybersecurity, Health care, Legal, Privacy

HIPAA Security Rule: 5 Common Shortcomings (Administrative Safeguards)

Breaches, Compliance, Cybersecurity, Government, Health care, Legal, Privacy, Vulnerabilities

Achieve NOTHING™ Cybersecurity Podcast: Anthem’s Record $16M HIPAA Settlement

Breaches, Compliance, Cyberattacks, Cybersecurity, Events, General, Legal, Uncategorized

Achieve NOTHING™ Cybersecurity Podcast: GDPR and the British Airways Data Breach

Breaches, Compliance, Cyberattacks, Cybersecurity, General, Malware, Phishing, Ransomware, Vulnerabilities

Oops! Common Security Gaps That Lead to Security Incidents

Compliance, Cybersecurity, Financial Sector, General, Government, Health care, IT, Legal, Password, Privacy, Tools

RULES, WHAT RULES? The Importance of Communicating Your Organization’s User Security Expectations

Breaches, Cybersecurity, IT, Vulnerabilities

Secure Your Office 365 Accounts

Black Hat, Cyberattacks, Cybersecurity, IoT

Cryptojacking Meets IoT

Breaches, Cyberattacks, Cybersecurity, DDoS, Digital Forensics, General, IT, Network Forensics, Privacy, Tools, Vulnerabilities

RIP Office365 Magic Unicorn Tool

Breaches, Cybersecurity, Digital Forensics, Network Forensics, Tools

Exposing the Secret Office 365 Forensics Tool


CONTACT US