Latest Blog Post

read more

Upcoming Events

September 16, 2015 - LMG will teach "Digital First Responder Training" at our World Headquarters in Missoula, MT. Sign up now!

September 22, 2015 - LMG will teach "Digital First Responder Training" in Billings, MT. Sign up now!


Congratulations to all the teams that participated in the Network Forensics Puzzle Contest at DEF CON 23! View contest results, hints, and passwords here.

We're pleased to announced that Network Forensics Puzzle DVDs from 2011, 2012, and 2014 are all available on BytePuzzles!

LinkedIn Reddit Delicious Technorati Twitter Digg Stumbleupon

Join our Email Newsletter

Send your cybersecurity questions to for the chance to have them answered in our newsletter!

Class and Book

Want "Network Forensics" (the class) taught privately at your facilities? Request an Onsite

Order Network Forensics: Tracking Hackers Through Cyberspace!

Need Expert Consulting?

Request a Quote

Email Us an RFP

Whether you're a health care organization with a mature HIPAA compliance program, or a business associate just getting started, LMG can help your achieve and maintain HIPAA compliance. LMG consultants are experts in providing real-world security solutions, while satisfying requirements of HIPAA/HITECH. We can help you manage your ongoing compliance requirements efficiently and effectively. The key to security is organized management of your IT resources which fits within your budget. We get to the root of security issues and help you build a strong, easy-to-manage, compliant foundation.
Service Description Details
HIPAA Evaluation Certification Package Meet the HIPAA evaluation requirement (§164.308(a)(8)) and receive a letter of certification.

This package includes:

  • External penetration test and/or vulnerability assessment
  • Internal penetration test and/or vulnerability assessment
  • Policy/procedure gap analysis and/or review (for HIPAA compliance)
  • HIPAA Evaluation Certification
HIPAA Risk Analysis

Meet the HIPAA risk analysis requirement (§164.308(a)(1)(ii)(A)).

Suitable for compliance with Meaningful Use core objective specification to "Conduct or review a security risk analysis in accordance with the requirements under 45 CFR 164.308(a)(1)".

A comprehensive security risk analysis, based on review of your policies, procedures, and technical testing results. May be bundled with technical testing.

LMG's risk analysis methodology is based on the following guidance issued by the United States federal government:

Technical Security Assessment Assess the security of your IT infrastructure. Identify vulnerablities before hackers do. Check the security of your web applications, network, mobile devices, and more. Comply with HIPAA requirements for technical testing and risk management.

Choose the security testing services that fit your needs:

HIPAA Gap Analysis Meet HIPAA requirement §164.308(a)(8) for non-technical evaluation. Identify gaps and receive prioritized recommendations for fulfilling HIPAA requirements.

Evaluate your existing processes and procedures to verify compliance with the HIPAA Security Rule and identify any gaps. Includes:

  • Careful review of your documented policies and procedures
  • Interviews with staff
  • Site walk-through assessment

You receive a detailed report documenting your compliance with each section of the HIPAA Security Rule, along with recommendations for filling any gaps.

Policy/Procedure Development and Review Develop policies and procedures to meet HIPAA compliance needs and security best practices.

Let us develop and revise your policies, to help you:

  • Comply with the HIPAA Security Rule
  • Set realistic and achievable guidelines
  • Reflect the unique needs of your organization
  • Establish an adaptable and scalable policy framework

Our speciality is creating customized policy frameworks that are realistic and work long-term.

Security Training Conduct HIPAA training to ensure that ePHI is properly handled by your workforce. Provide specialized security training for security team and incident handlers.

Strengthen your security posture and meet compliance requirements through in-depth training: