26

Feb 2015

Don’t Learn You’ve been Breached from Your Customers. Get a DBTA Instead.

How would you like to learn that your company’s network has been breached from a customer, a business associate or even the FBI? Unfortunately, most companies – 61 percent according to the U.S. Secret Service – find out they’ve been breached from an outside source and usually months after the initial breach. Many computer security breaches occur today because of the time lag between discovery...

Read More


19

Feb 2015

Report: Cyber Thieves will Increasingly Target Healthcare Companies

Your healthcare company has data – not just any data, but Protected Healthcare Information (PHI). And, at least one report predicts that the data you have will be increasingly targeted by cyber-thieves who want that information. Healthcare records hold a cornucopia of Personally Identifiable Information (PII) that can be used in multiple follow-up attacks and various kinds of fraud. In 2013, 43 percent of all...

Read More


12

Feb 2015

Will the PCI Council Kill SSL Usage?

In a recent release of the Council’s Assessor Newsletter, which is distributed by the Payment Card Industry (PCI) council, contains an interesting paragraph that will cause some concerns among businesses that have to comply with PCI for online transactions. Notice: PCI DSS and PA-DSS v3.1 Revisions Coming In order to address a few minor updates and clarifications and one impacting change, there will be a...

Read More


09

Feb 2015

To Stop a Cyber Thief: Watch Your Data Flow

You’ve got the data and cyber thieves want it. But, if you know how your data flows, you can start controlling who has access to it and how it’s classified. “Customers look at their data and think that it’s just on their computer,” said Sword & Shield Security Analyst Rocky Breeden. “But really, that data is traversing the network and, if it’s in plain text...

Read More


06

Feb 2015

Bill Dean Discusses the Anthem Hack with the Knoxville News Sentinel

Sword & Shield’s Bill Dean discusses the recent Anthem Inc. hack with the Knoxville News Sentinel: The information that was retrieved by the hackers is “personally identifying information” and arguably more valuable than the credit card numbers stolen in recent retailer data breaches, said Bill Dean, director of forensics and security assessments at Sword & Shield Enterprise Security in Knoxville. The timespan criminals have to...

Read More


03

Feb 2015

Unpatched Adobe Flash Player Vulnerability Allows Hackers to Take Control of System

Adobe Systems warned users that hackers are exploiting another unpatched vulnerability in Flash Player, which is the third vulnerability in the past month. There are reports that the vulnerability is being actively exploited in drive-by-download attacks that target systems running Flash Player under Internet Explorer or Mozilla Firefox on Windows 8.1 and earlier, according to an Adobe alert. Adobe said in a security advisory published...

Read More


30

Jan 2015

Three Things to Know About Modern Mobile Forensics

When I started in digital forensics many years ago, the computer was “king” for the valuable information we sought for our clients. Times have definitely changed over the past few years. While computers still provide great value in our investigations, mobile devices such as tablets and smart phones are now becoming a valuable asset in many cases. We are finding that mobile devices are proving...

Read More


20

Jan 2015

Don’t Click that Link! Have a Back-up Plan to Mitigate Social Engineering Attacks

If you don’t enjoy having your data or your customers’ personal information plastered all over the Internet, then you should consider the initial attack vector that was most likely used to put it there: a lack of understanding about how social engineering attacks occur and an absence of security controls available to minimize the breach. Phishing, pre-texting, baiting and piggy-backing are just some of the social engineering methods attackers use to trick...

Read More


07

Jan 2015

Securing Your Future with Strategic Security Assessments

You’ve read about the breaches. You’ve seen other companies lose their reputations and financial standing after a cybersecurity attack. You understand that the safety of your company’s data is tantamount to your business’s secure future. But, where do you start? A Strategic Security Assessment will tell you everything about your environment and what your company is doing – or not doing – to safeguard your systems and comply with the...

Read More


05

Jan 2015

Bill Dean Makes The Knoxville News-Sentinel’s “Top 40 Under 40″

From KnoxNews.com Bill Dean spends his days making sure the business secrets, intellectual property and sensitive client information stored on the computers of companies don’t fall into the wrong hands. “The motto of our company is to prevent, detect and respond,” he says. As director of forensics and security assessments for Sword & Shield Enterprise Security, Dean works with companies to make sure their systems...

Read More



Page 1 of 3012345...102030...Last »