03

Sep 2015

Are You Ready for the Merchant Liability Shift?

In less than a month, retailers are supposed to have implemented the new EMV chip technology in an effort to limit credit and debit card fraud. But many small to mid-sized businesses aren’t even aware that they will be required to upgrade their payment terminals and some banks haven’t issued new cards, opting, instead to issue them as accounts renew. On Oct. 1, retailers are...

Read More


21

Aug 2015

Guest Post to Aderant: Five Deadly Sins Cyber Criminals Know About Law Firm Security

Sword & Shield experts Brent Cantrell, director of Managed Security Services and Fred Cobb, director of Enterprise Security Solutions and Healthcare Compliance Services, joined William Kunkel, CFO and Attorney Justin Joy, both of Lewis, Thomason, King, Krieg & Waldrop, P.C., a firm using Aderant Total Office for case management, to write a guest column for Aderant’s blog. Nearly every day we hear news of some...

Read More


12

Aug 2015

CISSP Training: We’ve Got It

In a world where millions of cyber attacks occur each year, there is a growing need for information security professionals who possess the experience to establish holistic security solutions that ensure the protection of an organization’s assets. So how do you differentiate yourself from other candidates when competing for jobs, promotions and raises? A Certified Information Systems Security Professional (CISSP) certification is ideal for those network...

Read More


06

Aug 2015

Figuring Out Inside Threats

Just a few short years ago, an employee walking out of the building carrying boxes of sensitive company information would have raised a few eyebrows and subjected that employee to some questioning. But, these days, when many employees are plugging in their various mobile devices to company computers as the course of business, how can you be sure that worker isn’t downloading intellectual property to...

Read More


03

Aug 2015

John McNeely: Leading a Team Through the Task at Hand

By John McNeely (via the Knoxville News-Sentinel) Congratulations! You have recently been appointed a team leader. Most likely you have been tasked with a difficult objective and expected to accomplish it with limited time, scant resources and busy individuals with other priorities. This is not an uncommon scenario. So how do you rally a group of individuals into a cohesive unit that is focused on...

Read More


30

Jul 2015

You Don’t Need a Fortune to Hire a Security Team

The Anthem breach. The Target hack. And the thousands of small to mid-sized businesses (SMBs) owners who thought they were immune to cybertheft but still suffered data breaches are just some examples that show that investing in your network security is important. In fact, it should be as much a part of doing business as ordering stock and paying employees. But, for some SMBs, hiring an entire IT...

Read More


16

Jul 2015

When Implementing Network Security Don’t Forget the Mobile Devices

Do you remember the days when business was conducted without a cell phone, tablet or other mobile device? What once was deemed a mere status symbol of convenience is now the preferred way to keep in touch with customers and access business-sensitive data. Today, employees expect access to company resources, but allowing employees to use their personal devices and managing corporate devices comes with a daunting...

Read More


09

Jul 2015

Don’t Let Your Laptop Give up Your Patients’ PHI – Security is More than Encryption

As more physicians, nurses and other healthcare workers rely on their smartphones, laptops and tablets to perform their duties and access instant information, the risk of becoming a target for cyber thieves increases. But understanding best practices for securing your company’s mobile devices and employing them should allow you to stay HIPAA compliant while keeping your patients’ personal information secure. Many healthcare organizations are unsure about...

Read More


01

Jul 2015

Getting Hashes From NTDS.dit File

By Eric Walker Having completed many internal penetration tests for clients, I always want to collect the NTDS.dit file from a domain controller, if I get access. The primary reason I want to pull this file from a Windows Domain Controller is because I want a password for another account (to access the data I really want). Generally I want to access a MSSQL Database...

Read More



Page 1 of 3312345...102030...Last »