The Anthem breach. The Target hack. And the thousands of small to mid-sized businesses (SMBs) owners who thought they were immune to cybertheft but still suffered data breaches are just some examples that show that investing in your network security is important. In fact, it should be as much a part of doing business as ordering stock and paying employees. But, for some SMBs, hiring an entire IT...
Do you remember the days when business was conducted without a cell phone, tablet or other mobile device? What once was deemed a mere status symbol of convenience is now the preferred way to keep in touch with customers and access business-sensitive data. Today, employees expect access to company resources, but allowing employees to use their personal devices and managing corporate devices comes with a daunting...
As more physicians, nurses and other healthcare workers rely on their smartphones, laptops and tablets to perform their duties and access instant information, the risk of becoming a target for cyber thieves increases. But understanding best practices for securing your company’s mobile devices and employing them should allow you to stay HIPAA compliant while keeping your patients’ personal information secure. Many healthcare organizations are unsure about...
By Eric Walker Having completed many internal penetration tests for clients, I always want to collect the NTDS.dit file from a domain controller, if I get access. The primary reason I want to pull this file from a Windows Domain Controller is because I want a password for another account (to access the data I really want). Generally I want to access a MSSQL Database...
KNOXVILLE, TN – Sword & Shield Enterprise Security, Inc. is the highest ranked Tennessee company on this year’s CRN Solutions Provider 500 (SP500) list, making this the ninth year in a row the IT security and compliance company has appeared on the prestigious lineup. Formerly known as the VAR 500, The Channel Company’s SP500 ranks the highest producing solution provider organizations in the IT channel...
Sword & Shield Security Analyst Eric Walker walks you through information about the upcoming Oct. 1 deadline for retailers to adopt EMV (Chip and PIN) credit card technology and answers whether this technology will help reduce the number of point-of-sale attacks on brick and mortar retailers. Visit our White Papers section online or register to download the paper .
Taking care of your patient’s oral health may be the most important goal of your dental practice, but federal law also requires you to secure your patients’ personal information or get hit with high fines, loss of business and loss of reputation. Sword & Shield wants to help you assess your IT security and compliance risks. Join us Wednesday, June 17 from noon to 1 p.m. for a...
It’s hard to think about autumn during the first blush of summer, but many American merchants have October on their minds as they prepare to add terminals capable of accepting the new chip and pin cards in addition to the traditional swipe-and-sign credit cards. Beginning this fall, merchants will be required to accept the new Europay, Mastercard and Visa (EMV), or Chip-and-PIN, readers or face...
A newly-discovered glitch in Apple’s software can cause iPhones to shut down the messenger interface when they receive a specially-crafted text message. Sword & Shield’s Bill Dean joins WVLT Channel 8 to explain what you can do if you receive this text:
As new details continue to emerge about the latest Freak related vulnerability, Sword & Shield’s Security Operations Center (SOC) is keeping a close eye on its customers’ networks. The latest is entitled, “LogJam,” a man-in-the-middle attack. Given the right circumstances, it can provide an attacker the ability to read encrypted data. Although it is not a simple task, it is possible. The SOC has already seen...