30

Jul 2015

You Don’t Need a Fortune to Hire a Security Team

The Anthem breach. The Target hack. And the thousands of small to mid-sized businesses (SMBs) owners who thought they were immune to cybertheft but still suffered data breaches are just some examples that show that investing in your network security is important. In fact, it should be as much a part of doing business as ordering stock and paying employees. But, for some SMBs, hiring an entire IT...

Read More


16

Jul 2015

When Implementing Network Security Don’t Forget the Mobile Devices

Do you remember the days when business was conducted without a cell phone, tablet or other mobile device? What once was deemed a mere status symbol of convenience is now the preferred way to keep in touch with customers and access business-sensitive data. Today, employees expect access to company resources, but allowing employees to use their personal devices and managing corporate devices comes with a daunting...

Read More


09

Jul 2015

Don’t Let Your Laptop Give up Your Patients’ PHI – Security is More than Encryption

As more physicians, nurses and other healthcare workers rely on their smartphones, laptops and tablets to perform their duties and access instant information, the risk of becoming a target for cyber thieves increases. But understanding best practices for securing your company’s mobile devices and employing them should allow you to stay HIPAA compliant while keeping your patients’ personal information secure. Many healthcare organizations are unsure about...

Read More


01

Jul 2015

Getting Hashes From NTDS.dit File

By Eric Walker Having completed many internal penetration tests for clients, I always want to collect the NTDS.dit file from a domain controller, if I get access. The primary reason I want to pull this file from a Windows Domain Controller is because I want a password for another account (to access the data I really want). Generally I want to access a MSSQL Database...

Read More


15

Jun 2015

Sword & Shield is the Top Ranked Tennessee Company on the SP500 List

KNOXVILLE, TN – Sword & Shield Enterprise Security, Inc. is the highest ranked Tennessee company on this year’s CRN Solutions Provider 500 (SP500) list, making this the ninth year in a row the IT security and compliance company has appeared on the prestigious lineup. Formerly known as the VAR 500, The Channel Company’s SP500 ranks the highest producing solution provider organizations in the IT channel...

Read More


15

Jun 2015

White Paper: EMV – Will it Curb Credit Card Fraud and Breaches?

Sword & Shield Security Analyst Eric Walker walks you through information about the upcoming Oct. 1 deadline for retailers to adopt EMV (Chip and PIN) credit card technology and answers whether this technology will help reduce the number of point-of-sale attacks on brick and mortar retailers. Visit our White Papers section online or register to download the paper .


11

Jun 2015

Sword & Shield Offers HIPAA Seminar for Knoxville Area Dental Offices

Taking care of your patient’s oral health may be the most important goal of your dental practice, but federal law also requires you to secure your patients’ personal information or get hit with high fines, loss of business and loss of reputation. Sword & Shield wants to help you assess your IT security and compliance risks. Join us Wednesday, June 17 from noon to 1 p.m. for a...

Read More


04

Jun 2015

Merchants Get Ready for New Chip-and-PIN Terminals

It’s hard to think about autumn during the first blush of summer, but many American merchants have October on their minds as they prepare to add terminals capable of accepting the new chip and pin cards in addition to the traditional swipe-and-sign credit cards. Beginning this fall, merchants will be required to accept the new Europay, Mastercard and Visa (EMV), or Chip-and-PIN, readers or face...

Read More


29

May 2015

What if a Text Message Crashes Your iPhone?

A newly-discovered glitch in Apple’s software can cause iPhones to shut down the messenger interface when they receive a specially-crafted text message. Sword & Shield’s Bill Dean joins WVLT Channel 8 to explain what you can do if you receive this text:


20

May 2015

Sword & Shield’s SOC is Monitoring New FREAK Vulnerability

As new details continue to emerge about the latest Freak related vulnerability, Sword & Shield’s Security Operations Center (SOC) is keeping a close eye on its customers’ networks.  The latest is entitled, “LogJam,”  a man-in-the-middle attack. Given the right circumstances, it can provide an attacker the ability to read encrypted data.  Although it is not a simple task, it is possible.  The SOC has already seen...

Read More



Page 1 of 3312345...102030...Last »