KNOXVILLE, TN – Sword & Shield Enterprise Security, Inc. is the highest ranked Tennessee company on this year’s CRN Solutions Provider 500 (SP500) list, making this the ninth year in a row the IT security and compliance company has appeared on the prestigious lineup. Formerly known as the VAR 500, The Channel Company’s SP500 ranks the highest producing solution provider organizations in the IT channel...
Sword & Shield Security Analyst Eric Walker walks you through information about the upcoming Oct. 1 deadline for retailers to adopt EMV (Chip and PIN) credit card technology and answers whether this technology will help reduce the number of point-of-sale attacks on brick and mortar retailers. Visit our White Papers section online or register to download the paper .
Taking care of your patient’s oral health may be the most important goal of your dental practice, but federal law also requires you to secure your patients’ personal information or get hit with high fines, loss of business and loss of reputation. Sword & Shield wants to help you assess your IT security and compliance risks. Join us Wednesday, June 17 from noon to 1 p.m. for a...
It’s hard to think about autumn during the first blush of summer, but many American merchants have October on their minds as they prepare to add terminals capable of accepting the new chip and pin cards in addition to the traditional swipe-and-sign credit cards. Beginning this fall, merchants will be required to accept the new Europay, Mastercard and Visa (EMV), or Chip-and-PIN, readers or face...
A newly-discovered glitch in Apple’s software can cause iPhones to shut down the messenger interface when they receive a specially-crafted text message. Sword & Shield’s Bill Dean joins WVLT Channel 8 to explain what you can do if you receive this text:
As new details continue to emerge about the latest Freak related vulnerability, Sword & Shield’s Security Operations Center (SOC) is keeping a close eye on its customers’ networks. The latest is entitled, “LogJam,” a man-in-the-middle attack. Given the right circumstances, it can provide an attacker the ability to read encrypted data. Although it is not a simple task, it is possible. The SOC has already seen...
By Russel Van Tuyl Before you go any farther into this post, please note this entire attack depends on already having obtained a shared local admin or domain admin credentials. If you only have a shared local admin password, this can land you domain admin credentials. In my case, I already had domain admin credentials, this attack landed me forest admin creds. This method rides...
Are You Prepared? You get a call from the FBI that your company’s computer network has been breached and some of your customer data has been compromised. After catching your breath from hyperventilating, the next thing you should do is realize that you’re not alone. You aren’t the first company to suffer from a breach and yours won’t be the last. In 2014, there were...
By Bill Dean After working in digital forensics for more than eight years, it is common to receive a call from a potential client that thinks they have been “hacked.” After a few minutes of conversation, my finely tuned “paranoid client” meter quickly becomes active. If it reaches my predetermined threshold, I try to systematically walk through the technical aspects required for this to be...
What Does My Company Need to Know? By now, most merchants know that the PCI Data Security Standard has deep-sixed Secure Socket Layers (SSL) and the earliest Transport Layer Security (TLS) encryption protocols in favor of a more secure version of TLS. But what does that really mean for business owners who rely on SSL or TLS to sell directly to customers on their websites...