11

Apr 2018

Understanding HIPAA Today

Look back into the Healthcare Privacy and Security Standard’s growth to understand where we are today. By Chris Lyons When the Health Insurance Portability and Accountability Act (HIPAA) was signed into law in August of 1996, the intent was to provide an improved method of allowing employees to ensure they were able to retain healthcare coverage between jobs, combat waste and fraud in healthcare, and...

Read More


03

Apr 2018

Cybersecurity Spring Cleaning: Critical Data Scans

By Bowe Hoy Protecting your organization’s critical data requires knowing where it is. Have you ever lost something in your house despite spending hours looking “everywhere” for it? Or stumbled upon a cache of items you forgot you had? This probably motivated you to do some major cleaning; sorting, organizing and disposing of stuff to know where the important items are located and easily get...

Read More


02

Apr 2018

Planning a Strategic Security Posture

Battling one cyber-attack crisis after another is not only draining for your IT staff, it’s also unproductive and could end up costing more in the long run. That’s why experts say long-term planning to achieve a strategic security posture is a better option for your organization than simply dousing the fires lit by hackers as they pop up. This allows IT professionals to prioritize projects...

Read More


02

Apr 2018

Discovery Digital Identity Using IP Addresses

As a response to numerous questions from some of our legal clients regarding IP addresses, we’ve compiled the following information: In the physical world, we have many attributes to determine our identity: phone number, social security number, driver’s license number, etc. However, in the online world, there is often an assumed level of anonymity. Someone can develop an Internet pseudonym, post defamatory information to a...

Read More


27

Mar 2018

How to Increase Mobile App Security on your Devices

Mobile devices, such as tablets, smartphones, and watches, have become the primary technologies we use in both our personal and professional lives. According to comScore’s 2017 Cross Platform Future in Focus report, the average American adult spends almost three hours on their smartphone every day. What makes mobile devices so versatile are the multitude of apps at our fingertips. These apps empower us in many ways; from...

Read More


21

Mar 2018

Active Directory Password Health Analysis – Part 2

By Ben Goodman In Active Directory Password Health Analysis – Part 1, Russel Van Tuyl provided a background on Active Directory (AD) and its limitations in determining an organization’s password health. Russel also gave a high-level overview on the ADPasswordHealth python script, and its benefits in password health analysis. In this post we’ll take a deeper dive into what the ADPasswordHealth script can do. Recap...

Read More


14

Mar 2018

File Storage and Sync Services Data Security

By Brian Lowe This is part one of a three-part series giving insight into observations from our 24/7 security operations center. The Observation… As technology moves forward to create capabilities and increase convenience, the focus on security can be lacking, or in some cases completely missing or ignored. In Sword & Shield Enterprise Security’s Managed Security Services operations, we often find this is true of...

Read More


26

Feb 2018

Sword & Shield Recognized for Excellence in Managed Security Services

Nationally recognized cybersecurity firm makes list based on cutting-edge approach.  Knoxville, Tenn. February 28, 2018 –  Sword & Shield Enterprise Security, a leading national cybersecurity firm based in Knoxville, Tennessee, announced today that CRN®, a brand of The Channel Company, has named Sword & Shield to its 2018 Managed Service Provider (MSP) 500 list. Furthermore, Sword & Shield was designated in the MSP 500: Security...

Read More


21

Feb 2018

Phishing 101: Don’t Get Hooked

The most talented cybercriminals are lazy. They want somebody else to do their work for them. Why bother attacking a network, when an employee or executive can open the door by clicking a link in an email? You use email every day for work, for communicating with family, and for doing ordinary business. Your bank probably emails you an online statement. Your inbox fills up...

Read More


07

Feb 2018

Filter Noise, Deceive Attackers: National Cybersecurity Firm Expands Managed Security Platform

Sword & Shield Enterprise Security announces 24/7 perimeter defense and cyber deception services KNOXVILLE, Tenn. Feb. 7, 2018 – Sword & Shield Enterprise Security, a leading national cybersecurity firm based in Knoxville, Tennessee, now offers a proactive, transparent approach to significantly reduce unwanted network traffic and throw hackers off the scent with its new perimeter defense and cyber deception services. Sword & Shield offers these...

Read More



Page 1 of 2012345...1020...Last »