25

Aug 2016

Employees Acting as IT? Only the Shadow Knows.

Production – not malicious activity – is often the catalyst behind an employee’s use of unapproved technologies. But the proliferation of these technologies, which are easily downloaded from the Internet or cloud applications, can lead to security and compliance risks for the organization as a whole. Surveys suggest that many employees who download unapproved software or applications are simply trying to be more productive and...

Read More


23

Aug 2016

PowerShell SMB Delivery

By Russel Van Tuyl The PowerShell IEX “Download Cradle” is one of the top techniques I leverage when I have the ability to execute code on a host. This code execution typically takes place with something like PSexec.exe using recovered credentials, a successful SMBRelay attack, a malicious macro, or the payload of Java deserialization attack. The Download Cradle leverages the PowerShell Invoke-Expression cmdlet that “Runs...

Read More


23

Aug 2016

Sword & Shield Talks Ransomware in Manufacturing with Trade Magazine

Surveys indicate that manufacturing companies are the most popular target for ransomware comprising 54 percent of all hits. In the KnowBe4 survey other popular targets include: Healthcare – 44 percent Education –  35 percent Technology – 29 percent Banking – 28 percent Sword & Shield Director of Marketing and Programs Raymond Kahre talks with MFRTech about this trend. Please click to read.   Have you...

Read More


10

Aug 2016

Turn Your Employees into CyberSecurity “Specialists”

Now that we know our employees are cyber security’s weakest link, what can you do to turn your employees into cyber security “specialists?” Having a strong data safety culture is one of the first rules for improving your organization’s security practices. This includes having written security policies that have been developed based on your organization’s particular needs. A Strategic Security Assessment can tell you everything...

Read More


04

Aug 2016

You are Your Company’s Worst CyberSecurity Threat

The biggest cybersecurity threat to your organization in 2016 isn’t Russian or Chinese hackers. It isn’t nefarious plots schemed by cyber spies, either. In fact, according to reports, the biggest threat to your company’s data loss is YOU. According to IBM’s CyberSecurity Intelligence Index, no less than 95 percent of all data security incidents are triggered by human error: employees who are getting tricked by...

Read More


28

Jul 2016

Compliance is not a Blueprint for Building a Security Program

For some security experts, the definition of compliance has become so skewed that it can mean just about anything to just about anyone, depending on their circumstances. Data security analysts continue to hear clients tout that they are “compliant, so we must be secure,” without knowing that the more appropriate route to take is to begin with security as the framework for your compliance path....

Read More


22

Jul 2016

EDGE2016 Now Seeking Sponsors for Annual Cybersecurity Conference

National cybersecurity conference extends partnership opportunities for first fall event in Knoxville KNOXVILLE, Tenn. July 21, 2016 – EDGE2016 Security Conference, an emerging, world-class conference where complex business security problems meet real-world solutions, is now expanding strategic partnership opportunities for companies and organizations for their inaugural conference October 18-19 at the Crowne Plaza in Knoxville, Tennessee. Keynote speakers at the conference include Theresa Payton, former...

Read More


20

Jul 2016

PCI Compliance Should Start with Security

While it’s true the Payment Card Industry Data Security Standard (PCI DSS) has helped curtail credit card fraud by requiring merchants to comply with its regulations, many merchants still don’t understand that merely meeting compliance goals does not mean their data is secure. Many security and compliance experts now argue that PCI standards have become little more than a check-box activity leaving the retailer with...

Read More


14

Jul 2016

You Can Be Both Compliant and Secure

It’s no big secret that some of the big-name companies whose customer data was breached had met compliance standards prior to the intrusions. That’s because being compliant can sometimes lead companies into believing they’re also secure. The data security experts at Sword & Shield recommend that organizations use their industry compliance regulations as a security starting point – a prescriptive direction – but warn it...

Read More


08

Jul 2016

Bill Dean Discusses How Social Media is Changing the Way Content is Perceived

Over the holiday weekend,  Minnesota public school employee Philando Castile’s fiancée, Diamond Reynolds, used her phone to record the aftermath of Castile’s shooting, allegedly by a police officer, and live-streamed it on her Facebook account. Sword & Shield Director of Computer Forensics and Security Assessments Bill Dean discusses how social media is changing the way content is perceived on WVLT Channel 8 in the wake of...

Read More



Page 1 of 4112345...102030...Last »