15

Aug 2018

Sticking Around: Common Windows Malware Persistence Mechanisms

Malware authors put a lot of time and effort into writing their malware and finding ways to get it installed and running on target machines. If users could get rid of malware for good by just closing it or restarting their computer, then these attackers would have put in a lot of work for minimal payoff. But hackers leverage malware persistence mechanisms to be sure...

Read More


09

Aug 2018

What do I do if my Network is Hacked?

7 Steps to Achieving Effective Information Security Incident Response Nobody wants to be hacked, but the only thing worse than having an incident is to have one and then botch the incident response procedures. An incorrect response could allow an attacker to gain further access to your network, fail to completely remove the infection, or render evidence of the incident inadmissible in legal proceedings. By...

Read More


07

Aug 2018

Knoxville Chamber names McNeely to 2018-2019 Board of Directors

Appointment closely follows lifetime achievement award Knoxville, Tenn. August 7, 2018 – Sword & Shield Enterprise Security, a leading national cybersecurity firm headquartered in Knoxville, Tennessee, announced today President and CEO John McNeely’s appointment to the Knoxville Chamber of Commerce Board of Directors. This honor closely follows Entrepreneur Organization (EO) Knoxville naming McNeely as the recipient of its inaugural Lifetime Achievement Award. According to the...

Read More


31

Jul 2018

Lessons Learned from the MD Anderson Breaches

The MD Anderson Cancer Center at the University of Texas was recently fined $4.3 million by the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) concerning data breaches that resulted in the loss of the health information of 33,500 patients. In this article, we called on one of our healthcare experts, Security Consultant Jeremy Bess, to explain what lessons can...

Read More


24

Jul 2018

Sword & Shield President and CEO Earns Lifetime Achievement Award

John McNeely first to receive honor KNOXVILLE, Tenn. July 24, 2018 – Sword & Shield Enterprise Security, a leading national cybersecurity firm based in Knoxville, Tennessee, announced today its president and CEO, John McNeely, was named Entrepreneurs’ Organization (EO) Knoxville’s first recipient of the chapter’s Lifetime Achievement Award. The organization recently recognized local business owners in its inaugural 2018 EO Knoxville Awards. According to EO, its Lifetime...

Read More


17

Jul 2018

Mobile Application Security: Why It’s Important to Check Your Development

Smart phones and tablets have become increasingly popular in recent years, and, as a result, many individuals and organizations are developing mobile apps to make their product constantly available to users. The growth in mobile app development and the types of information stored in and accessible to these apps have dramatically increased their profile as a target for hackers. Any one of many simple errors...

Read More


10

Jul 2018

Sword & Shield Announces MSSP Partnership Program for Technology Service Providers

Leading cybersecurity firm now enables managed service providers (MSPs) and other technology service providers to quickly add managed security to their service offering. KNOXVILLE, Tenn. July 10, 2018 – Sword & Shield Enterprise Security, a globally-recognized managed security service provider (MSSP) based in Knoxville, Tennessee, announced the launch of a partnership program to fill a need for MSPs and other technology service providers to quickly...

Read More


02

Jul 2018

Two-Factor Authentication (2FA): Secure or Not?

Passwords are generally considered to be insecure.  With the sheer number of accounts that the average person has, remembering a password for each account requires weak passwords, password reuse, or the use of technology like a password manager.  Even if someone has good password hygiene, a data breach means that someone’s password could be exposed by circumstances completely outside their control. Two-factor authentication is a...

Read More


27

Jun 2018

How to Spot a Social Engineer

When thinking about cybersecurity and hackers, most people focus on the technological side of hacking where attackers take advantage of vulnerabilities in computer systems to gain unauthorized access.  However, this is only one avenue for hackers to get what they want. Instead of focusing on weaknesses in computer systems, social engineers take advantage of susceptibility in human behavior and people’s default reactions to certain situations....

Read More


19

Jun 2018

HITRUST Introduction: Getting Started

Sword & Shield offers this HITRUST introduction to take some of the mystery out of this comprehensive compliance tool and to explain what you need to know in order to get started with HITRUST compliance. Let’s start with the basics: What is HITRUST? The Health Information Trust Alliance (HITRUST) is a United States company that has partnered with leaders in the healthcare, technology, and information security...

Read More



Page 1 of 2112345...1020...Last »