Enterprise Solutions


Enterprise Solutions

Sword & Shield’s enterprise solutions consultants possess a wide range of expertise regarding disciplines such as NIST, GDPR, consumer privacy and other compliance; cloud security, writing cybersecurity policies and procedures, developing disaster recovery and business continuity plans and much more.

Learn about a wide range of information security and compliance topics from our experts in this blog.


13

Mar 2019

The Changing State of Consumer Privacy

Consumer Privacy Laws With data breaches on the rise, many new data protection regulations have been enacted. The European Union’s (EU) General Data Protection Regulation (GDPR) is the first and most well-known of these. This opened a floodgate of action in the US. Several new or bolstered laws have gone into effect in the United States to protect the privacy of its citizens. GDPR Explained...

Read More


29

Oct 2018

Minimizing Permissions to Improve Cybersecurity

Minimizing permissions for end user account access by assigning appropriate access levels and setting up account separation is an important aspect of building a cybersecurity program. Admittedly, this can present a challenge in workload and regarding pleasing your end users. The requirement for some users to have multiple accounts increases the burden on the security team for account management. It can also interrupt workflow for...

Read More


29

Oct 2018

Patch Management: Why it’s Important for CyberSecurity

A good patch management strategy is commonly listed as one of the basics of an organizational cybersecurity strategy. In this post, we discuss the importance of strong patch management and how to implement a good patch management strategy. What Is Patch Management? All software has bugs. Whether these are caused by design flaws or implementation flaws, the sheer amount of code in systems that we...

Read More


02

Apr 2018

Planning a Strategic Security Posture

Battling one cyber-attack crisis after another is not only draining for your IT staff, it’s also unproductive and could end up costing more in the long run. Why is Having a Security Posture Important? That’s why experts say long-term planning to achieve a strategic security posture is a better option for your organization than simply dousing the fires lit by hackers as they pop up....

Read More


16

Aug 2017

How to Write an Effective Business Continuity Plan

By Teddy Ansink An effective business continuity plan (BCP) is proactive and aims to avoid and mitigate risks associated with a disruption of operations, including ensuring personnel and assets are protected and able to function in the event of a disaster. Due to the importance of this goal, the development of a BCP requires strategic thinking through the recognition of threats and risks facing a...

Read More


10

Nov 2016

Mid-Sized Businesses Improve Cybersecurity with vSCC

Most business owners today realize they need a comprehensive data security strategy to protect their proprietary information and the personal data of their employees and customers from a variety of cyberthreats. So, while large businesses like Target or Home Depot can afford to hire a team of cybersecurity experts and/or pay to repair the damages done after a security breach occurs, a mid-sized business can’t...

Read More


25

Aug 2016

Employees Acting as IT? Only the Shadow Knows.

Production – not malicious activity – is often the catalyst behind an employee’s use of unapproved technologies. But the proliferation of these technologies, which are easily downloaded from the Internet or cloud applications, can lead to security and compliance risks for the organization as a whole. Surveys suggest that many employees who download unapproved software or applications are simply trying to be more productive and...

Read More


15

Jan 2016

A Strategic Security Assessment Helps Reveal Your Security Posture

As a result of the many large and damaging data breaches that have graced the headlines of the news over the past few years, many business owners have just now come to the realization that they don’t have a good understanding of how all the security pieces of their company puzzle fit together. Getting Started with Cybersecurity Knowing how to effectively protect your clients’ personal...

Read More


29

Oct 2015

Hiring a vSCC can Protect your Data without Busting your Budget

As cyber-attacks grow, more companies see the need for cybersecurity, but few have the resources to hire someone with information security expertise. According to Cisco’s 2015 Annual Security Report, 91 percent of companies have an executive charged with overseeing data security, but only 29 percent of those companies have a Chief Information Security Officer (CISO). Many of these executives lack the security background to build...

Read More


09

Jul 2015

Don’t Let Your Laptop Give up Your Patients’ PHI

As more physicians, nurses and other healthcare workers rely on their smartphones, laptops and tablets to perform their duties and access instant information, the risk of becoming a target for cyber thieves increases. But understanding best practices for securing your company’s mobile devices and employing them should allow you to stay HIPAA compliant while keeping your patients’ personal information secure. Many healthcare organizations are unsure about...

Read More



Page 1 of 212