General Cybersecurity Topics


General Cybersecurity Topics

Sword & Shield offers articles on a range of general cybersecurity topics to assist you and your organization in improving your information security posture.

Learn news, trends, how tos, best practices and more about information security and compliance from our experts.


16

Apr 2019

Understanding the Vaporworm Threat

Malware is constantly evolving as attackers develop new and more sophisticated variants to bypass or defeat enterprise network security defenses. In recent years, fileless malware has made headlines due to its ability to circumvent many of the protections used by traditional antivirus solutions. In 2019, the vaporworm threat has emerged as the next evolution of malware, combining the subtlety of fileless malware with the scalability...

Read More


10

Apr 2019

The Future of Managed Security Services

It seems like cybersecurity is moving at the speed of light. Threats and technology change on a regular basis. This makes it hard to determine the best course of action. This article explores the future of managed security services to help you decide if outsourcing your 24×7 security operations is right for your organization. What are Managed Security Services? Managed security services (MSS) refer to...

Read More


10

Apr 2019

The Weaponization of Data

Organizations collect massive amounts of data about their users. If you have a social media account, think about how much a person could learn about you just by reading your posts. Unfortunately, some organizations have figured this out, too, and use this information to their own gain. Whether a company is selling collected data, or information is illegally obtained from them through a breach, weaponization...

Read More


13

Mar 2019

Inside Crimeware-as-a-Service

In our field our customers often express disbelief in how brazen cyber criminals can be. As a “sign of the times” entrepreneurial bad actors have started commoditizing their offering in what is called crimeware-as-a-service. This article explores this disturbing trend and its implications. What is Crimeware-as-a-Service? With the introduction of cloud computing the phrase “as-a-service” has become ubiquitous. Offerings like Software-as-a-Service (SaaS) allow organizations to...

Read More


12

Feb 2019

Phantom Users: Deception and Pass the Hash Attacks

Deception in cyber defense Using deception in cyber defense isn’t a new concept. Honeypots, computers with false data designed to have vulnerabilities to lure attackers to keep them occupied, have been around since before the turn of the century. Honeynets, networks of honeypots intended to mimic a legitimate network, were not far behind. By providing some “low-hanging fruit” for attackers to spend their time on,...

Read More


22

Jan 2019

Implementing Defense in Depth in the Cloud

Many companies assume their cloud vendor is responsible for and has adequate tools, policies and procedures in place for protecting the data with which they are entrusted. While this is true to some extent, consumer data protection laws such as GDPR hold the owner of the data responsible if the cloud service is compromised. “Using cloud services does not transfer the company’s risk to the...

Read More


25

Sep 2018

Eight Considerations for Remote Worker Cybersecurity

Working from your desk in the corporate office is probably the safest way of doing business since you have both physical and technological protections provided by your organization.  However, this may not always be feasible for either personal or business reasons.  By taking the appropriate remote worker cybersecurity precautions, you can work from home or on the go without jeopardizing your personal security or that...

Read More


18

Sep 2018

Practicing Strong Password Security to Protect Yourself from Hackers

Having a weak password might not seem like a big deal, but it can be dangerous both personally and professionally.  In this post, we discuss what makes a password weak, how attackers take advantage of weak passwords, and how you can practice strong password security to protect yourself from hackers. What Makes a Password Weak? Everyone talks about the fact that strong passwords are a...

Read More


02

Jul 2018

Two-Factor Authentication (2FA): Secure or Not?

Passwords are generally considered to be insecure.  With the sheer number of accounts that the average person has, remembering a password for each account requires weak passwords, password reuse, or the use of technology like a password manager.  Even if someone has good password hygiene, a data breach means that someone’s password could be exposed by circumstances completely outside their control. Two-factor authentication is a...

Read More


17

May 2018

Sword & Shield Among Most Innovative Cybersecurity Companies

Leading national cybersecurity firm named to Cybersecurity 500 2018 list KNOXVILLE, Tenn. May 17, 2018 – Sword & Shield Enterprise Security, a leading national cybersecurity firm based in Knoxville, Tennessee, was named to Cybersecurity Ventures’ 2018 Cybersecurity 500, an annual ranking of the world’s hottest and most innovative cybersecurity companies. Tennessee Cybersecurity Firm Sword & Shield was one of only two Tennessee-based firms to make...

Read More



Page 1 of 3123