Phishing Services

Sword & Shield’s phishing services assist you in both understanding your employees’ knowledge in relation to cyberthreats and training those employees to improve their cyber awareness.

Learn why phishing is such a dangerous social engineering attack and why phishing attacks are so successful.


Apr 2019

The Weaponization of Data

Organizations collect massive amounts of data about their users. If you have a social media account, think about how much a person could learn about you just by reading your posts. Unfortunately, some organizations have figured this out, too, and use this information to their own gain. Whether a company is selling collected data, or information is illegally obtained from them through a breach, weaponization...

Read More


Jan 2019

Introduction to the MITRE ATT&CK Framework

What is the MITRE ATT&CK Framework? MITRE’s Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) framework is a collection of information about advanced persistent threats (APTs) that commonly target enterprise networks. The goal of the framework is to collect all relevant and available information about these groups and organize it in a way that makes it accessible and usable for enterprise security teams. The framework was...

Read More


Dec 2018

Using Application Whitelisting to Stop Malware

Phishing attacks are one of the most common methods attackers use to breach organizational defenses and gain access to the network. In many cases, the purpose of the phishing attack is to execute malicious software on the target computer. Developing and enforcing an application whitelist is one way organizations can dramatically decrease the threat these phishing attacks pose to their corporate cybersecurity. This article explains...

Read More


Nov 2018

Hacking Humans: The Social Engineering Threat

One of the most effective methods for breaking through a company’s cyber defenses is social engineering hacking. Let’s take a closer look at this common cybersecurity threat. Public Perception of Social Engineering When most people think of cyberattacks and the social engineering threat, they picture a scene from an action movie in which a teenage computer whiz spends thirty seconds furiously typing on a computer...

Read More


Sep 2018

Personal Information Anyone Can Learn on the Internet

When you think of people collecting personal information about you, you probably think about the data leaked in corporate data breaches and information for sale on the Dark Web. But have you ever wondered what kind of information the average person could learn about you on the Internet? The Internet can make social engineering a past time for some, or a dangerous cybercrime conduit for...

Read More


Sep 2018

Practicing Strong Password Security to Protect Yourself from Hackers

Having a weak password might not seem like a big deal, but it can be dangerous both personally and professionally.  In this post, we discuss what makes a password weak, how attackers take advantage of weak passwords, and how you can practice strong password security to protect yourself from hackers. What Makes a Password Weak? Everyone talks about the fact that strong passwords are a...

Read More


Jun 2018

How to Spot a Social Engineer

When thinking about cybersecurity and hackers, most people focus on the technological side of hacking where attackers take advantage of vulnerabilities in computer systems to gain unauthorized access.  However, this is only one avenue for hackers to get what they want. Instead of focusing on weaknesses in computer systems, social engineers take advantage of susceptibility in human behavior and people’s default reactions to certain situations....

Read More


Feb 2018

Phishing 101: Don’t Get Hooked

The most talented cybercriminals are lazy. They want somebody else to do their work for them. Why bother attacking a network, when an employee or executive can open the door by clicking a link in an email? You use email every day for work, for communicating with family, and for doing ordinary business. Your bank probably emails you an online statement. Your inbox fills up...

Read More