Cybersecurity Training

Cybersecurity Training

Cybersecurity training is an integral ingredient for embracing an educated culture of security and protecting key assets. Sword & Shield offers valuable information about security awareness training, AlienVault training, HIPAA compliance training, PCI compliance training and more.


Sep 2018

Practicing Strong Password Security to Protect Yourself from Hackers

Having a weak password might not seem like a big deal, but it can be dangerous both personally and professionally.  In this post, we discuss what makes a password weak, how attackers take advantage of weak passwords, and how you can practice strong password security to protect yourself from hackers. What Makes a Password Weak? Everyone talks about the fact that strong passwords are a...

Read More


May 2018

Using Common Cyber Sense to Stay Secure

Your IT department’s regular pleadings and how-tos about cybersecurity and safety may sound like a broken record, but there are important reasons behind following these practices and advice. Staying secure while connected is not just about how your system is set up by the techs- it is also about how you use it. Here is information security wisdom about using common cyber sense to stay...

Read More


Aug 2016

Turn Your Employees into CyberSecurity “Specialists”

Now that we know our employees are cyber security’s weakest link, what can you do to turn your employees into cyber security “specialists?” Having a strong data safety culture is one of the first rules for improving your organization’s security practices. This includes having written security policies that have been developed based on your organization’s particular needs. A Strategic Security Assessment can tell you everything...

Read More


Jan 2015

Have a Back-up Plan to Mitigate Social Engineering Attacks

If you don’t enjoy having your data or your customers’ personal information plastered all over the Internet, then you should consider the initial attack vector that was most likely used to put it there: a lack of understanding about how social engineering attacks occur and an absence of security controls available to minimize the breach. Phishing, pre-texting, baiting and piggy-backing are just some of the social engineering methods attackers use to trick...

Read More