26

Sep 2018

What Personal Information Can Anyone Learn About You on the Internet?

When you think of people collecting personal information about you, you probably think about the data leaked in corporate data breaches and information for sale on the Dark Web. But have you ever wondered what kind of information the average person could learn about you on the Internet? The Internet can make social engineering a past time for some, or a dangerous cybercrime conduit for...

Read More


25

Sep 2018

Eight Considerations for Remote Worker Cybersecurity

Working from your desk in the corporate office is probably the safest way of doing business since you have both physical and technological protections provided by your organization.  However, this may not always be feasible for either personal or business reasons.  By taking the appropriate remote worker cybersecurity precautions, you can work from home or on the go without jeopardizing your personal security or that...

Read More


20

Sep 2018

MSSP Alert names Sword & Shield to its 2018 Top 100 MSSPs

Leading national cybersecurity firm ranked as a top 100 managed security services provider second year in a row KNOXVILLE, Tenn. – Sept. 20, 2018 – Sword & Shield Enterprise Security, a leading cybersecurity firm headquartered in Knoxville, Tennessee, and serving clients nationally, was named by MSSP Alert, the global voice for managed security service providers (MSSPs), to its 2018 Top 100 MSSPs list. Sword & Shield...

Read More


18

Sep 2018

Practicing Strong Password Security to Protect Yourself from Hackers

Having a weak password might not seem like a big deal, but it can be dangerous both personally and professionally.  In this post, we discuss what makes a password weak, how attackers take advantage of weak passwords, and how you can practice strong password security to protect yourself from hackers. What Makes a Password Weak? Everyone talks about the fact that strong passwords are a...

Read More


10

Sep 2018

New PCI SSC Payment Security Tool Helps Small Merchants

The Verizon Data Breach Investigations Report found that small businesses made up 61% of the organizations surveyed. These highly-targeted businesses often do not have the technical expertise on staff necessary to effectively thwart or manage security attacks. PCI Payment Security Tool Purpose To assist small merchants in fighting cybercrime, the PCI Security Standards Council (PCI SSC) recently announced the launch of the PCI Data Security...

Read More


28

Aug 2018

Locked Out: Ransomware Prevention and Incident Response

A ransomware attack can be a debilitating event for an unprepared person or organization.  Depending on the type and value of the data stored on an infected computer, the impact of an incident can range from a minor hiccup in operations to the death of the company. The impact of ransomware on small to medium size businesses (SMBs) can be particularly devastating. In its Second Annual...

Read More


23

Aug 2018

Making PCI DSS Business as Usual

Learn how to achieve PCI DSS Business as Usual as part of your compliance. The PCI DSS standards are designed to ensure that companies processing, transmitting or storing customer credit card information are protecting it appropriately. The process for becoming PCI certified includes passing a yearly audit where security controls are evaluated, meaning that the minimum requirement for certification is ensuring that systems are compliant at...

Read More


21

Aug 2018

Examining Fileless Malware Threats

Most malware is file-based, meaning that your computer is infected as a result of a file being downloaded and run on your computer. This makes detection and removal easier for antivirus software since it can generate signatures of the malware files and look for those files on disk to detect and remove them. Conversely, fileless malware is designed to not leave a file on disk...

Read More


15

Aug 2018

Sticking Around: Common Windows Malware Persistence Mechanisms

Malware authors put a lot of time and effort into writing their malware and finding ways to get it installed and running on target machines. If users could get rid of malware for good by just closing it or restarting their computer, then these attackers would have put in a lot of work for minimal payoff. But hackers leverage malware persistence mechanisms to be sure...

Read More


09

Aug 2018

What do I do if my Network is Hacked?

7 Steps to Achieving Effective Information Security Incident Response Nobody wants to be hacked, but the only thing worse than having an incident is to have one and then botch the incident response procedures. An incorrect response could allow an attacker to gain further access to your network, fail to completely remove the infection, or render evidence of the incident inadmissible in legal proceedings. By...

Read More



Page 2 of 2312345...1020...Last »