09

May 2018

Sword & Shield Enterprise Security Contributes to PCI DSS

Award winning national cybersecurity firm garners acknowledgement from PCI Council. Knoxville, Tenn. May 10, 2018 – Sword & Shield Enterprise Security, a leading national cybersecurity firm headquartered in Knoxville, Tennessee, announced today the company has been acknowledged for its contributions to the April 2018 PCI SSC Cloud Computing Guidelines Information Supplement. This is the third time Sword & Shield has been credited with contribution to...

Read More


09

May 2018

Complying with HIPAA encryption standards; what you need to know

By Jeremy Watson Have you encrypted your electronic protected health information (ePHI) data at rest (being stored in persistent storage) and in transit (flowing from one point to another, whether it be the over the internet or a private network)? If so, you’re compliant with the HIPAA encryption standard and, therefore, covered by the Safe Harbor Rule in case of a breach. This means you’re...

Read More


01

May 2018

Using Common Cyber Sense to Stay Secure

Your IT department’s regular pleadings and how-tos about cybersecurity and safety may sound like a broken record, but there are important reasons behind following these practices and advice. Staying secure while connected is not just about how your system is set up by the techs- it is also about how you use it. Here is information security wisdom about using common cyber sense to stay...

Read More


11

Apr 2018

Understanding HIPAA Today

Look back into the Healthcare Privacy and Security Standard’s growth to understand where we are today. By Chris Lyons When the Health Insurance Portability and Accountability Act (HIPAA) was signed into law in August of 1996, the intent was to provide an improved method of allowing employees to ensure they were able to retain healthcare coverage between jobs, combat waste and fraud in healthcare, and...

Read More


03

Apr 2018

Cybersecurity Spring Cleaning: Critical Data Scans

By Bowe Hoy Protecting your organization’s critical data requires knowing where it is. Have you ever lost something in your house despite spending hours looking “everywhere” for it? Or stumbled upon a cache of items you forgot you had? This probably motivated you to do some major cleaning; sorting, organizing and disposing of stuff to know where the important items are located and easily get...

Read More


02

Apr 2018

Planning a Strategic Security Posture

Battling one cyber-attack crisis after another is not only draining for your IT staff, it’s also unproductive and could end up costing more in the long run. Why is Having a Security Posture Important? That’s why experts say long-term planning to achieve a strategic security posture is a better option for your organization than simply dousing the fires lit by hackers as they pop up....

Read More


02

Apr 2018

Discovering Digital Identity Using IP Addresses

As a response to numerous questions from some of our legal clients regarding IP addresses, we’ve compiled the following information: In the physical world, we have many attributes to determine our identity: phone number, social security number, driver’s license number, etc. However, in the online world, there is often an assumed level of anonymity. Someone can develop an Internet pseudonym, post defamatory information to a...

Read More


27

Mar 2018

How to Increase Mobile App Security on your Devices

Mobile devices, such as tablets, smartphones, and watches, have become the primary technologies we use in both our personal and professional lives. According to comScore’s 2017 Cross Platform Future in Focus report, the average American adult spends almost three hours on their smartphone every day. What makes mobile devices so versatile are the multitude of apps at our fingertips. These apps empower us in many ways; from...

Read More


21

Mar 2018

Active Directory Password Health Analysis – Part 2

By Ben Goodman In Active Directory Password Health Analysis – Part 1, Russel Van Tuyl provided a background on Active Directory (AD) and its limitations in determining an organization’s password health. Russel also gave a high-level overview on the ADPasswordHealth python script, and its benefits in password health analysis. In this post we’ll take a deeper dive into what the ADPasswordHealth script can do. Recap...

Read More


14

Mar 2018

File Storage and Sync Services Data Security

By Brian Lowe This is part one of a three-part series giving insight into observations from our 24/7 security operations center. The Observation… As technology moves forward to create capabilities and increase convenience, the focus on security can be lacking, or in some cases completely missing or ignored. In Sword & Shield Enterprise Security’s Managed Security Services operations, we often find this is true of...

Read More



Page 3 of 2112345...1020...Last »