06

Sep 2017

Social Engineering Q&A: How to Strengthen Your Network Security

As organizations respond to InfoSec threats by hardening their network security, hackers are exploiting softer targets, such as employees and management, to gain access. According to IBM research, in 2016 about 71 percent of reported cyberattacks in the healthcare industry and 57 percent of cyberattacks in the financial services industry depended on the actions of employees who had unintentionally compromised the network security of their...

Read More


24

Aug 2017

Petya: Cyber Warfare Deception

By Ryan Ernst The following article originally appeared in the August 2017 edition of Gulf Insider online magazine. “All warfare is based upon deception.” – Sun Tzu, The Art of War Petya, the global cyberattack launched weeks after the WannaCry ransomware, appeared at first as a new variant of the original 2016 ransomware of the same name.  However, security researchers soon identified significant differences prompting...

Read More


16

Aug 2017

How to Write an Effective Business Continuity Plan

By Teddy Ansink An effective business continuity plan (BCP) is proactive and aims to avoid and mitigate risks associated with a disruption of operations, including ensuring personnel and assets are protected and able to function in the event of a disaster. Due to the importance of this goal, the development of a BCP requires strategic thinking through the recognition of threats and risks facing a...

Read More


08

Aug 2017

PCI DSS Changes to Be Enforced in 2018: Are you ready?

By Jack Dempsey The Payment Card Industry Data Security Standard (PCI DSS) is a security standard for merchants and service providers that process, store or transmit credit card information. Forward dated PCI DSS changes in Version 3.2 of the DSS requiring increased network security will be enforced in 2018. Are you ready? The most important change to the standards will be enforced beginning July 1,...

Read More


26

Jul 2017

Password Security Advice for Users and Enterprises

By Victor Garcia Password management remains a constant nuisance for users, and a security risk for businesses and organizations. There are basic steps the employees of your business can take to protect themselves and improve their password security practices. This blog offers an entry-level view of current best practices for password security; however, changes to password security policy are coming on the enterprise level. Look...

Read More


20

Jul 2017

Reverse Engineering Malware: Using Data Carving in Incident Response

Information security professionals, especially those who serve as “blue teamers” or enterprise defenders, are dealing with an evolving array of malware threats. In the blue team toolkit, one of the most important and difficult techniques is the ability to reverse engineer malware. Joe Gray, enterprise security consultant for Sword & Shield Enterprise Security, writes about his experience learning the techniques of reverse engineering malware using...

Read More


28

Jun 2017

Petya Ransomware: Older Malware, New Dangerous Techniques

by Joe Gray On June 27, 2017, the world experienced another outbreak of Petya ransomware. This article details the background of this threat and provides information on the new variant, as well as ways to prevent getting infected. Ransomware Background Ransomware is a class of malicious software that takes infected systems hostage and demands a “ransom” to unlock the system or systems. To further complicate...

Read More


07

Jun 2017

Sword & Shield Enterprise Security Makes CRN 2017 Solution Provider 500 List 10th Year in a Row

Leading national cybersecurity firm continues placement in CRN 2017 Solution Provider 500, the annual ranking of the largest and most successful North American solution providers KNOXVILLE, Tenn. – June 7, 2017 – Sword & Shield Enterprise Security, a leading national cybersecurity firm based in Knoxville, Tennessee, was named by CRN®, a brand of The Channel Company, to the CRN 2017 Solution Provider 500 list, an annual...

Read More


19

May 2017

InfoSec Threats Spread Worldwide

By Ryan Ernst InfoSec threats are a global concern. Well-publicized cyberattacks in the U.S. are only one chapter in a worldwide cyberwar. History of attacks in the Middle East The Middle East is one theater in that war. Back in 2012, Shamoon, a computer virus designed for sabotage and corporate espionage, was unleashed on Saudi Aramco, a Saudi Arabian petroleum company, in 2012. The attack wiped out...

Read More



Page 4 of 20« First...23456...1020...Last »