05

Jun 2018

Ensuring GDPR Compliance for Your Enterprise

The European Union’s General Data Protection Regulation (GDPR) went into effect on May 25. If your company does business internationally, its electronic privacy processes and procedures must comply with GDPR requirements. This article discusses the new framework and ensuring GDPR compliance within your organization. What is the GDPR? The GDPR is concerned with data privacy and contains a number of new requirements for businesses. Failure...

Read More


17

May 2018

Sword & Shield Named Among World’s Most Innovative Cybersecurity Companies

Leading national cybersecurity firm named to Cybersecurity 500 2018 list KNOXVILLE, Tenn. May 17, 2018 – Sword & Shield Enterprise Security, a leading national cybersecurity firm based in Knoxville, Tennessee, was named to Cybersecurity Ventures’ 2018 Cybersecurity 500, an annual ranking of the world’s hottest and most innovative cybersecurity companies. Tennessee Cybersecurity Firm Sword & Shield was one of only two Tennessee-based firms to make...

Read More


09

May 2018

Sword & Shield Enterprise Security Contributes to PCI DSS

Award winning national cybersecurity firm garners acknowledgement from PCI Council. Knoxville, Tenn. May 10, 2018 – Sword & Shield Enterprise Security, a leading national cybersecurity firm headquartered in Knoxville, Tennessee, announced today the company has been acknowledged for its contributions to the April 2018 PCI SSC Cloud Computing Guidelines Information Supplement. This is the third time Sword & Shield has been credited with contribution to...

Read More


09

May 2018

Complying with HIPAA encryption standards; what you need to know

By Jeremy Watson Have you encrypted your electronic protected health information (ePHI) data at rest (being stored in persistent storage) and in transit (flowing from one point to another, whether it be the over the internet or a private network)? If so, you’re compliant with the HIPAA encryption standard and, therefore, covered by the Safe Harbor Rule in case of a breach. This means you’re...

Read More


01

May 2018

Using Common Cyber Sense to Stay Secure

Your IT department’s regular pleadings and how-tos about cybersecurity and safety may sound like a broken record, but there are important reasons behind following these practices and advice. Staying secure while connected is not just about how your system is set up by the techs- it is also about how you use it. Here is information security wisdom about using common cyber sense to stay...

Read More


11

Apr 2018

Understanding HIPAA Today

Look back into the Healthcare Privacy and Security Standard’s growth to understand where we are today. By Chris Lyons When the Health Insurance Portability and Accountability Act (HIPAA) was signed into law in August of 1996, the intent was to provide an improved method of allowing employees to ensure they were able to retain healthcare coverage between jobs, combat waste and fraud in healthcare, and...

Read More


03

Apr 2018

Cybersecurity Spring Cleaning: Critical Data Scans

By Bowe Hoy Protecting your organization’s critical data requires knowing where it is. Have you ever lost something in your house despite spending hours looking “everywhere” for it? Or stumbled upon a cache of items you forgot you had? This probably motivated you to do some major cleaning; sorting, organizing and disposing of stuff to know where the important items are located and easily get...

Read More


02

Apr 2018

Planning a Strategic Security Posture

Battling one cyber-attack crisis after another is not only draining for your IT staff, it’s also unproductive and could end up costing more in the long run. Why is Having a Security Posture Important? That’s why experts say long-term planning to achieve a strategic security posture is a better option for your organization than simply dousing the fires lit by hackers as they pop up....

Read More


02

Apr 2018

Discovering Digital Identity Using IP Addresses

As a response to numerous questions from some of our legal clients regarding IP addresses, we’ve compiled the following information: In the physical world, we have many attributes to determine our identity: phone number, social security number, driver’s license number, etc. However, in the online world, there is often an assumed level of anonymity. Someone can develop an Internet pseudonym, post defamatory information to a...

Read More


27

Mar 2018

How to Increase Mobile App Security on your Devices

Mobile devices, such as tablets, smartphones, and watches, have become the primary technologies we use in both our personal and professional lives. According to comScore’s 2017 Cross Platform Future in Focus report, the average American adult spends almost three hours on their smartphone every day. What makes mobile devices so versatile are the multitude of apps at our fingertips. These apps empower us in many ways; from...

Read More



Page 4 of 23« First...23456...1020...Last »