Managed Security Services Provider


14

Mar 2018

File Storage and Sync Services Data Security

By Brian Lowe This is part one of a three-part series giving insight into observations from our 24/7 security operations center. The Observation… As technology moves forward to create capabilities and increase convenience, the focus on security can be lacking, or in some cases completely missing or ignored. In Sword & Shield Enterprise Security’s Managed Security Services operations, we often find this is true of...

Read More


21

Feb 2018

Phishing 101: Don’t Get Hooked

The most talented cybercriminals are lazy. They want somebody else to do their work for them. Why bother attacking a network, when an employee or executive can open the door by clicking a link in an email? You use email every day for work, for communicating with family, and for doing ordinary business. Your bank probably emails you an online statement. Your inbox fills up...

Read More


07

Feb 2018

Filter Noise, Deceive Attackers: National Cybersecurity Firm Expands Managed Security Platform

Sword & Shield Enterprise Security announces 24/7 perimeter defense and cyber deception services KNOXVILLE, Tenn. Feb. 7, 2018 – Sword & Shield Enterprise Security, a leading national cybersecurity firm based in Knoxville, Tennessee, now offers a proactive, transparent approach to significantly reduce unwanted network traffic and throw hackers off the scent with its new perimeter defense and cyber deception services. Sword & Shield offers these...

Read More


27

Mar 2017

Insider Threats and What They Mean for your Business

Companies are spending more on information security solutions than ever before, but do they know the threats that can come from within their own organizations? While all eyes turn toward the looming information security threats from outside, sometimes the biggest risk is insider threats coming from an otherwise trusted employee. The information in this article originally appeared in a blog post written by Joe Gray, enterprise...

Read More


10

Feb 2017

The Human Touch Makes MSSP Work

Cybersecurity experts say that blending human security expertise with technology-based solutions is a positive trend. In-house teams struggle to understand and defend against the latest security threats because this requires constant system monitoring. However, hiring a proficient cybersecurity team can be both time-consuming and cost-prohibitive. Conversely, companies that only use technology cannot make snap decisions and often don’t have the expertise to implement and use the...

Read More


03

Nov 2016

The CyberSecurity State of the MidSized Company is Risky Business

If your company employees 250 or more people a year and earns more than $10 million a year in revenue, your cybersecurity concerns are far different than your neighborhood shop with 20 employees and a significantly smaller budget.  Mid-sized businesses are often tucked away in the small-to-mid-sized business (SMB) category because, frankly, the federal government doesn’t formally recognize a mid-sized category.   However, if your company posts between...

Read More


15

Sep 2016

Need Help with HIPAA? Call an MSSP.

Because healthcare data contains so much personal – and lucrative – information, breaches into medical organizations’ networks are now the most common cyber-attack IT security professionals see. Healthcare organizations need to diligently monitor the security of their networks from both a regulatory perspective and from the perspective of what is considered best security practices. When government incentives first led healthcare organizations to adopt electronic healthcare...

Read More


25

Aug 2016

Employees Acting as IT? Only the Shadow Knows.

Production – not malicious activity – is often the catalyst behind an employee’s use of unapproved technologies. But the proliferation of these technologies, which are easily downloaded from the Internet or cloud applications, can lead to security and compliance risks for the organization as a whole. Surveys suggest that many employees who download unapproved software or applications are simply trying to be more productive and...

Read More


27

Jun 2016

Are You Focusing on the Wrong Threats?

You’ve probably been breached already. No kidding. So, instead of focusing on the wrong threats, you should “assume breach” and begin to collect the data you’ll need to help you prevent further attacks. In other words, assume that your average security controls are inadequate to stop a breach and concentrate on limiting the damage a hacker can do once (s)he is inside your network. For...

Read More


20

Jun 2016

What is Your Network’s “Normal?”

If you know your IT network, recognizing when something is out of the ordinary might be one of your best lines of defense in tracking down the issue and rooting out the cause. But many small to mid-sized businesses don’t have the staff or the resources to study what the organization’s systems and networks do each day to know what “normal” is, making it difficult to...

Read More



Page 1 of 212