Phishing


Sword & Shield’s phishing services assist you in both understanding your employees’ knowledge in relation to cyberthreats and training those employees to improve their cyber awareness.


12

Nov 2018

Hacking Humans: The Social Engineering Threat

When most people think of cyberattacks and the social engineering threat, they picture a scene from an action movie in which a teenage computer whiz spends thirty seconds furiously typing on a computer keyboard and gaining complete access to the Pentagon’s databases. In the real world, this isn’t how hacking actually works. The good news is that hacking the Pentagon is a lot harder than...

Read More


26

Sep 2018

What Personal Information Can Anyone Learn About You on the Internet?

When you think of people collecting personal information about you, you probably think about the data leaked in corporate data breaches and information for sale on the Dark Web. But have you ever wondered what kind of information the average person could learn about you on the Internet? The Internet can make social engineering a past time for some, or a dangerous cybercrime conduit for...

Read More


18

Sep 2018

Practicing Strong Password Security to Protect Yourself from Hackers

Having a weak password might not seem like a big deal, but it can be dangerous both personally and professionally.  In this post, we discuss what makes a password weak, how attackers take advantage of weak passwords, and how you can practice strong password security to protect yourself from hackers. What Makes a Password Weak? Everyone talks about the fact that strong passwords are a...

Read More


27

Jun 2018

How to Spot a Social Engineer

When thinking about cybersecurity and hackers, most people focus on the technological side of hacking where attackers take advantage of vulnerabilities in computer systems to gain unauthorized access.  However, this is only one avenue for hackers to get what they want. Instead of focusing on weaknesses in computer systems, social engineers take advantage of susceptibility in human behavior and people’s default reactions to certain situations....

Read More


21

Feb 2018

Phishing 101: Don’t Get Hooked

The most talented cybercriminals are lazy. They want somebody else to do their work for them. Why bother attacking a network, when an employee or executive can open the door by clicking a link in an email? You use email every day for work, for communicating with family, and for doing ordinary business. Your bank probably emails you an online statement. Your inbox fills up...

Read More