Uncategorized


19

Jun 2018

HITRUST Introduction: Getting Started

Sword & Shield offers this HITRUST introduction to take some of the mystery out of this comprehensive compliance tool and to explain what you need to know in order to get started with HITRUST compliance. Let’s start with the basics: What is HITRUST? The Health Information Trust Alliance (HITRUST) is a United States company that has partnered with leaders in the healthcare, technology, and information security...

Read More


12

Jun 2018

Using Root Cause Analysis After a Cybersecurity Incident

There were 1,579 breaches reported in the U.S. in 2017, according to the Identity Theft Resource Center (ITRC). This represented a 44.7 percent increase over incidents reported for 2016. Your enterprise might be next, so it’s important to learn about incident response, including a Root Cause Analysis. The best defense for your business is prevention, but when an incident does occur, it’s important to use...

Read More


12

Jun 2018

Sword & Shield Named to CRN’s 2018 Solution Provider 500 List

Sword & Shield Makes List 11th Year in a Row KNOXVILLE, Tenn. – June 12, 2018 – Sword & Shield Enterprise Security, a leading national cybersecurity firm headquartered in Knoxville, Tennessee, announced today that the company was named to the CRN® 2018 Solution Provider 500 (SP 500) list for the 11th year in a row. The SP500 is CRN’s annual ranking of the largest technology...

Read More


05

Jun 2018

Ensuring GDPR Compliance for Your Enterprise

The European Union’s General Data Protection Regulation (GDPR) went into effect on May 25. If your company does business internationally, its electronic privacy processes and procedures must comply with GDPR requirements. This article discusses the new framework and ensuring GDPR compliance within your organization. What is the GDPR? The GDPR is concerned with data privacy and contains a number of new requirements for businesses. Failure...

Read More


17

May 2018

Sword & Shield Named Among World’s Most Innovative Cybersecurity Companies

Leading national cybersecurity firm named to Cybersecurity 500 2018 list KNOXVILLE, Tenn. May 17, 2018 – Sword & Shield Enterprise Security, a leading national cybersecurity firm based in Knoxville, Tennessee, was named to Cybersecurity Ventures’ 2018 Cybersecurity 500, an annual ranking of the world’s hottest and most innovative cybersecurity companies. Sword & Shield was one of only two Tennessee-based firms to make this global compilation...

Read More


09

May 2018

Sword & Shield Enterprise Security Contributes to PCI DSS

Award winning national cybersecurity firm garners acknowledgement from PCI Council. Knoxville, Tenn. May 10, 2018 – Sword & Shield Enterprise Security, a leading national cybersecurity firm headquartered in Knoxville, Tennessee, announced today the company has been acknowledged for its contributions to the April 2018 PCI SSC Cloud Computing Guidelines Information Supplement. This is the third time Sword & Shield has been credited with contribution to...

Read More


09

May 2018

Complying with HIPAA encryption standards; what you need to know

By Jeremy Watson Have you encrypted your electronic protected health information (ePHI) data at rest (being stored in persistent storage) and in transit (flowing from one point to another, whether it be the over the internet or a private network)? If so, you’re compliant with the HIPAA encryption standard and, therefore, covered by the Safe Harbor Rule in case of a breach. This means you’re...

Read More


01

May 2018

Using Common Cyber Sense to Stay Secure

Your IT department’s regular pleadings and how-tos about cybersecurity and safety may sound like a broken record, but there are important reasons behind following these practices and advice. Staying secure while connected is not just about how your system is set up by the techs- it is also about how you use it. Here is information security wisdom about using common cyber sense to stay...

Read More


03

Apr 2018

Cybersecurity Spring Cleaning: Critical Data Scans

By Bowe Hoy Protecting your organization’s critical data requires knowing where it is. Have you ever lost something in your house despite spending hours looking “everywhere” for it? Or stumbled upon a cache of items you forgot you had? This probably motivated you to do some major cleaning; sorting, organizing and disposing of stuff to know where the important items are located and easily get...

Read More


27

Mar 2018

How to Increase Mobile App Security on your Devices

Mobile devices, such as tablets, smartphones, and watches, have become the primary technologies we use in both our personal and professional lives. According to comScore’s 2017 Cross Platform Future in Focus report, the average American adult spends almost three hours on their smartphone every day. What makes mobile devices so versatile are the multitude of apps at our fingertips. These apps empower us in many ways; from...

Read More



Page 1 of 41234