Uncategorized


25

Sep 2018

Eight Considerations for Remote Worker Cybersecurity

Working from your desk in the corporate office is probably the safest way of doing business since you have both physical and technological protections provided by your organization.  However, this may not always be feasible for either personal or business reasons.  By taking the appropriate remote worker cybersecurity precautions, you can work from home or on the go without jeopardizing your personal security or that...

Read More


18

Sep 2018

Practicing Strong Password Security to Protect Yourself from Hackers

Having a weak password might not seem like a big deal, but it can be dangerous both personally and professionally.  In this post, we discuss what makes a password weak, how attackers take advantage of weak passwords, and how you can practice strong password security to protect yourself from hackers. What Makes a Password Weak? Everyone talks about the fact that strong passwords are a...

Read More


10

Sep 2018

New PCI SSC Payment Security Tool Helps Small Merchants

The Verizon Data Breach Investigations Report found that small businesses made up 61% of the organizations surveyed. These highly-targeted businesses often do not have the technical expertise on staff necessary to effectively thwart or manage security attacks. PCI Payment Security Tool Purpose To assist small merchants in fighting cybercrime, the PCI Security Standards Council (PCI SSC) recently announced the launch of the PCI Data Security...

Read More


28

Aug 2018

Locked Out: Ransomware Prevention and Incident Response

A ransomware attack can be a debilitating event for an unprepared person or organization.  Depending on the type and value of the data stored on an infected computer, the impact of an incident can range from a minor hiccup in operations to the death of the company. The impact of ransomware on small to medium size businesses (SMBs) can be particularly devastating. In its Second Annual...

Read More


23

Aug 2018

Making PCI DSS Business as Usual

Learn how to achieve PCI DSS Business as Usual as part of your compliance. The PCI DSS standards are designed to ensure that companies processing, transmitting or storing customer credit card information are protecting it appropriately. The process for becoming PCI certified includes passing a yearly audit where security controls are evaluated, meaning that the minimum requirement for certification is ensuring that systems are compliant at...

Read More


21

Aug 2018

Examining Fileless Malware Threats

Most malware is file-based, meaning that your computer is infected as a result of a file being downloaded and run on your computer. This makes detection and removal easier for antivirus software since it can generate signatures of the malware files and look for those files on disk to detect and remove them. Conversely, fileless malware is designed to not leave a file on disk...

Read More


15

Aug 2018

Sticking Around: Common Windows Malware Persistence Mechanisms

Malware authors put a lot of time and effort into writing their malware and finding ways to get it installed and running on target machines. If users could get rid of malware for good by just closing it or restarting their computer, then these attackers would have put in a lot of work for minimal payoff. But hackers leverage malware persistence mechanisms to be sure...

Read More


09

Aug 2018

What do I do if my Network is Hacked?

7 Steps to Achieving Effective Information Security Incident Response Nobody wants to be hacked, but the only thing worse than having an incident is to have one and then botch the incident response procedures. An incorrect response could allow an attacker to gain further access to your network, fail to completely remove the infection, or render evidence of the incident inadmissible in legal proceedings. By...

Read More


31

Jul 2018

Lessons Learned from the MD Anderson Breaches

The MD Anderson Cancer Center at the University of Texas was recently fined $4.3 million by the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) concerning data breaches that resulted in the loss of the health information of 33,500 patients. In this article, we called on one of our healthcare experts, Security Consultant Jeremy Bess, to explain what lessons can...

Read More


24

Jul 2018

Sword & Shield President and CEO Earns Lifetime Achievement Award

John McNeely first to receive honor KNOXVILLE, Tenn. July 24, 2018 – Sword & Shield Enterprise Security, a leading national cybersecurity firm based in Knoxville, Tennessee, announced today its president and CEO, John McNeely, was named Entrepreneurs’ Organization (EO) Knoxville’s first recipient of the chapter’s Lifetime Achievement Award. The organization recently recognized local business owners in its inaugural 2018 EO Knoxville Awards. According to EO, its Lifetime...

Read More



Page 1 of 512345