Back to Newsletter Archive

Having trouble seeing this email. View it online.
Sword & Shield - Intelligent Security
Security Solutions for Peace of MindJanuary 2015
Beginning Your Secure Future
Beginning Your Secure Future
While it's often said that improving your organization's network security is more of a journey than a destination, it still helps to know how you should start on a path to a Secure Future.

Many business owners look at IT security through the prism of compliance, often believing that if they follow the check-lists provided by their governing compliance guidelines, they will also be secure.

Others believe that they are too small for hackers to care about and don't place security as high on their list as other risks, not realizing one data breach could cost them thousands in fines, a loss of reputation or even a loss of their business.

Whether your business is compliance driven or security driven, building effective protection strategies takes a balanced risk management approach. Being compliant does not mean you are secure. And being secure does not mean you are invulnerable.

Here are some steps to help you get started:
  • Schedule a Strategic Security Assessment: This assessment will tell you everything about your environment and what your company is doing - or not doing - to safeguard your systems and comply with the regulations your industry requires.
     
  • Create and enforce good policies: a security policy is often considered to be a "living document", in that it is never finished, but is continuously updated as technology and employee requirements change.
     
  • Train your staff: Give your staff the tools they need to enforce your policies, but realize that to error is human. Make sure you have plans to secure your systems even when your security training fails.
     
  • Employ methods to help you detect breaches early and respond quickly: Early detection measures assist in neutralizing cyberattacks and threats before damage is done.  Detecting cyberattacks or fraudulent activity within the first 24 hours makes a significant difference to your business.
     
  • Develop a relationship with your IT security and/or compliance provider: Employ a team that will work with you and be an ongoing resource for your security questions throughout the year.
This year, security experts are predicting more massive security breaches. Businesses need to know where their business critical information is at all times and 2015 should be the year that cyber security stops being the responsibility of some and becomes the expectation of everyone.
Bill Dean Makes the "Top 40 Under 40" List
Bill Dean spends his days making sure the business secrets, intellectual property and sensitive client information stored on the computers of companies don't fall into the wrong hands.

"The motto of our company is to prevent, detect and respond," he says.

As director of forensics and security assessments for Sword & Shield Enterprise Security, Dean works with companies to make sure their systems are secure.

"Everything we have is stored in computers," he says. "The information is very portable."

Because computers also record information about everything that happens to them, Dean is also able to analyze them to let companies know whether any data has been deleted or accessed without permission. "What our forensics tools do is recover deleted information," he says.

He also implements preventive measures to ensure clients' most valuable assets remain protected, regularly monitors clients' computer systems to make sure data hasn't been breached and helps businesses respond to threats.

"We want to give them peace of mind that we're doing the best we can to protect the information they rely on on a day-to-day basis to make crucial business decisions," he says.

See More
Dean to Speak at Knoxville Cyber Summit
Sword & Shield Director of Computer Forensics and Security Assessments Bill Dean is a featured speaker at the Knoxville Cyber Summit Feb. 5 at the Holiday Inn - World's Fair Park.

Dean will discuss: "The Real Purpose of Your Information Security Program." The event, hosted by Claris Networks, will take place from 8:15 a.m. to noon. Six area cyber security and compliance specialists will speak and the event will end with a panel discussion.

Click here for more information and to register.