12

Jun 2018

Using Root Cause Analysis After a Cybersecurity Incident

There were 1,579 breaches reported in the U.S. in 2017, according to the Identity Theft Resource Center (ITRC). This represented a 44.7 percent increase over incidents reported for 2016. Your enterprise might be next, so it’s important to learn about incident response, including a Root Cause Analysis. The best defense for your business is prevention, but when an incident does occur, it’s important to use...

Read More


12

Jun 2018

Sword & Shield Named to CRN’s 2018 Solution Provider 500 List

Sword & Shield Makes List 11th Year in a Row KNOXVILLE, Tenn. – June 12, 2018 – Sword & Shield Enterprise Security, a leading national cybersecurity firm headquartered in Knoxville, Tennessee, announced today that the company was named to the CRN® 2018 Solution Provider 500 (SP 500) list for the 11th year in a row. The SP500 is CRN’s annual ranking of the largest technology...

Read More


05

Jun 2018

Ensuring GDPR Compliance for Your Enterprise

The European Union’s General Data Protection Regulation (GDPR) went into effect on May 25. If your company does business internationally, its electronic privacy processes and procedures must comply with GDPR requirements. This article discusses the new framework and ensuring GDPR compliance within your organization. What is the GDPR? The GDPR is concerned with data privacy and contains a number of new requirements for businesses. Failure...

Read More


17

May 2018

Sword & Shield Named Among World’s Most Innovative Cybersecurity Companies

Leading national cybersecurity firm named to Cybersecurity 500 2018 list KNOXVILLE, Tenn. May 17, 2018 – Sword & Shield Enterprise Security, a leading national cybersecurity firm based in Knoxville, Tennessee, was named to Cybersecurity Ventures’ 2018 Cybersecurity 500, an annual ranking of the world’s hottest and most innovative cybersecurity companies. Sword & Shield was one of only two Tennessee-based firms to make this global compilation...

Read More


09

May 2018

Sword & Shield Enterprise Security Contributes to PCI DSS

Award winning national cybersecurity firm garners acknowledgement from PCI Council. Knoxville, Tenn. May 10, 2018 – Sword & Shield Enterprise Security, a leading national cybersecurity firm headquartered in Knoxville, Tennessee, announced today the company has been acknowledged for its contributions to the April 2018 PCI SSC Cloud Computing Guidelines Information Supplement. This is the third time Sword & Shield has been credited with contribution to...

Read More


09

May 2018

Complying with HIPAA encryption standards; what you need to know

By Jeremy Watson Have you encrypted your electronic protected health information (ePHI) data at rest (being stored in persistent storage) and in transit (flowing from one point to another, whether it be the over the internet or a private network)? If so, you’re compliant with the HIPAA encryption standard and, therefore, covered by the Safe Harbor Rule in case of a breach. This means you’re...

Read More


01

May 2018

Using Common Cyber Sense to Stay Secure

Your IT department’s regular pleadings and how-tos about cybersecurity and safety may sound like a broken record, but there are important reasons behind following these practices and advice. Staying secure while connected is not just about how your system is set up by the techs- it is also about how you use it. Here is information security wisdom about using common cyber sense to stay...

Read More


11

Apr 2018

Understanding HIPAA Today

Look back into the Healthcare Privacy and Security Standard’s growth to understand where we are today. By Chris Lyons When the Health Insurance Portability and Accountability Act (HIPAA) was signed into law in August of 1996, the intent was to provide an improved method of allowing employees to ensure they were able to retain healthcare coverage between jobs, combat waste and fraud in healthcare, and...

Read More


03

Apr 2018

Cybersecurity Spring Cleaning: Critical Data Scans

By Bowe Hoy Protecting your organization’s critical data requires knowing where it is. Have you ever lost something in your house despite spending hours looking “everywhere” for it? Or stumbled upon a cache of items you forgot you had? This probably motivated you to do some major cleaning; sorting, organizing and disposing of stuff to know where the important items are located and easily get...

Read More


02

Apr 2018

Planning a Strategic Security Posture

Battling one cyber-attack crisis after another is not only draining for your IT staff, it’s also unproductive and could end up costing more in the long run. That’s why experts say long-term planning to achieve a strategic security posture is a better option for your organization than simply dousing the fires lit by hackers as they pop up. This allows IT professionals to prioritize projects...

Read More



Page 1 of 2012345...1020...Last »