17

Oct 2017

KRACK exploit explained

A recently discovered vulnerability in the most widely used wireless security standard may be one of the biggest in years. The good news is there are precautions that can be taken to keep you and your business safe. Sword & Shield’s Corey McReynolds and Joe Gray explain: What the Attack is This attack exploits a vulnerability in Wireless Protected Access (WPA), both WPA and WPA2 encryption...

Read More


05

Oct 2017

Active Directory Password Health Analysis – Part 1

By Russel Van Tuyl Active Directory (AD) is an essential part of a Microsoft domain. A prominent function AD performs is to keep a record of all domain user accounts and their associated password stored as an encrypted one-way hash value. One of the many objectives during a penetration test is to gain access to the AD ntds.dit database file, which contains the user account...

Read More


28

Sep 2017

Facing your first HIPAA Risk Assessment? Here’s what you should know.

By Chris Lyons HIPAA compliance can be a daunting endeavor, especially if your organization has never faced this challenge. A HIPAA risk assessment can help you achieve compliance. If you are considering your first HIPAA risk assessment, there are a few things you should know. Here are four points to get you on your way: Understand your security environment Prepare for the assessor’s visit by gathering...

Read More


21

Sep 2017

Sword & Shield Enterprise Security Aims to Improve Mobile App Security

National cybersecurity firm launches mobile app security assessment service to ensure businesses and entrepreneurs offer and use secure mobile applications KNOXVILLE, Tenn. Sept. 21, 2017 – Sword & Shield Enterprise Security, a leading national cybersecurity firm based in Knoxville, Tennessee, now offers detailed mobile application security assessments for Android, iOS, and Windows phone or tablet-based apps to determine their vulnerabilities and how sensitive information can...

Read More


11

Sep 2017

Sword & Shield Enterprise Security Releases White Paper on Future of Passwords

National cybersecurity firm discusses the future of password management, including the push for more user-friendly policies KNOXVILLE, Tenn. Sept. 12, 2017 – Sword & Shield Enterprise Security, a leading national cybersecurity firm based in Knoxville, Tennessee, has released a white paper, “The Future of Passwords: Perspectives for Enterprises.” Available now at https://landing.swordshield.com/new-password-guidelines-white-paper, the white paper highlights the latest National Institute of Standards and Technology (NIST)...

Read More


06

Sep 2017

Social Engineering Q&A: How to Strengthen Your Network Security

As organizations respond to InfoSec threats by hardening their network security, hackers are exploiting softer targets, such as employees and management, to gain access. According to IBM research, in 2016 about 71 percent of reported cyberattacks in the healthcare industry and 57 percent of cyberattacks in the financial services industry depended on the actions of employees who had unintentionally compromised the network security of their...

Read More


24

Aug 2017

Petya: Cyber Warfare Deception

By Ryan Ernst The following article originally appeared in the August 2017 edition of Gulf Insider online magazine. “All warfare is based upon deception.” – Sun Tzu, The Art of War Petya, the global cyberattack launched weeks after the WannaCry ransomware, appeared at first as a new variant of the original 2016 ransomware of the same name.  However, security researchers soon identified significant differences prompting...

Read More


22

Aug 2017

Reflections of an Intern: My Cybersecurity Career Path

By Tim Welles Every year at the end of Christmas break, I sit down and make a list of places where I would like to intern the upcoming summer. A summer internship at Sword & Shield Enterprise Security has been at the top of that list for the last 3 years. My first internship was focused in the IT/network operations area. While it was interesting,...

Read More


16

Aug 2017

How to Write an Effective Business Continuity Plan

By Teddy Ansink An effective business continuity plan (BCP) is proactive and aims to avoid and mitigate risks associated with a disruption of operations, including ensuring personnel and assets are protected and able to function in the event of a disaster. Due to the importance of this goal, the development of a BCP requires strategic thinking through the recognition of threats and risks facing a...

Read More



Page 1 of 1912345...10...Last »