Uncategorized

The 5 Biggest Tech Trends for 2022

By ||Categories: Uncategorized|

1. Education According to a recent Infosec report, 97% of people could not tell the difference between a phishing email and an authorized email. To combat this, many companies are educating their employees on the importance of cybersecurity. Educational options can look like webinars, engaging training videos and more, and are available at various price points. (Check out CySkills.com if you want to get your own education!) 2. Work From Home Security An unexpected benefit of the pandemic was the increase in remote work. Since this increased employee satisfaction and safety while decreasing business overhead, many companies plan to continue having

Apple Security + Facebook Explained

By ||Categories: Uncategorized|

You may have heard it in the news: Apple’s new privacy settings for iPhones and other devices are making waves, affecting companies like Facebook and paving the way for device security in the modern age. But just what are these privacy settings? Are they too much? Let’s break it down… Why does privacy even matter? Ad and data tracking lets companies collect information about you and your browsing habits. Let’s look at an example. Robert owns an iPhone, but it’s an old operating system and he doesn’t have any privacy settings turned on. Apple, Facebook, and any other enabled apps on his

The Best Cybersecurity Reading List

By ||Categories: Uncategorized|

For most of us, the holidays offer a few extra days off from busy work days or packed school schedules. That means more time to spend with friends and family and a few extra hours to snuggle up with a good book, magazine, or blog. If you (or that picky person on your shopping list) is interested in cybersecurity, check out our “best of” reading list below! Whether you’re a beginner just jumping into cybersecurity, or a seasoned professional looking for a cutting edge story, there’s something here for you! BOOKS Social Engineering: The Science of Human Hacking by Christopher

The Top 6 Most Expensive Cyber Attacks in History

By ||Categories: Uncategorized|

Companies spend billions of dollars on strong cyber protections every year. So why do they invest so much in their infrastructure and training? Because the alternative is a lot worse. They don’t want to become another cyber attack victim, shelling out millions in damages and ransoms.  Here are the world’s Top 6 Most Expensive Cyber Attacks: 6. Sony PlayStation (2011): $171 Million Hackers broke into Sony’s digital network, gaining access to data from over 100 million online accounts and requiring the PlayStation Online service to temporarily shut down. Damages from the attack included identity theft insurance,

5 Cyber Safety Tips for Online Holiday Shopping

By ||Categories: Uncategorized|

  The holidays are fast approaching, which means most Americans are gearing up to do some online holiday shopping. According to CNBC, online holiday shopping grew by 32% from 2019 to 2020, with consumers spending $188.2 billion from the comfort of their homes. This comfort, plus the convenience of home delivery, means that 2021 will likely see similar or even greater numbers, with retailers planning on over $100 billion in ecommerce during the month of November alone. With these increased holiday sales comes the increase of scams, phishing emails, and other cyber theft that can make your holidays less than bright.

The Politics of Cybersecurity

By ||Categories: Uncategorized|

Cybersecurity used to be just a personal concern for 14-year-olds downloading pirated music. Now, though, it has expanded to be a complicated, dynamic field addressing countless threats to people’s identity, personal data, and businesses. In today’s world, these sophisticated threats regularly affect governments and politics alike. “In liberal democratic countries, the role of the state in cybersecurity is a politically contested space.” ETH Zurich – Center for Security Studies Strong cybersecurity policies are no longer optional and this business board-level concern is critical among government policy as well. As a result, cybersecurity has entered the political space with very differing views

How Cyber Threats Are Changing Our Future

By ||Categories: Uncategorized|

As our world becomes more connected, automated, and digital, evolving cybersecurity threats are changing our everyday life. We’ve become reliant on WiFi and bluetooth connections, use passwords for everything, and are already used to using our thumbprint or face to gain access to our own devices. Home Security What’s more, our homes have become “smart,” too. From Alexa and Siri to video doorbells, basic day-to-day activities are now ruled by the Internet of Things (IoT). This promises to only increase as our lives become more automated and convenient. Strong home cybersecurity will soon become just as important as a

Artificial Intelligence & Cybersecurity

By ||Categories: Uncategorized|

As new technologies emerge and existing ones improve, we’re always creating new defenses against cyber criminals. Just as fast as we develop defenses, however, they learn to use these same new tools to crack them. Artificial Intelligence (AI) is no exception. As the benefits add up, many companies have adopted AI features to help run their business, yet many haven’t acknowledged the added risk AI may create. For any solid cybersecurity strategy, it’s important to understand the benefits and weaknesses of all technologies you use. How AI Helps Protect Us There’s no question that artificial intelligence and machine learning can automate

Top 6 Must-Listen Cyber Podcasts

By ||Categories: Uncategorized|

1. CyberWire Daily By Dave Bittner, Launched 2015 This daily cybersecurity podcast covers everything in cybersecurity, from hot topics and news to featured experts and forecasts. These clear and concise episodes are less than 30 minutes long and released every 24 hours. Did you know TCecure’s Tina Williams-Koroma was featured on the May 1st, 2020 episode of this prestigious podcast? Check it out here! 2. Darknet Diaries By Jack Rhysider, Launched 2017 True stories from the dark net in a story-telling format that engages the average listener. Each episode is 60 minutes long and a new episode is released every other Tuesday.

Webcam Security

By ||Categories: Uncategorized|

You’re sitting only inches away from a potentially huge vulnerability. Your computer’s webcam could create an opening for a hacker to gain access and learn compromising information. Download the FREE Webcam Security Guide below!  Why do hackers want to spy on you? The most common way for hackers to take control of your webcam and spy on you is through malware, which is inadvertently downloaded through links or emails that you click on. The hacker’s goal is to spy on your behavior and learn information they can use to make money. One way they can do this is by

Go to Top