CMMC & Higher Education
Higher education research centers with government research contracts are affected by the new Cybersecurity Maturity Model Certification (CMMC) requirements. All organizations, including higher education centers, engaging with DoD will need to be CMMC 2.0 compliant by Oct. 1, 2025. CMMC security controls and provisions will be instituted at higher education institutions that already receive funding from the U.S. Department of Health and Human Services (HHS) and the National Science Foundation (NSF). This includes any system relying on federal funds, including student financial aid records – meaning nearly every college and university in the U.S. will be impacted. CMMC will require
TCECURE’S CEO LAUNCHES NEW VENTURE CYDEPLOY
FOR IMMEDIATE RELEASE Contact: Tina Williams-Koroma Phone: (202) 573-9344 Email: tina.williams@cydeploy.com Helping Businesses Protect Their Data BALTIMORE, MD / February 2021 – Cybersecurity services provider TCecure, LLC is excited to announce that it’s CEO, Tina Williams-Koroma, has launched a new product venture, CyDeploy, LLC which is designed to help businesses better protect their assets. CyDeploy is an on-demand (as a service) artificial intelligence (AI) driven platform that helps businesses efficiently answer the question and resolve: “what will break if I make these necessary security changes to my systems?” This platform has already garnered extensive support, gaining UMBC partnership and winning Maryland
Cloud Computing & Your Security
The world is turning virtual, with more and more programs, companies, and opportunities online. On top of this, the recent pandemic catalyzed the growth of cloud computing, creating a transformative shift for cybersecurity. Cloud security, or cloud computing security, is the unique cyber defense structure designed to combat these new, diverse threats. Cloud security is complicated, but more important than ever. Once upon a time, “security” just meant locking the door behind you. Then it transformed into local networks, and now we have an international cloud-based network of entire businesses, governments, and social groups. That’s a lot of data – about
CMMC: What You Need to Know
What It Is The Cybersecurity Maturity Model Certification (CMMC) is a unified security standard for establishing strong cybersecurity infrastructure and practices across the Defense Industrial Base (DIB). This updated set of requirements builds on and improves the currently existing NIST standards to effectively address cybersecurity vulnerabilities across the 300,000+ organizations in the DIB. Timeline The DoD first released the CMMC standards in January 2020, following up in September of the same year with a self-assessment requirement for all current or potential government contractors, due November 30th, 2020. These announcements were the beginning of a five-year CMMC rollout, culminating in
Social Engineering Scams 101
Companies and governments spend billions of dollars each year preparing secure infrastructure, establishing policies, establishing cyber defenses, and much more – all to prevent a single data breach or cyber attack that could cost them millions in stolen information and ransom costs. But what’s the biggest vulnerability cyber criminals are able to exploit? You. Criminals are always looking for new ways to psychologically manipulate you for their financial gain. They do this through social engineering, one of the most effective cybercrime methods. Social engineering is when a hacker coerces or manipulates someone into divulging protected information, rather than trying
Careers in Cybersecurity
In our increasingly online world, cybersecurity professionals are more in demand than ever before. The cybersecurity arena is exponentially expanding, with evolving new cyber threats appearing daily that require constantly updated defenses. A career in cybersecurity comes with job security, competitive rates, and an ever-changing challenge that promises to keep you on your toes. So where do you start? The various roles in cyber are diverse, ranging from IT positions to executive roles. Learn the basics in our CySkills course, Becoming a Cybersecurity Professional. In addition, the National Initiative for Cybersecurity Careers and Studies (NICCS) created an interactive career map to guide professionals
The Rise of Cybersecurity
Cybersecurity 101 Back to basics. As our world has moved into cyberspace, we’ve developed ways of protecting information from cyber criminals. Cybersecurity refers to this effort to defend the reliable and safe transmission of information on the internet, from cybersecurity technology to processes and education. Cyber threats can vary significantly depending on the information being accessed, the region, and the vulnerability, but most fall into three categories: Confidentiality (Identity & Money Theft) Integrity (Sabotage or “Leaks”) Availability (Ransomware) The Challenges Good security is more than just a locked house. Just like burglars circumventing a locked door, cyber criminals can also quickly learn to get
Why High Education Needs Better Cybersecurity
The education sector is a prime target for cybercriminals, yet often overlooked in the cybersecurity conversation. With a wealth of research available and large networks full of vulnerabilities, it’s never been easier for international hackers to gain access and compromise critical information. In this article, we look at the biggest reasons why universities and higher education in general desperately need improved cybersecurity strategies to combat the ever-growing threat of data breaches. Prime Targets Higher education connects hundreds of thousands of users across vast networks of academic research, personal information, and educational materials. Well beyond the valuable personal information alone,
How to Prevent CEO Fraud
As our inaugural blog post, the TCecure team decided to focus on a topic we know is very relevant for many of our clients: information security in the workplace, especially surrounding business email compromise and social engineering. Specifically, CEO fraud, an increasingly common scam. Here, we’ll explain what this scam is, how to recognize it, and how to protect your organization from the painful fallout of successful CEO fraud and related social engineering scams. What is it? CEO fraud, or Business Email Compromise (BEC), is a scam where a cybercriminal uses phishing and social engineering to dupe company employees into sending money or