Uncategorized

The Politics of Cybersecurity

By ||Categories: Uncategorized|

Cybersecurity used to be just a personal concern for 14-year-olds downloading pirated music. Now, though, it has expanded to be a complicated, dynamic field addressing countless threats to people’s identity, personal data, and businesses. In today’s world, these sophisticated threats regularly affect governments and politics alike. “In liberal democratic countries, the role of the state in cybersecurity is a politically contested space.” ETH Zurich – Center for Security Studies Strong cybersecurity policies are no longer optional and this business board-level concern is critical among government policy as well. As a result, cybersecurity has entered the political space with very differing views

How Cyber Threats Are Changing Our Future

By ||Categories: Uncategorized|

As our world becomes more connected, automated, and digital, evolving cybersecurity threats are changing our everyday life. We’ve become reliant on WiFi and bluetooth connections, use passwords for everything, and are already used to using our thumbprint or face to gain access to our own devices. Home Security What’s more, our homes have become “smart,” too. From Alexa and Siri to video doorbells, basic day-to-day activities are now ruled by the Internet of Things (IoT). This promises to only increase as our lives become more automated and convenient. Strong home cybersecurity will soon become just as important as a

Artificial Intelligence & Cybersecurity

By ||Categories: Uncategorized|

As new technologies emerge and existing ones improve, we’re always creating new defenses against cyber criminals. Just as fast as we develop defenses, however, they learn to use these same new tools to crack them. Artificial Intelligence (AI) is no exception. As the benefits add up, many companies have adopted AI features to help run their business, yet many haven’t acknowledged the added risk AI may create. For any solid cybersecurity strategy, it’s important to understand the benefits and weaknesses of all technologies you use. How AI Helps Protect Us There’s no question that artificial intelligence and machine learning can automate

Top 6 Must-Listen Cyber Podcasts

By ||Categories: Uncategorized|

1. CyberWire Daily By Dave Bittner, Launched 2015 This daily cybersecurity podcast covers everything in cybersecurity, from hot topics and news to featured experts and forecasts. These clear and concise episodes are less than 30 minutes long and released every 24 hours. Did you know TCecure’s Tina Williams-Koroma was featured on the May 1st, 2020 episode of this prestigious podcast? Check it out here! 2. Darknet Diaries By Jack Rhysider, Launched 2017 True stories from the dark net in a story-telling format that engages the average listener. Each episode is 60 minutes long and a new episode is released every other Tuesday.

Webcam Security

By ||Categories: Uncategorized|

You’re sitting only inches away from a potentially huge vulnerability. Your computer’s webcam could create an opening for a hacker to gain access and learn compromising information. Download the FREE Webcam Security Guide below!  Why do hackers want to spy on you? The most common way for hackers to take control of your webcam and spy on you is through malware, which is inadvertently downloaded through links or emails that you click on. The hacker’s goal is to spy on your behavior and learn information they can use to make money. One way they can do this is by

CMMC & Higher Education

By ||Categories: Uncategorized|

Higher education research centers with government research contracts are affected by the new Cybersecurity Maturity Model Certification (CMMC) requirements. All organizations, including higher education centers, engaging with DoD will need to be CMMC 2.0 compliant by Oct. 1, 2025. CMMC security controls and provisions will be instituted at higher education institutions that already receive funding from the U.S. Department of Health and Human Services (HHS) and the National Science Foundation (NSF). This includes any system relying on federal funds, including student financial aid records – meaning nearly every college and university in the U.S. will be impacted. CMMC will require

TCECURE’S CEO LAUNCHES NEW VENTURE CYDEPLOY

By ||Categories: Uncategorized|

FOR IMMEDIATE RELEASE Contact: Tina Williams-Koroma Phone: (202) 573-9344 Email: tina.williams@cydeploy.com Helping Businesses Protect Their Data BALTIMORE, MD / February 2021 – Cybersecurity services provider TCecure, LLC is excited to announce that it’s CEO, Tina Williams-Koroma, has launched a new product venture, CyDeploy, LLC which is designed to help businesses better protect their assets. CyDeploy is an on-demand (as a service) artificial intelligence (AI) driven platform that helps businesses efficiently answer the question and resolve: “what will break if I make these necessary security changes to my systems?” This platform has already garnered extensive support, gaining UMBC partnership and winning Maryland

Cloud Computing & Your Security

By ||Categories: Uncategorized|

The world is turning virtual, with more and more programs, companies, and opportunities online. On top of this, the recent pandemic catalyzed the growth of cloud computing, creating a transformative shift for cybersecurity. Cloud security, or cloud computing security, is the unique cyber defense structure designed to combat these new, diverse threats. Cloud security is complicated, but more important than ever.  Once upon a time, “security” just meant locking the door behind you. Then it transformed into local networks, and now we have an international cloud-based network of entire businesses, governments, and social groups. That’s a lot of data – about

CMMC: What You Need to Know

By ||Categories: Uncategorized|

What It Is The Cybersecurity Maturity Model Certification (CMMC) is a unified security standard for establishing strong cybersecurity infrastructure and practices across the Defense Industrial Base (DIB). This updated set of requirements builds on and improves the currently existing NIST standards to effectively address cybersecurity vulnerabilities across the 300,000+ organizations in the DIB. Timeline The DoD first released the CMMC standards in January 2020, following up in September of the same year with a self-assessment requirement for all current or potential government contractors, due November 30th, 2020. These announcements were the beginning of a five-year CMMC rollout, culminating in

Social Engineering Scams 101

By ||Categories: Uncategorized|

Companies and governments spend billions of dollars each year preparing secure infrastructure, establishing policies, establishing cyber defenses, and much more – all to prevent a single data breach or cyber attack that could cost them millions in stolen information and ransom costs. But what’s the biggest vulnerability cyber criminals are able to exploit? You. Criminals are always looking for new ways to psychologically manipulate you for their financial gain. They do this through social engineering, one of the most effective cybercrime methods. Social engineering is when a hacker coerces or manipulates someone into divulging protected information, rather than trying

Go to Top