Posts Tagged ‘privacy’
How Your Business Can Identify and Avoid Phishing Attempts
AI has propelled the digital world forward by optimizing workflows and increasing productivity, but access to new technologies has also improved the work of cybercriminals. In a recent ICS2 webinar, they found that AI was being utilized to make more convincing phishing scams by addressing common issues like grammar and spelling mistakes. Even though the…
Read MoreEmbracing Cyber Service: A New Call to Action for Americans
Strengthening America’s Cybersecurity Workforce: The “Service for America” Initiative is the newest way to begin your cyber service. In an age of ever-present digital threats, the Administration has unveiled a transformative initiative to fortify America’s cybersecurity workforce. On September 4, 2024, the White House Office of the National Cyber Director (ONCD) announced the launch of…
Read MoreCloud Security Alliance adds Tiro Security as a (TCC) Trusted Cloud Consultant
We’re excited to share that Tiro Security has been recognized as a Trusted Cloud Consultant (TCC) by the Cloud Security Alliance (CSA), a global authority on cloud security best practices. This achievement reinforces our commitment to providing top-tier remote security solutions, from staffing and assessments to penetration testing, all designed to help our clients stay…
Read MoreCybersecurity in the New Administration
2016 has been a year, to say the least. With the loss of legends like David Bowie, Prince, Alan Rickman and Mohammad Alli, and of course a tumultuous presidential election leaving much of the nation divided, we’re just about ready to put this year to bed. However, we still have the better half of December…
Read MoreBlurring the Lines
Are our constructed identities on social media feeding on others insecurities? Social Media’s Distortion of reality and the effect it’s having on you and your privacy.
Read MoreLinkedIn Fraud: Who Are You Really Connecting With?
LinkedIn is a place where professionals can connect, discover professional opportunities and stay up to date with what’s happening in their field of work. However, not all of LinkedIn’s users are there to take advantage of the website as a resource. Rather, they are there to take advantage of other users. Fake profiles are not…
Read MoreOne month until the ‘Reset the Net’ movement to fight NSA surveillance
Privacy advocates have decided it is time for Internet users to take more serious measures to resist surveillance from National Security Agency and other alleged spy groups. The movement for users and developers to deploy newer and better security and privacy tools was introduced by Fight for the Future and has support from over 30 groups including Reddit, Imgur, Free Press, Libertarian Party and Demand Progress. June 5, the one year anniversary of the first news stories on Edward Snowden’s leaks about NSA surveillance, is the date ‘Reset the Net’ will initiate.
Read MoreEnterprise security posture extends to vendors as well
Massive security changes are taking place as the security buzz grows, especially in relation to giant corporations and their efforts to keep information protected. Huge public breaches are increasing public awareness about internet security and privacy, and as a result, many firms are implementing tighter enterprise security controls. Facebook and Google have both migrated from 1024-bits to 2048-bit encryption keys, while companies like Apple, Microsoft, Twitter, Myspace and Dropbox already have these in place.
Read MoreGoogle Glass spyware could put users’ privacy at risk
Google glass is oft criticized for the device’s implications on security and privacy. Its popular feature to allow wearers to take photos and videos has not only raised some eyebrows, it has even gotten the gadget banned from some establishments and one wearer claimed to have been assaulted because of her Glass.
Read MoreCisco to give away $300K in ‘Internet of Things’ security contest
Cisco has announced the start of the “Internet of Things Grand Security Challenge” in which programmers can create apps to help solve security issues around web-connected ‘things.’
Read More