Any time we log in to socials, we should be cognizant of the information we're willing to reveal and how for-profit actors could use that personal data. Sharing our time, tastes, and feedback with online communities is what draws us to the apps, but it’s easy to “overspend” your seemingly limitless personal data in exchange for entertainment. The TikTok application is unlike its contemporaries because its information-gathering technology is steps ahead and much more powerful. That information is primarily used to tailor the user’s feed and promote engagement with targeted advertisements.
Topics: Cybersecurity, Data Security, risk, Social Media
In this series, ProCircular’s team of information security specialists will break down the top cybersecurity risks for small and medium-sized businesses in 2023. How do SMBs prepare for cybersecurity threats and prevent security incidents? Trevor Burke lays out the special precautionsorganizations can take to lower the likelihood of incidents caused by internal threats.
Topics: Cybersecurity, Information Security, Data Security, Security Awareness Training, vCISO
The best approach to security is a proactive one, but nobody is perfect. What happens when a determined attacker finds their way into your network? How do you know where they have been, what they have seen, when they got in, and how they gained access? How do you prioritize remediation and confirm that the bad guys are out of your network? Incident responders, like ProCircular's Aaron Heikkila, are at the ready to swoop down and stop the attackers in their tracks!
Topics: Cybersecurity, Information Security, Data Security, Incident Response, security incident handling, security incident response
Security Information & Event Management, or SIEM (pronounced "sim," with a silent "e"), is gaining a reputation outside of the cybersecurity community. Advertisements on YouTube and Hulu tout the product’s incomparable security and real-time effectiveness, but they struggle to convey what a SIEM really does. Technical security lingo tends to make non-technical people tune out, and trying to simplify the concept diminishes its value.
Topics: Cybersecurity, Information Security, Data Security, SIEM
Topics: Cybersecurity, Information Security, consumer security, Data Security, Passwords