Tips for Millennials on Cybersecurity Practices

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Millennials on their phones Cybersecurity

Millennials are at risk to be the victim of a cyber-crime. Millennials are in a constant state of media saturation. Growing up, many millennials have been bombarded with dated and cheesy propaganda designed to keep us “cyber safe”. Videos of large, talking computers who rap about the dangers of chat-rooms were a dime a dozen … Read more

6 Tips for Getting the Most out of Cybersecurity Conferences

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Man speaking at a conference on cybersecurity conferences

An important part of cybersecurity is plugging into the surrounding community. Connectivity is a major component of spreading new innovations. Many security professionals enjoy attending conferences for this very reason. But when attending cybersecurity conferences, it is important to get the most out of your interactions. Therefore, here are some tips to make sure you … Read more

Insider Threat – The Unseen Risk

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Giant shadow finger pointing at an employee who is an insider threat. Man is in a suit sitting at a desk on a chair. Grey background.

When it comes to threats in cybersecurity, the insider threat is not the first one that comes to mind. Malware, ransomware, hacking, and denial-of-service attacks dominate the headlines. But more often than not, an insider threat is the cause of many of these attacks. In fact, insider threats are responsible for around 43% of all data … Read more

Malicious Software- What About It?

Author(s):

Lauren Engelbrecht, Editor, United States Cybersecurity Magazine

Frustrated Man massages his head in frustration as his laptop is taken over by Malware. Floating files surround him with skull and bones symbols.

Malware, or malicious software, is purposely designed to cause damage and infect your computer, and give access of your computers contents to cyber criminals. Whereas the development of malware previously was limited to amateurs…