The Importance of Protected Digital Assets

Author(s):

Frankie Wallace, ,

Digital Assets

A significant number of your digital assets, whether personal or professional, are now digital in this current age. The transfer of business practices, records, and even storefronts from a mostly physical world to a digital plain has developed rapidly over the last couple decades. Because of this, we are increasingly concerned about the security of … Read more

Top 10 Cybersecurity Risks For 2019

Author(s):

Duncan Kingori, ,

2019 Cyber Risk Man Assessing Servers Blue Illustration Password

2019 Risks Cybersecurity reports by Cisco show that thirty-one percent of organizations have at some point have encountered cyber-attacks on their operations technology. Cybersecurity breaches are no longer news. It is a topic that is finally being addressed due to the intensity and volume of attacks. 2019 is a fresh year and you can be sure … Read more

Insider Threats – 2018 Statistics

Author(s):

Zehra Ali, ,

Evil man typing on computer, Insider Threats, cyber criminal.

Insider Threat (Fundamentals) As discussed, the insider threats are not always bred out of malicious nature. In fact, many insider threats exist due to the unintended or accidental happenings. More than 51% of companies are concerned about the unintentional insider attack. However, 49% of the companies are still worried about malicious insider, which do exist and are … Read more

Malicious Software- What About It?

Author(s):

Lauren Engelbrecht, Editor, United States Cybersecurity Magazine

Frustrated Man massages his head in frustration as his laptop is taken over by Malware. Floating files surround him with skull and bones symbols.

Malware, or malicious software, is purposely designed to cause damage and infect your computer, and give access of your computers contents to cyber criminals. Whereas the development of malware previously was limited to amateurs…

Cloud Computing

Author(s):

Lauren Engelbrecht, Editor, United States Cybersecurity Magazine

A cloud is raining information onto a hand holding a cell phone as a metaphor for Cloud Computing

The Cloud, what and where IS this cloud? This may be a question you have asked yourself. Simply, “cloud computing” is accessing and storing applications, data and information over the Internet, as opposed to…