Denial of Service: Access Denied

Author(s):

Patrick Putman, ,

Denial of Service, girl at laptop, access denied

As an internet user, you have likely experienced an interruption in service at some point. Maybe your favorite website was unavailable. Or perhaps your internet service was completely down. Sometimes this happens due to scheduled maintenance. Other times it happens due to hardware or software issues. However, interruptions are occasionally the result of what is … Read more

The Top 5 Cybersecurity Myths That Need to Die

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Cybersecurity Myths Man in Suit Looking at a White Wall With Two Direction Arrows Pointed To Fact or Myths

Cybersecurity myths are pervasive ideas people have about cybersecurity that weaken your cybersecurity posture. These myths often are defense mechanisms, rationalizations for apathy and inaction. It is important to dispel these myths. Otherwise, you could be opening yourself, or your business, to vulnerability. Cybersecurity Myth #1: Cybersecurity is the IT Guy’s Problem If you work … Read more

Password Safety: A Comprehensive Guide to Choosing a Good Password

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Password guesses on a notepad. First two are bad passwords and the third one is a more complex password.

Password security is the most basic and ubiquitous form of cybersecurity. Every single account created online has a password attached to it. They predate the internet by hundreds of years and to this day, they remain the most reliable form of user authentication. So why does everybody choose such terrible passwords? What Makes a Password … Read more

Cyber Insurance: Be Prepared for a Breach!

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Puzzle piece being placed in a puzzle. The piece is labeled Cyber Insurance.

At the end of the day, we trust that the internet is safe. Now, many people will protest to this statement. But the mere fact that you send emails, make online purchases, or have a social media account shows your sense of security. However, this security is bred out of necessity. No matter the job … Read more

Microsegmentation and a Zero-Trust Network

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Server room, Microsegmentation in a zero-trust system

We are currently in an unfortunate situation where universally, every business model predicates itself around connectivity. In fact, to be on the edge of innovation is to connect, to everything, before anyone else connects. With each new development, security suffers immediately. The incredulity that is always met with a new Facebook data breach is going … Read more

Why are SMB owners unprepared to deal with cybercrime?

Author(s):

Maureen Brogie, Senior Advisor, InsuranceBee

SMB Owners throwing up hands in frustration at computer

Research shows that cyber-attacks on small businesses are on the rise. However, SMB owners are exposing themselves to significant financial risk by not implementing adequate steps to recover from a cyber-attack. InsuranceBee recently conducted a survey of over 1,300 SMBs, revealing that 54% do not have a plan in place to deal with a cyber-attack. … Read more