The Biggest 2020 Cybersecurity Threats

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

2020 trends, cybersecurity threats, 2020 building blocks, 2019 to 2020 change

Cybersecurity threats, as we discussed in our recent 2019 data breach article, were a huge problem in 2019. Within the first 6 months, Forbes reported that 2019 yielded 3,800 publicly disclosed breaches, a 52% increase from 2018’s first 6 months. 2019 saw data breaches in every sector, from financial and healthcare, to government and entertainment. … Read more

Safe Apps: How Can You Tell?

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Safe App, Kids safety, kid on Ipad, cybersafe

StandHogg Hits Google Store According to Forbes, Google Android Threats continue to permeate through malware ridden apps that may affect many Android users. Researchers at the Norwegian app security company Promon claim that safe apps can be corrupted through dangerous vulnerabilities. In this particular case, the vulnerability, being dubbed “StrandHogg”, allows dangerous malware to pose … Read more

Emergency Actions After Hacking

Author(s):

Isabell Gaylord, ,

emergency sign in room with red chairs, emergency, hacking metaphor

Hacking has become ubiquitous on the internet. With even major companies like Evernote getting hacked, it’s not hard to imagine that you, an individual, could also get hacked. The experience is actually quite common, though that does not necessarily make it any less distressing. You are left feeling confused, with no idea what you should … Read more

OnePlus Reveals Second Data Breach in Two Years

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

OnePlus

Smartphone manufacturer OnePlus has been the victim of a data breach in which an unauthorized party gained access to customer’s order information. One Plus has released a statement revealing that customer names, contact numbers, emails, and shipping addresses might have been susceptible to theft. However, they have revealed that customer’s payment information, passwords, and accounts … Read more

Fraud Prevention With Good Cybersecurity Practices

Author(s):

Kayla Matthews, ,

Fraud Concept

Financial fraud cases show up in the headlines regularly. Yet people don’t necessarily connect these cases to cybersecurity. However, it’s often true that good cybersecurity makes a person or company less likely to experience financial fraud. Cybersecurity Starts With Awareness Many scammers who operate online pose as legitimate brands, such as banks or e-commerce companies. … Read more

Network Intrusion: How to Detect and Prevent It

Author(s):

Isabell Gaylord, ,

Intrusion, knights attacking laptop, cyber attack metaphor

A network intrusion refers to any forcible or unauthorized activity on a digital network. These unauthorized activities almost always imperil the security of networks and their data. Nowadays, online brands and companies are the usual subjects of these attacks. However, to properly deal with this, organizations should have a cybersecurity team in place. This will … Read more

13 Dangers of Cloud-Hosted Data

Author(s):

Isabell Gaylord, ,

Cloud Computing Security Concept

Organizations are under pressure to either develop new applications or migrate to using cloud-based services. However, like any third-party product being introduced into an organization, there are many risk factors to consider to ensure that the business of the day is carried out securely.  Cloud-based services provide an extra layer of efficiency in the workplace. … Read more

Balancing Automation With Security

Author(s):

Kayla Matthews, ,

Automation cybersecurity graphic

Adding automation to your workflow can streamline tasks and boost productivity. Indeed, with advances in technology, more companies are jumping on the trend and reaping the benefits. However, adoption will undoubtedly impact your company’s security. Here are five things you should know to reduce security risks caused by automation. Prioritize Security in Automation One issue … Read more