Password Safety: A Comprehensive Guide to Choosing a Good Password

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Password guesses on a notepad. First two are bad passwords and the third one is a more complex password.

Password security is the most basic and ubiquitous form of cybersecurity. Every single account created online has a password attached to it. They predate the internet by hundreds of years and to this day, they remain the most reliable form of user authentication. So why does everybody choose such terrible passwords? What Makes a Password … Read more

Insider Threats – 2018 Statistics

Author(s):

Zehra Ali, ,

Evil man typing on computer, Insider Threats, cyber criminal.

Insider Threat (Fundamentals) As discussed, the insider threats are not always bred out of malicious nature. In fact, many insider threats exist due to the unintended or accidental happenings. More than 51% of companies are concerned about the unintentional insider attack. However, 49% of the companies are still worried about malicious insider, which do exist and are … Read more

How to Keep your PC From Getting a Virus

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

A magnifying glass lays over a PC screen as blue spiked viruses float out of the PC screen.

Stop Replacing your PC Once Every Three Years. It is no secret that PC has a bad reputation. In addition to being viewed as the model that is more likely to receive a virus, PCs are seemingly built to break. According to most companies, when your computer slows down, or behaves unusually, it is simply time … Read more

Child Internet Safety

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Woman assisting young girl who is typing on a computer in a library child internet safety

As a 23 year old, I belong to the very last age group of people who remember a world before internet connection became ubiquitous. My internet connection was dial up. Once I was old enough to start browsing the web, my parents sprung into action. They installed intense internet safety child blocks all over the … Read more

Common Cybersecurity Attacks

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Cybersecurity attacks, black and white, criminal typing on keyboard, cyber attack

In the cybersecurity world, vulnerability is the first step in exploitation. These exploitations often involve a hacker gaining unlawful access into a computer system and wreaking havoc. In order to stay vigilant and cyber safe, it is important to understand what the common cybersecurity attacks are. Backdoor Attacks A backdoor in a computer system is … Read more