5 Cyber Threats You Should Be Aware Of

Author(s):

Emma Megan, ,

A data breach can hit any business at any time. Whether it is sensitive information that the company must protect to maintain its competitive advantage or documents necessary to meet industrial or government’s regulatory requirements, all data must be protected. The fallout of a data breach has a significant impact on any business. Data breaches may include … Read more

Why Software Architecture Matters in Foolproof Cybersecurity

Author(s):

Judy Robinson, ,

Software Architecture

The long-term success of any business or digital venture depends solely on a strong software architecture – that has robust performance and is equipped with foolproof cybersecurity. In simpler terms, software architecture forms the basis of the development of an enterprise. Therefore, the main source acts as a guideline to shape the future of the … Read more

Denial of Service: Access Denied

Author(s):

Patrick Putman, ,

Denial of Service, girl at laptop, access denied

As an internet user, you have likely experienced an interruption in service at some point. Maybe your favorite website was unavailable. Or perhaps your internet service was completely down. Sometimes this happens due to scheduled maintenance. Other times it happens due to hardware or software issues. However, interruptions are occasionally the result of what is … Read more

Why Data Security Has Become a Priority for Healthcare Professionals

Author(s):

Frankie Wallace, ,

healthcare

The healthcare industry has been particularly vulnerable to cybersecurity risks. The biggest data breaches in 2018 involved email, phishing attacks, and the misconfiguration of databases. One attack even lasted longer than a year. With so much patient data in the healthcare system, it’s becoming increasingly important to improve data security. There are a variety of … Read more

A Brief and Incomplete History of Cybersecurity

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Cybersecurity History, evolved, evolution of man, blue men, computer, cyber

Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However, cybersecurity history dates back to the seventies, before most people even had a computer. We have covered hacking incidents that took place before computers, but for the purposes of this article, our timeline starts in 1971, with an experiment. … Read more

Dark Web: Unpacking the Notoriety

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Dark Web Silk Road anonymous marketplace drugs index

If you are internet savvy, or into Creepypastas, you absolutely have heard of the dark web. What started out as a little trivia fact (did you know 99% of the internet is The Deep Web?!) has morphed into something else entirely. The Legend of the Dark Web Because the dark web is non-indexable, Google can … Read more

Cyber Insurance: Be Prepared for a Breach!

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Puzzle piece being placed in a puzzle. The piece is labeled Cyber Insurance.

At the end of the day, we trust that the internet is safe. Now, many people will protest to this statement. But the mere fact that you send emails, make online purchases, or have a social media account shows your sense of security. However, this security is bred out of necessity. No matter the job … Read more

8 Different Types of Malware

Author(s):

Julia Sowells, ,

Malware fishing hook grabbing password out of envelope.

To combat malware, it’s important that you get your malware classifications right. These are the different types of malware and explaining how to recognize them: 1. Virus We tend to refer to all malware as viruses, but it’s not so. A virus modifies other legitimate host files in such a way that when you execute … Read more