5 Cyber Threats You Should Be Aware Of

Author(s):

Emma Megan, ,

A data breach can hit any business at any time. Whether it is sensitive information that the company must protect to maintain its competitive advantage or documents necessary to meet industrial or government’s regulatory requirements, all data must be protected. The fallout of a data breach has a significant impact on any business. Data breaches may include … Read more

The Evil Twin Attack: Safe use of Public Internet

Author(s):

Patrick Putman, ,

Evil Twin Attack, blue buildings, wifi connected city, smart city

Wireless connectivity has existed now for more than twenty years. And as technology advances, wireless access to the internet increases. Public WiFi access points are everywhere. They exist in restaurants, coffee shops, and shopping malls. Even entire cities offer public access to the internet. Additionally, if you carry a phone, you likely have wireless access … Read more

Top 10 Cybersecurity Risks For 2019

Author(s):

Duncan Kingori, ,

2019 Cyber Risk Man Assessing Servers Blue Illustration Password

2019 Risks Cybersecurity reports by Cisco show that thirty-one percent of organizations have at some point have encountered cyber-attacks on their operations technology. Cybersecurity breaches are no longer news. It is a topic that is finally being addressed due to the intensity and volume of attacks. 2019 is a fresh year and you can be sure … Read more

8 Simple Steps to Ensure Website Security

Author(s):

Julia Sowells, ,

Frayed Wirsed with blocks in between them spelling out Site Down as a metaphor for website security

Website Security  Now and again, the best techniques to handle any work are the easiest ones. It is necessary to protect your website from malicious hackers. However, once you find out the vulnerabilities of your website, you will find yourself in a complex situation that requires complex solutions. All things considered, there are essential accepted … Read more

Learning Cyber Hygiene through Esoteric Cosmology

Author(s):

Sam Mercaldo, ,

Hands washing in the sink cyber hygiene

Learning Cyber Hygiene Through the Esoteric Cosmology of the Onmyōji The onmyōji of ancient Japan were practitioners of magic. The onmyōji were a part of the Imperial bureaucracy in Japan. According to records, they defended the empire against malicious spirits and unseen attacks. Modern cyber warriors who fight in cyber space bear much similarity with the … Read more

Malicious Software- What About It?

Author(s):

Lauren Engelbrecht, Editor, United States Cybersecurity Magazine

Frustrated Man massages his head in frustration as his laptop is taken over by Malware. Floating files surround him with skull and bones symbols.

Malware, or malicious software, is purposely designed to cause damage and infect your computer, and give access of your computers contents to cyber criminals. Whereas the development of malware previously was limited to amateurs…