Holiday Shopping: How to Stay Safe and Protected

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

holiday shopping cozy christmas

With Christmas just around the corner and amidst a global pandemic, holiday shopping is at an all-time high. You click a few buttons and wham! You have Christmas delivered right to your door! Exciting stuff, I know. However, in order to keep holiday shopping exciting (and safe!), you must practice vigilance! Cyber-criminals are stronger today … Read more

Malicious Software- What About It?

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

Frustrated Man massages his head in frustration as his laptop is taken over by Malware. Floating files surround him with skull and bones symbols.

Malware, or malicious software, is purposely designed to cause damage and infect your computer, and give access of your computers contents to cyber criminals. Whereas the development of malware previously was limited to amateurs…

Cybersecurity Insurance

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

A man in a suite stands with an umbrella as binary code rains down. The photo is a metaphor for Cybersecurity Insurance.

The number of data breaches are constantly on the uprise, and they are costly. Business owners are taking preventative and proactive measures to secure and implement best cybersecurity practices. There is a virtually new…

Risk Management

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

Switch button positioned on the word maximum black background and red light. Conceptual image for illustration of high level of risk management.

In 2017, research has averaged the cost of a data breach to be over 7 million dollars. On average it takes an approximated 46 days to resolve a cyber-attack. Regardless of the numbers, it’s…

Cloud Computing

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

A cloud is raining information onto a hand holding a cell phone as a metaphor for Cloud Computing

The Cloud, what and where IS this cloud? This may be a question you have asked yourself. Simply, “cloud computing” is accessing and storing applications, data and information over the Internet, as opposed to…

,

Cybersecurity Vulnerabilities

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

Cybersecurity Vulnerabilities lock on credit card on keyboard

Cybersecurity vulnerabilities are weaknesses that allow attackers to reduce system information assurance. Sensible strategies should begin with basic knowledge of exactly what vulnerabilities may exist in your systems. Among the first steps is to…