Malware – What About It?

Author(s):

Lauren Engelbrecht, Editor, United States Cybersecurity Magazine

Frustrated Man massages his head in frustration as his laptop is taken over by Malware. Floating files surround him with skull and bones symbols.

Malware, or malicious software, is purposely designed to cause damage and infect your computer, and give access of your computers contents to cyber criminals. Whereas the development of malware previously was limited to amateurs…

Cybersecurity Insurance

Author(s):

Lauren Engelbrecht, Editor, United States Cybersecurity Magazine

A man in a suite stands with an umbrella as binary code rains down. The photo is a metaphor for Cybersecurity Insurance.

The number of data breaches are constantly on the uprise, and they are costly. Business owners are taking preventative and proactive measures to secure and implement best cybersecurity practices. There is a virtually new…

Risk Management

Author(s):

Lauren Engelbrecht, Editor, United States Cybersecurity Magazine

Switch button positioned on the word maximum black background and red light. Conceptual image for illustration of high level of risk management.

In 2017, research has averaged the cost of a data breach to be over 7 million dollars. On average it takes an approximated 46 days to resolve a cyber-attack. Regardless of the numbers, it’s…

Cloud Computing

Author(s):

Lauren Engelbrecht, Editor, United States Cybersecurity Magazine

A cloud is raining information onto a hand holding a cell phone as a metaphor for Cloud Computing

The Cloud, what and where IS this cloud? This may be a question you have asked yourself. Simply, “cloud computing” is accessing and storing applications, data and information over the Internet, as opposed to…