United States Cybersecurity Magazine

ProcessBolt

Why are SMB owners unprepared to deal with cybercrime?

Author(s):

Maureen Brogie, Senior Advisor, InsuranceBee

SMB Owners throwing up hands in frustration at computer

Research shows that cyber-attacks on small businesses are on the rise. However, SMB owners are exposing themselves to significant financial risk by not implementing adequate steps to recover from a cyber-attack. InsuranceBee recently conducted a survey of over 1,300 SMBs, revealing that 54% do not have a plan in place to deal with a cyber-attack. … Read more

What is the difference between firewall hardware and firewall software?

Author(s):

Sydney Brackins, Executive Coordinator, United States Cybersecurity Magazine

Firewall Hardware and Firewall Software appearing as a cage in front of a blurred out man typing on his computer.

Firewall safety is essential to the security of your computer. Firewalls appear in both a hardware and software format. Both formats provide a different set of benefits to the safety of a network. However, using them in conjunction with one another is the smartest route to take. This article will give a brief explanation on … Read more

National Cyber Security Awareness Month

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

National Cyber Security Awareness Month, binary code particles and neon glowing cyber wave. in modern server room

Each October, National Cyber Security Awareness Month rolls around. Sponsored by the National Cyber Security Division, this month encourages us to approach our digital lives with awareness and caution. The NCSA takes time this month to reach out to Americans with tips for cyber hygiene. Additionally, the NCSA provides educational guides to online security. The … Read more

Email: The Ultimate Phishing Hole

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Hole in the ice, fishing line in the hole, boots to the side, email phishing abstract

Recently, we talked about the importance of questioning everything when it comes to cybersecurity; telephone calls, websites, text messages, snaps, any of these mediums are a forum for viruses. As the threats continue to change and grow, many people have started to become more aware of how widespread phishing has become. Phishing has grown in popularity, … Read more

Threat Intelligence: How It Can Help Tackle Malware, Phishing and Hacking

Author(s):

Jonathan Zhang, ,

Man walking down red hallway with icons, threat intelligence abstract

Cyber attacks happen all the time and in multiple forms, causing tremendous harm — e.g., broken trust, financial loss, reputation damage, and intellectual property theft. So preventing and stopping threats surely sounds like a priority, right? The tricky part is that there is not just a one-size-fits-all approach to achieve that. Each organization is unique … Read more

Hacking Through History: Three People Who Hacked Without Computers

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Hand clicking on Morse Code, Cybersecurity History, Early Hacking

People usually attribute the history of cybersecurity to the Creeper. The Creeper was an infamous program that acted as the first virus in history. This 1971 virus was distributed to mainframe computers and possessed to ability to move around. The program was not malicious in anyway. The Creeper did no damage.  It simply would display … Read more