Skip to main content
Institute for Pervasive Cybersecurity

Cybersecurity Update Blog

Wednesday, August 10

Read about the local impacts related to cybersecurity.
Idaho schools looking to help fill cybersecurity workforce need

According to CyberSeek, there are more than 5,000 cybersecurity jobs open around Idaho. Nearly 3,500 openings are in the Boise Metro area.

“Well, the days of being safe simply because you were small and unimportant are gone,” BSU’s Institue for Pervasive Cybersecurity’s CyberDome manager, Marlin Roberts said. “The cybercriminals are interested in just about anything. The advent of ransomware has made it lucrative to go ahead and steal data to basically extort money from these entities.”

Read More Here

St. Luke’s vendor experiences data breach. Thousands of Idaho patients may be affected

Tens of thousands of St. Luke’s Health System patients’ data might be vulnerable after a cybersecurity incident involving Kaye-Smith, one of the system’s business vendors, in May. In a Wednesday news release, St. Luke’s announced that a vendor handling statement processing and billing services experienced a data breach. The health system became aware of the breach on July 6. “We have identified 31,573 individuals whose records may have been impacted by the vendor data breach,” St. Luke’s spokesperson Christine Myron told the Idaho Statesman in an email. She said no St. Luke’s networks were affected.

Read More Here

Tuesday, August 9

Read about the attacks effecting businesses and preventative measures taken.
NHS Cyber-Attack Delays Ambulances

The NHS is battling a cyber-attack which has disrupted patient referrals, appointment bookings and other operations, according to reports.

The health service is said to be working through its incident response processes after managed service provider Advanced first detected the malicious activity on Thursday morning.

The firm helps to run NHS 111, a phone and online-based service designed to dispense medical advice for urgent problems.

Read More Here

US strategic advantage depends upon addressing cybersecurity vulnerabilities of weapon systems

Russia’s war with Ukraine is an act of ruthless ambition exemplifying the commitment of President Vladimir Putin to achieve “victory” at all costs. The motions of a hybrid war are in swing, as we witness the fusion of conventional and unconventional tools of conflict on the battlefield.

As the conflict fans wider and deeper, U.S. defenders and policymakers must consider additional nonconventional capabilities Russia may implement to gain battlefield advantage. One such possibility is the use of cyberattacks against modern Western weapon systems.

Read More Here

Monday, August 8

Read about back to school security and free training the government released to the public as part of their cyber training and hiring initiative.
ESET Celebrates Back to School with Cybersecurity Discounts

To ensure that students and their parents have the tools needed to keep their technology safe, ESET is offering 30% off its consumer cybersecurity solutions for children in elementary, middle and high school. College students can receive 50% off these best-in-class solutions by using their ID.me login.

“Whether students are heading to school down the block or across the country, they are relying on a range of devices to support their studies, entertainment and social lives,” said Brent McCarty, president of ESET North America. “Given the amount of time that young people spend on their devices, they require tools that provide advanced protection from hackers, scams and malware without slowing their devices down. That is why we are offering special deals on our cybersecurity solutions for this at-risk group.”

Read More Here

White House Announces Free Cybersecurity Training

Fortinet said it would make its information security awareness and training service available for free for all K-12 school districts across the country, and (ISC)², the world’s largest nonprofit association of certified cybersecurity professionals, announced its One Million Certified in Cybersecurity program.

The initiative aims to put one million people through its Certified in Cybersecurity entry-level certification exam and education program for free.

Read More Here

Thursday, August 4

Read about one of our students and employees in the IPC and Cyberdome talk about their advice as a student.

How did you start looking for work and prepare for internships/jobs?

I originally started looking for internships through Handshake. I spent some good time getting my resume up to snuff and had some outside eyes proofread it for me. At that point I started to apply to anything that sounded interesting and was also a paid opportunity. I only ever heard back from a single opportunity out of the half dozen or so I applied for, and that reply came in months later.
I immediately pivoted to looking for opportunities closer to home. I started to monitor my email for potential opportunities within the department. You can opt into a mailing list that the Computer Science department runs for potential work and internship opportunities. That’s when I saw an email from Ed. He was looking for summer interns and volunteers to help get a new Cybersecurity Department spun up. I reached out to him personally and asked if he still needed people, he said yes, asked me to send him a simple resume, and wanted to interview me same week. At that point landing the job was all about doing well in the interview, setting work expectations etc. I have been working there ever since.

How do you manage your priorities to meet school/work deadlines while still managing a home/personal life?

Part of how I handled balance was by setting good expectations up front with Ed at the time of employment. I was open and forward about how if I was underwater with school or personal responsibilities I would need to disappear for a while to get things under control. He was very understanding and made it very clear that his expectations for work aligned with mine.
Keeping clear, consistent, and regular communication channels open with your managers will make your life easier when trying to juggle responsibilities. Whenever anything came up, I sent the appropriate email, text, or phone call and took care of business. I was allowed to disappear if needed but ensured that everyone knew what was going on beforehand.
Other than that time management is pretty important. Write things down, stay organized, and triage your responsibilities. Take everything one step at a time and things will work out just fine

Wednesday, August 3

Read about ways you can keep you and your organization safe.
Top 10 Cybersecurity Startups to Providing the Best Digital Security Solutions

The emergence of IoT devices with the integration of cutting-edge technologies like artificial intelligence and computer vision has made significant growth in cybersecurity measures. Multiple cybersecurity companies are gaining in popularity to combat cyberattacks in companies. There are different cybersecurity companies using AI that can protect internet-connected systems or other IoT devices. AI and machine learning can help augment a company’s cybersecurity by constantly monitoring for any suspicious activity and correcting the problem before it takes effect.

Read More Here

Cybersecurity in Web3: Protecting Yourself (And Your Ape JPEG)

Even though Web3 evangelists have long touted the native security features of blockchain, the torrent of money flowing into the industry makes it a tempting prospect for hackers, scammers and thieves.

When bad actors succeed in breaching Web3 cybersecurity, it’s often down to users overlooking the most common threats of human greed, FOMO, and ignorance, rather than because of flaws in the technology.

Phishing remains the most popular form of cyberattack. Here’s how to protect yourself, your crypto and your NFTs.

Read More Here

Tuesday, August 2

What Working in Cybersecurity is Really Like: A Day in the Life

There are a lot of reasons to pursue a career in cybersecurity. Across the board, cybersecurity roles offer competitive pay, growth opportunity, job security, exciting day-to-day tasks and the chance to make a difference. Cybersecurity careers don’t only consist of white hat hacking, there is a huge variety of different avenues that are fit for different personality types.

To help you explore those options, we asked cybersecurity experts about their experiences, background, day-to-day schedule, advice and the pros and cons of their jobs.

Read More Here

IT Security Roles and Responsibilities of Cyber Security Professionals

Even with best Cyber Security Professional on your side, hackers and cybercriminals will eventually find a way to get to your data. That’s not to say that all is hopeless, however. IT security professionals work on the front lines of this battle fighting to protect against the continually evolving threat landscape.

Read More Here

Monday, August 8

Read about the special series we are putting out to educate on what the different Cybersecurity roles do!

What Does a Cybersecurity Engineer do?

Cybersecurity is becoming more of an identifiable role in our society, with more chips, tools, and computing getting intertwined into our network, the more security we need. This means more employees are needed, especially as the current state of employment nationally is critically low. As we try to provide internship opportunities to prospective students, we often get asked “What does a Cybersecurity Engineer even do?” to which we have some personal accounts from our very own Cyberdome Interns. Dallin Baird stated:

An engineer’s roles and responsibilities are largely intertwined with the security of an organization’s infrastructure and networks. The main objective is to ensure that adequate security controls are being implemented to allow effective confidentiality, integrity, and availability of data. The engineer will design, build, and continually monitor different security solutions with the intent to bolster the organization’s security posture and protect the IT infrastructure. (Baird, 06/2022)

Specific roles will vary depending on the organization you work for, their goals, assets, and business will all change the things they need done. Here at the Cyberdome, we focus on bringing cybersecurity awareness, education, and security coverage to small rural communities and students who work here. We believe that you are only as strong as your weakest link, so we strive to build Idaho up to a secure and strong state.

Besides our rural coverage, which is predominantly a Cybersecurity Analyst role, we have many other projects that our staff and interns are involved in. Engineers at the Cyberdome have and are currently working on a variety of different projects like Virtual City, Manticore, Raspberry Pi Escape Room, Hackfort Workshops, VulnLabs, and more. Kevin Guan said, “I was able to work on a lot of different projects that stretched my comfort zone in a good way. Among my other co-workers, all of them have the traits that make them amazing people to work with. Overall, the experience was super beneficial to me since I was able to learn a lot of skills (both IT-related and non-IT-related) that aren’t really taught in school.”

On top of students’ assigned jobs, there often are many opportunities to help with other related tasks for the Cyberdome or IPC. One engineer, Isaac Bard has helped build a server cluster, create a virtualized city, debugged, and learned a variety of security-related pieces of software, and is currently learning an API for a software integration. “My time as an engineer for the institute has been exciting and very diverse. I would say the main job of being an engineer at the institute is to critically problem solve. That sounds vague, but the amount of complex and nuanced issues that pop up around here would surprise you.” said Isaac, “Being an engineer at the institute means being able to learn and tackle new problems all the time. Keeps you busy, but as a consequence keeps things interesting, to say the least.” Another Engineer, Michal Le explains his experience on the projects he’s been a part of:

My most valuable experience so far in this internship is Hackfort. At Hackfort, we were tasked to create an environment to educate the public about Cybersecurity training and at the same time represent the Institution publicly for the first time. During this time, we ran into multiple complications one after the other and it was only Eric, Dallin, and I on this project. I was working on both the management of the virtual machines as well as the networking for this event. To be honest, I thought it was doomed to fail but we worked very well together and finally had working solutions. (Le, 06/2022)

You’ve probably noticed a few times now people mention the community of student Engineers at the Cyberdome. We often work in teams, and if you aren’t working in teams, you get introduced to the many different employees with strong skill sets who may be of use to you in your tasks if you run into problems. “As the first Engineering team of our institution, our goal is to develop and lay a foundation for future Engineers and Analysts that follows our paths. This includes developing security exercises, scenarios, and environments for training, building our documentation repository for new members, configuring, and securing our network infrastructure, creating tools to automate processes, outreach and teaching our community, as well as creating potentially Idaho’s first cross-school Cybersecurity competitions. Though our team is small in size, our highly ambitious projects are worked on by highly ambitious people and have proven to be very successful with our public projects so far.” Michael Le said. Our engineers are getting the Cyberdome ready for you right now, so apply! We hope to work with you soon.

Thursday, July 28

Read about Cybersecurity basics and ways to start your learning.
Cybersecurity Basics

Cyber Criminals Target Companies of All Sizes – knowing some cybersecurity basics and putting them in practice will help you protect your business and reduce the risk of a cyber attack.

Learn More Here

Cybersecurity Courses & Tutorials

Cybersecurity is a fast-growing field that addresses the security risks of our increasingly connected digital world. Learn cybersecurity, and you will learn how users, companies, and even governments protect themselves and recover from cyber threats and attacks. Start defending yourself or your organization, or let this be your first step to becoming a security professional!

Learn More Here

Wednesday, July 27

Read about cybersecurity jobs and where to find them.
Cybersecurity Jobs Report: 3.5 Million Openings In 2025

Over an eight-year period tracked by Cybersecurity Ventures, the number of unfilled cybersecurity jobs grew by 350 percent, from one million positions in 2013 to 3.5 million in 2021. For the first time in a decade, the cybersecurity skills gap is leveling off. Looking five years ahead, we predict the same number of openings in 2025.

Read More Here

Cyber Work Roles at CISA

There are many cyber roles at CISA, to include cyber situational awareness, analysis, incident response, threat hunting, cybersecurity assessments, vulnerability management, federal network protection, cybersecurity training and exercises, cybersecurity education, outreach and awareness, partnership and engagement, and more. CISA uses the Workforce Framework for Cybersecurity (NICE Framework) to define duties and responsibilities of our cyber workforce.

There’s a mission area for just about any cyber professional!

Explore Them Here

Tuesday, July 26

Read and watch about cybersecurity and new defenses being created.

This Simplilearn video on Cyber Security In 7 Minutes will explain what is cyber security how it works, why cyber security, who is a cyber security expert, and what are the different types of cyberattacks with examples. Now, let’s begin this cyber security video!

Watch Video Here

Building A Defense Against An Invisible Threat: A New Approach To Building Cyber Security

“The reasonable man adapts himself to the world; the unreasonable one persists in trying to adapt the world to himself. Therefore, all progress depends on the unreasonable man.”
– George Bernard Shaw

One man has made it his mission to build a global defense to this invisible threat on critical infrastructure and national security. Following his most recent service as Assistant Secretary of Defense for Energy, Installations and Environment, Lucian Niemeyer took the helm of Building Cyber Security, a non-profit on a mission to build a holistic, multi-faceted defense against the invisible threat of cyber-attacks on our critical infrastructure.

Read More Here

Monday, July 25

Read about the scramble for cybersecurity employees and some personal career advice.
Rising threats spark US scramble for cyber workers

The federal government and private sector are facing increasing pressure to fill key cyber roles as high-profile attacks and international threats rattle various U.S. sectors.

Workforce shortages have been a long-running issue in cyber, but they have taken on renewed importance amid rising Russian threats stemming from the war in Ukraine.

“It’s an issue that the government faces as well as the private sector, state and local communities,” Iranga Kahangama, a cyber official at the Department of Homeland Security (DHS), said at a House hearing this week.

The focus on labor shortages comes as the U.S. has been on high alert recently, with intelligence officials warning about possible Russian cyberattacks targeting key government institutions, elections and critical infrastructure, including the energy and finance sectors.

Read More Here

IPC Career Advice

As students, we all should know how important networking skills are. What do you recommend for mastering networking and how to get your name out there?

“It’s a matter of being willing to craft, tell, and refine your story. Creating your story first requires a belief that people want to hear you; but understanding that not everyone will.

In trying to network and find growth opportunities (e.g. a job), your story should reflect your relevant passion(s) and what your career objectives are.

Creating affinity and a connection with your audience also requires risk taking and exposing aspects of your background so people learn something about you besides you’re here to get a job.”
-Director Edward Vasko

Friday, July 22

Read about cyber news and IPC events!
Cyber-attacks on Port of Los Angeles have doubled since pandemic

Cyber-attacks on one of the world’s busiest ports have nearly doubled since the start of the Covid pandemic. The number of monthly attacks targeting the Port of Los Angeles is now around 40 million, the port’s executive director Gene Seroka told the BBC. Los Angeles is the busiest port in the western hemisphere, handling more than $250bn of cargo every year. The threats are believed to come mainly from Europe and Russia, and aim to disrupt the US economy.

Read More Here

Upcoming Events

Cyber Summer Camp
-Just Ended, Thanks to all who participated!-
For High School Students
July 18-22, 9am-3pm

See Details Here

Thursday, July 21

Read about an extension and analysis of yesterday’s articles.
The US Govt and Corps Look to Fill 700K Cybersecurity Jobs

Want a sure-fire tech job? Easy. Get the skills you need to help patch up our holey tech security blanket. From chief information security officer (CISO) positions to entry-level security jobs requiring only a CompTIA Security+ and a pulse, the jobs are out there. In fact, according to the White House, there are 700,000 cybersecurity positions open today. That’s not a typo. That’s 700 thousand jobs open.

Read More Here

Three takeaways from the Justice Department’s cyber review

Last year, Deputy Attorney General Lisa Monaco announced a wide-ranging, 120-day review of how the Justice Department addresses threats in cyberspace. More than a year later, a report on the review is out — and it offers praise, warnings and a sometimes dire picture of cybersecurity within the department. Here are a few key takeaways:
-Justice Department seizes $500,000 from North Korean ransomware gang
-Federal agencies launch cyber apprenticeship sprint

Read More Here

Wednesday, July 20

Read about the attempts to recognize and better our nations security.
Biden administration pushes to close the growing cybersecurity workforce gap

The Biden administration is pushing to fill hundreds of thousands of cybersecurity jobs in the United States as part of a bid to close a talent shortage US officials describe as both a national security challenge and an economic opportunity.

On Tuesday, the administration announced a multi-agency plan to create hundreds of registered apprenticeship programs with the private sector to flesh out the nation’s cybersecurity workforce.

Read More Here

Deputy Attorney General Lisa O. Monaco Delivers Keynote Address at International Conference on Cyber Security (ICCS) 2022

Lisa O. Monaco recently returned to the position of Deputy Attorney General and delivered a keynote speech at ICCS.

“For those of you in the private sector, we need your reporting. For those students and young professionals out there, we need your talents. And for the many U.S. and foreign government personnel in the audience and elsewhere, we need your continued excellent work and partnership and commitment to the cause (Monaco, 2022).”

Read More Here

Tuesday, July 19

Read about two methods used to keep your company safe and secure.
Securing your organization by recruiting, hiring, and retaining cybersecurity talent to reduce cyberrisk

To meet the security requirements to face evolving threats and changing technology, organizations must adapt and shift how they previously managed cybersecurity. While technical controls and capabilities still remain a priority and a commonly accepted method of securing the environment, adapting to a new approach for hiring cybersecurity talent can solve a leading concern of many leaders in a cost-optimized and risk-effective manner.

Read More Here

Journey to the NIST Cybersecurity Framework (CSF) 2.0 | Workshop #1

NIST has begun the process to update the NIST Cybersecurity Framework to keep pace with the evolving cybersecurity landscape. The CSF was originally developed during a year-long, collaborative process where NIST served as a convener for industry, academia, and government stakeholders.
Join us for this virtual, collaborative workshop with expert panelists and leaders from NIST.

Read More/Register to Attend Here

Monday, July 18

Read about how cyber criminals are updating their tactics, and how you can be more aware in order to keep yourself safe.
Why Cybersecurity Frameworks Alone Won’t Stop The Next Major Breach

With threats increasing at an unprecedented rate, organizations cannot rely on reactive strategies to defend against the evolving security landscape. NIST and MITRE ATT&CK provide organizations with an easy-to-understand framework for managing and reducing cyber risk to protect networks and data. However, organizations must now advance beyond cybersecurity frameworks to accurately identify, quantify and address critical risks.

Read More Here

The Nigerian Prince has evolved: email scams now even fool cybersecurity experts

We all like to think we’re immune to scams. We scoff at emails from an unknown sender offering us £2 million, in exchange for our bank details. But the game has changed and con artists have developed new, chilling tactics. They are taking the personal approach and scouring the internet for all the details they can find about us.

Scammers are getting so good at it that even cybersecurity experts are taken in.

Read More Here

Friday, July 15

Read about whats being called the “Cyber World War” and see upcoming IPC events.
The Man at the Center of the New Cyber World War

Yurii Shchyhol’s job is to protect Ukraine against ongoing Russia cyberattacks. But the war he’s fighting is global, he says — and he has some advice for the rest of us.

Read More Here

Upcoming Events

Cyber Summer Camp
For High School Students
July 18-22, 9am-3pm

See Details Here

Thursday, July 14

Read about the workforce of cybersecurity and how to get into it.
How to land a cybersecurity job with the federal government

“Cybersecurity is national security, and we need the best talent, and we need to cultivate that talent in order to make sure that our nation has the best and brightest ready to work in this particular area,” says Dave Luber, deputy director of cybersecurity for the National Security Agency, noting that different federal agencies and military branches must coordinate their efforts to be effective against cyber risks. “It really is a team sport where we’re all working together to make sure that we make it difficult for China and Russia to exploit our critical systems in the U.S. and our allied systems.”

Read More Here

How to become a cybersecurity specialist

Though cybersecurity is a relatively new field, it is rising in popularity and demand. In fact, cybersecurity is among the top 20 fastest-growing occupations, with more than half a million openings in the U.S.

If you’re contemplating a career in cybersecurity, here’s a step-by-step guide to become a specialist:
Get training
Find opportunities for hands-on experience
Pursue a certification
Determine your specialty
Demonstrate you’re a critical thinker

Read More Here

Wednesday, July 13

Read about current uses of phishing and why attacks happen.
Hackers impersonate cybersecurity firms in callback phishing attacks

Hackers are impersonating well-known cybersecurity companies, such as CrowdStrike, in callback phishing emails to gain initial access to corporate networks.

Most phishing campaigns embed links to landing pages that steal login credentials or emails that include malicious attachments to install malware.

However, over the past year, threat actors have increasingly used “callback” phishing campaigns that impersonate well-known companies requesting you call a number to resolve a problem, cancel a subscription renewal, or discuss another issue.

Read More Here

Why Do Hacks Happen? Four Ubiquitous Motivations Behind Cybersecurity Attacks

Cybersecurity attacks occur all around the world every single day. Whether it’s customer data being stolen, ransomware being deployed or cryptojacking, cybercrime is on the rise.

However, if one ponders the nature of these attacks, there seems to be an uneven phenomenon occurring. On the one hand, there may be a newsworthy story of one lone actor crypto mining illegally, and in the same breath, we’ll hear about entire ecosystems being attacked. From tiny fish to great big whales, why is the nature of cyber attacks so diverse?

Read More Here

Tuesday, July 12

Read about cybersecurity advancements in the government.
President Biden Signs Two Bills Aimed at Enhancing Government Cybersecurity

On June 21, 2022, President Biden signed into law, the State and Local Government Cybersecurity Act of 2021 (S. 2520) (the “Cybersecurity Act”) and the Federal Rotational Cyber Workforce Program Act (S. 1097) (the “Cyber Workforce Program Act”), two bipartisan bills aimed at enhancing the cybersecurity postures of the federal, state and local governments.

Read More Here

House appropriators back more than $15 billion for cybersecurity

House appropriators in June finished marking up a dozen spending bills for fiscal 2023 that would altogether provide at least $15.6 billion for cybersecurity efforts across federal departments and agencies.

The largest chunk of cybersecurity spending, $11.2 billion, would go to the Defense Department, followed by $2.9 billion for the Cybersecurity and Infrastructure Security Agency, or CISA.

Read More Here

Monday, July 11

Read about the skills needed to ‘break’ in as well as what graduates are getting accomplished in Cybersecurity.
How to break into cybersecurity, as told by Accenture’s head of cyber

Among the most in-demand industries is cybersecurity. Major companies, including those in the Fortune 500 are in desperate need of the talent, as previously reported by Fortune, but are running out of options of where to turn. One challenge? Cybersecurity requires a wide range of skills to be successful—and not all of them can be taught in a classroom setting.

Read More Here

Graduates with a master’s degree in cybersecurity are reporting average salaries of $214,000

When it comes to job demand, it’s hard to beat the field of cybersecurity. By 2025 there will be an estimated 3.5 million unfilled cybersecurity jobs across the globe, according to Cybersecurity Ventures, a researcher and publisher that covers the international cyber economy. And that follows a 350% growth in the number of open cybersecurity jobs between 2013 and 2021.

Read More Here

Friday, July 8

Read about Cybersecurity acronyms and what events the IPC has coming up.
What Do All of Those Cloud Cybersecurity Acronyms Mean?

Acronyms serve as a gatekeeper — if you don’t sling the lingo, you don’t belong. So here’s a quick guide to the letter salad of cloud cybersecurity.

Read More Here

Upcoming Events

NSA Gencyber Teacher Camp 2022
2 separate summer sessions mid July
For General Education Teachers

Cyber Summer Camp
For High School Students
July 18-22, 9am-3pm

See Details Here

Thursday, July 7

Read about the dangers companies face from other countries, and how your information could be at risk.
China’s Cabinet Urges Greater Cybersecurity After Data Leak

China’s cabinet stressed the need to bolster information security, following a huge leak of personal data that could be the largest cyber-attack in the country’s history.

Read More Here

North Korean Maui Ransomware Actively Targeting U.S. Healthcare Organizations

In a new joint cybersecurity advisory, U.S. cybersecurity and intelligence agencies have warned about the use of Maui ransomware by North Korean government-backed hackers to target the healthcare sector since at least May 2021.

Read More Here

Wednesday, July 6

Read about the lack of trust between companies and customers as well as the impact of shadow compliance.
Shadow Compliance: The Cybersecurity Trend Nobody Is Talking About

Are your closest customers probing your network for security weaknesses? To most CISOs, this question might sound crazy. Network scans are what the bad guys do, surely not your friends and business partners.

Read More Here

A cybersecurity expert explains why it’s time to get serious about Zero Trust

Zero Trust is a strategic approach to cybersecurity that secures an organization by eliminating implicit trust and continuously validating every stage of a digital interaction.

Read More Here

Tuesday, July 5

Read about the future of cybersecurity from the increasing skill gap to emerging threats.
Bad news: The cybersecurity skills crisis is about to get even worse

New research suggests nearly a third of cybersecurity professionals are planning to quit the industry, at a time when companies are struggling to protect their networks from attacks.

Read More Here

These are the cybersecurity threats of tomorrow that you should be thinking about today

The rise of quantum computing, deepfakes, the Internet of Things and more are among the things that could create very real challenges for cybersecurity going forward.

Read More Here

Friday, July 4

Read about keeping yourself safe with a holiday twist, and a list of up and coming events.
Fireworks In The Sky, Not In Your Network

“Hackers love the times throughout the year when most people are taking it easy and stepping away from monitoring the “behind the scenes” of their business. We know you’ll likely be indulging in all kinds of July 4th activities such as parades; BBQs; and red, white, and blue colored treats. However, while you’re doing this… who’s watching your network?” (Guidi, 2019)

Read More Here

Upcoming Events

NSA Gencyber Teacher Camp 2022
2 separate summer sessions mid July
For General Education Teachers

Cyber Summer Camp
For High School Students
July 18-22, 9am-3pm

See Details Here

Thursday, June 30

Read about how to get into cybersecurity jobs and common certifications.
How to Get Into Cyber Security

There are many ways to get into cybersecurity, including many options that don’t require college education. Although IT or Technical skills are going to be highly recommended, there are plenty of certifications you can get to be on your way to be a Cybersecurity Professional.

Read More Here

10 Popular Cybersecurity Certifications [2022 Updated]

Here you can find detailed lists on the different certifications that you can obtain, as well as a hearty amount of information to go along with it, like expected job wage, years of experience, certification length and cost, and more. CompTIA Security+ is one of the first certifications outside of schooling that professionals recommend.

Read More Here

Wednesday, June 29

Read about different ways your security can be breached with Social Engineering and Physical Security.
Threat actors ramp up their social engineering attacks

We all know to not click on suspicious links in our inbox, but what about a request from a know coworker? It seems safe but you could be the next victim of Social Engineering. As people become more aware, hackers game steps up as they use current themes, existing conversations, and leverage technology to impersonate someone you know or gain your trust.

Read More Here

checkbox listImproving the Cybersecurity of Physical Security

Do you keep your passwords written down, have a particularly old printer, or even cheap personal security cameras? These are all things that can compromise you. Cybersecurity is on more than the digital front as malicious actors can utilize a number of physical tools to look into your personal spaces and access your private information.

Read More Here

Tuesday, June 28

Read about the progression of hacking and see how well your clients can trust your security.
Can Your Clients Trust You With Their Data? Six Cybersecurity Best Practices

If you were your own customer, would you be happy with the level of data protection you were given? Read here about the standards and expectations for companies as well as six practices you should be doing to secure your company and gain client trust.

Read More Here

Hacking gets dangerously real: 8 cybersecurity predictions to watch out for

“Most security and risk leaders now recognize that major disruption is only one crisis away. We can’t control it, but we can evolve our thinking, our philosophy, our program and our architecture.” said Gartner senior director, Richard Addiscott. To help direct people, he made a list of 8 things you need to be prepared for.

Read More Here

Monday, June 27

Read about the gamification of hacking and the best simulators you can find.
Gamification of Ethical Hacking and Hacking Esports

Hacking simulations aren’t a new thing, especially under corporate scopes as management looks to train and prepare their employees for the types of threats out there, how they work, and how to keep themselves and their company safe. More applications are being seen released to the public as Cybersecurity is gaining traction in its impact on our lives and people need to have tools to be prepared as well.

Read More Here

11 Best Hacking Simulator Games for Buddying Hackers

Games are being made to simulate hacking and the world of malicious actors. If you are new to the topic or are deep in the world of cybersecurity, you should definitely look into the different types of games you can download and learn from now. In this article you can get a start with the 11 different games they have listed, with plenty more out there you can discover.

Read More Here

Friday, June 24

Read more about Data Security as well as the IPCs upcoming events.
What is data security?

Data security is the practice of protecting digital information from unauthorized access, corruption, or theft throughout its entire lifecycle. It involves deploying tools and technologies that enhance the organizations visibility into where its critical data resides and how it is used.

Read More Here

Upcoming Events

Cyber Informed Engineering Training
Seven Week Course, Starts June 24th, 9am-10am
For Idaho Educators, Professional Development, or Credit Seekers

NSA Gencyber Teacher Camp 2022
2 separate summer sessions mid July
For General Education Teachers

Cyber Summer Camp
For High School Students
July 18-22, 9am-3pm

See Details Here

Thursday, June 23

Read about what data security is and types of threats you could encounter.
Data Security

There are many reasons why data security is important to organizations in all industries,
all over the world. For example, organizations are legally obliged to protect customer and user data, and a data breach can result in serious financial losses.

Read More Here

7 Types of Cyber Security Threats

In recent years, numerous high-profile cyber-attacks have exposed sensitive data,
including birth dates, addresses, and Social Security numbers. The attacks were enabled by failure to implement, test and retest technical safeguards.

Read More Here

Thursday, June 23

Read about 10 types of data security threats from 2 different sources.
Top 10 types of information security threats for IT teams

A security threat is a malicious act that aims to corrupt or steal data, while a security
event is an occurrence that exposes company data or its network.

Read More Here

10 threats to your data and how to thwart them

If the late-2014 hacker attack on Sony Pictures taught us anything, it was that no
business can afford the bad publicity, PR and privacy loss that hackers leave in their wake.

Read More Here

Wednesday, June 22

Read about cyber trends and future insights.
Cybersecurity trends: Looking over the horizon

Companies are layering more systems into their IT networks to support remote work, enhance the customer experience, and generate value, all of which creates potential new vulnerabilities. For more information you can find it in the article.

Read More Here

What You Need To Know About The Future Of Cybersecurity

Organizations face daily challenges in keeping up with new risks and vulnerabilities. RSA and SecureWorks CTOs recently weighed in on the top consideration’s organizations should be looking at when it comes to security and digital transformation. For more information you can find it in the article.

Read More Here

Wednesday, June 22

Read about current and common threats to users.
7 Network Security Threats to Your Organization Today

Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. The hacker usually tricks the victim into clicking on a malicious email link or infects a website or online ad with code that auto-executes once loaded. Read more about this threat and 6 others in the article.

Read More Here

Common Data Threats and Vulnerabilities

A threat to data security can be any potential danger to your information or systems. Use this checklist to understand common data threats and understand how they may affect you or your business. For more information you can find it in the article.

Read More Here

Tuesday, June 21

Read about artificial Intelligence and how it effects cyber.
Artificial Intelligence: The Future Of Cybersecurity?

The Cybersecurity and Infrastructure Agency has warned that IT/OT convergence could spell disaster for industries, as cybercriminals will have the opportunity to hijack high-value targets. For more information you can find it in the article.

Read More Here

Cyber AI: Real defense

This article talks about the development of artificial intelligence for use in cybersecurity defense. Due to remote workers, 3rd party contracts, 5G networks and more, we are left open to the ever adapting attacks from malicious actors. AI is suggested as the new leading aid due to its quick solutions and adaptability.

Read More Here

Tuesday, June 21

Read about the future of cybersecurity and the threats it holds.
The Future of Cybersecurity in 2021 and Beyond

According to Cybersecurity Ventures, financial damages from cyber-crime will reach $6 trillion by the end of this year. Cyber-attacks are among the fastest-growing crimes in the United States.

Read More Here

What Are The Biggest Cyber Threats of The Future?

Cyber threats affect most industries, but hospitals, critical infrastructure, transportation, and education are some of the most frequently targeted industries. Healthcare records are low-risk, high-reward targets for cybercriminals, and there is little chance of those responsible being caught.

Read More Here

Monday, June 20

Read about cyber risk to businesses, with a focus on future insights.
Estimating the Long-Term Costs of Data-Breaches to Brands and Businesses Today

In a data-rich society, Up to $223b of the World’s Top 100 Brands’ Value could be at risk from a Data Breach, finds Infosys-Interbrand Study, cybersecurity has become a critical aspect of businesses, influencing customer engagement and affinity with brands.

Read More Here

The Future of Cybersecurity: What Will it Look Like in 2031?

According to Grimes, the 10 root causes of all hacking and malware exploitation will
still be the same in 10 years, so the password we know, and love (or hate) will be around for at least another 10 years. For more information you can find it in the article.

Read More Here

Friday, June 17

Read about the impacts of continually increasing cyber threats and an update on up-and-coming events
Out-of-Control Cybercrime Will Cause More Real-World Harm

In this article they break down how cybercrime will continue to grow more harmful as we continue to improve technology in our society. Cyber criminals will increase their attacks in ways that cause far more hurtful and visible consequences, such as disrupting the Colonial Pipeline in the United States, leaving petrol stations empty, and shutting down schools and hospitals.

Read More Here

Upcoming Events

Cyber Informed Engineering Training
Seven Week Course, Starts June 24th, 9am-10am
For Idaho Educators, Professional Development, or Credit Seekers

NSA Gencyber Teacher Camp 2022
2 separate summer sessions mid July
For General Education Teachers

Cyber Summer Camp
For High School Students
July 18-22, 9am-3pm

See Details Here

Thursday, June 16

Learn more about what Cybersecurity is
What Is Cybersecurity?

In this article you will learn about Cybersecurity is a part of IT security, along with physical security and information security. Its goal is to protect electronic assets used to store and transmit information, from hackers who have malicious intent to steal proprietary data and information via data breaches.

Read More Here

What is Cyber Security?

In this article you will find more information about the many fields that cybersecurity offers. In addition, they will give you more information to help you decide if you want to pursue cyber.

Read More Here

Thursday, June 16

Read more about what Cybersecurity is along with the impact of Cybercrime
What is Cyber Security? Definition, Best Practices & Examples

Cyber security is important because sensitive information is transmitted across networks and devices in the course of doing business, and as the volume and sophistication of cyber-attacks grow, so do the steps companies and organizations take to protect their sensitive business and personnel information.

Read More Here

Cybercrime To Cost The World $10.5 Trillion Annually By 2025

In this article you will learn about how much cyber crime can cost a company. Cybercrime is predicted to inflict $6 trillion USD in damages globally in 2021, and will reach $10.5 trillion USD annually by 2025, an exponentially larger amount than the damage inflicted by natural disasters in a year.

Read More Here

Wednesday, June 15

Read and learn more about what Cybersecurity is
What is Cyber Security?

Cyber Security refers to the technologies, processes and practices designed to protect
networks, devices, app and data from cyber-attacks.

Read More Here

What is cybersecurity?

Cybersecurity is the protection of internet-connected systems from cyber threats. A
strong cybersecurity strategy can prevent malicious attacks that aim to disable or disrupt a systems or devices operations.

Read More Here

Wednesday, June 15

Read about what cyber attacks are and the most common types
What Is a Cyber Attack?

Cyber-criminals are people who launch cyber attacks. They try to identify vulnerabilities in computer systems and exploit them.

Read More Here

7 Types of Cyber Security Threats

Cyber security professionals defend computer systems against different types of cyber threats. One motive for cyber-attacks is money, and individuals are vulnerable to cyber-attacks because they store personal information on their mobile phones and use insecure public networks.

Read More Here

Tuesday, June 14

Read about why cybersecurity is important and who should be responsible
Why is Cybersecurity Important?

In this article they speak on the importance of cybersecurity and how it is on the rise. As society is more technologically reliant than ever before we need to understand the difference between cybersecurity and information security, even though the skill-sets are becoming more similar.

Read More Here

Who should be responsible for protecting our personal data?

In this article they explain what is lacking in the cybersecurity world on the professional level and on the day-to-day level. Governments and businesses lack the resources and speed required to react to cyber-crime and consumers lack the knowledge and motivation to tackle it.

Read More Here

Tuesday, June 14

Read about the criticality of security and best practices
Computer clusterCybersecurity Is Critical for all Organizations – Large and Small

In todays computerized world, new risks emerge every hour of every day. 38% of small businesses have spent nothing to protect themselves from cybersecurity threats even though the most frequent types of cyber-crime are sending fraudulent e-mails and impersonating those organizations online.

Read More Here

15 Cybersecurity Best Practices to Prevent Cyber Attacks in 2022

Cyber criminals are constantly finding new ways to reach sensitive data, and insiders
are now among the top insider actors. In this article you will find the top 15 ways to prevent those attacks and learn about what is out there trying to take your information.

Read More Here

Monday, June 13

Read about personal mobile threats and common user mistakes
Four mobile cybersecurity threats to watch in 2022

In this article they discuss the importance of having protection on your mobile devices
because mobiles have essentially become an extension of our arms. Fraud will continue to grow exponentially as more apps with commerce capabilities are introduced, and businesses are behind the ball when it comes to securing their and your assets.

Read More Here

Everyday cybersecurity practices inadequate among many online consumers

Many people still use simple passwords to lock their mobile phones and do not use
antivirus or private browsers. Mobile phone scams are the most common threat, followed by phishing, data breaches, social network impersonation, financial fraud and ransomware. You can read about the statistics collected on many different common security risk behaviors.

Read More Here

Monday, June 13

Read about ways to protect yourself and security products you can utilize.
Cybersecurity 101: Protect your privacy from hackers, spies, and the government

As surveillance has become a common factor of our daily lives, privacy is in danger of no longer being considered an intrinsic right. We must all take steps to safeguard our personal privacy. Here you can find about the common weak spots and ways to protect them.

Read More Here

HUMAN | Bot Mitigation Solution

In this link you will find key facts to help everyday users protect their devices from
fraud an automated cyber attacks, this is intended for those everyday users that make a living off their phones. By creating BotGuard, HUMAN can provide authentication measures to a variety of different products you may have.

Read More Here

Friday, June 10

Read more about the difference between Cybersecurity and Computer Science, as well as a quick check in on our up-and-coming events.
Difference Between Cyber Security and Computer Science

In this article they explain the relationship between cybersecurity and computer science. Computers and computer networks have become an integral part of our society, and the study of computers has become a new science. Cyber security is one of the principal areas of study within Computer Science.

Read More Here

Upcoming Events

Cybersecurity Workshop
June 9th and 10th, 9am-5pm
For High School Teachers

Cyber Informed Engineering Training
Seven Week Course, Starts June 24th, 9am-10am
For Idaho Educators, Professional Development, or Credit Seekers

NSA Gencyber Teacher Camp 2022
2 separate summer sessions mid July
For General Education Teachers

Cyber Summer Camp
For High School Students
July 18-22, 9am-3pm

See Details Here

Thursday, June 9

Read about being more aware of threats to your company and how to be more secure
We Need to Stop Overlooking Cyber-threats to Operational Technology

In this article they discuss the continual improvement of today’s technical savvy industry. For example, as smart buildings become more connected, they are becoming harder to protect from cyber threats. It is important to understand the cybersecurity risks surrounding a buildings OT systems. In fact, in the article they state that only 44% of companies are ready for cyber-attacks.

Read More Here

Why Cybersecurity Matters

In this article they discuss the importance of cybersecurity and how companies must develop customized cybersecurity protocols to protect their networks, hardware, software, and mobile devices from cyber-attacks. Learn about how to prepare for cyber attacks that will come.

Read More Here

Thursday, June 9

Read about professional cybersecurity and what path might be right for you
What does a Cybersecurity professional do?

In this article they discuss what a Cybersecurity professional is and what are the different fields of them. Also describes the different types of help they provide companies with. They provide advice on security issues, advise on best security practices for a company to help them avoid cyber-attacks, and test a network by conducting controlled cyber-attacks.

Read More Here

Difference Between Cyber Security and Computer Science

In this article you will learn that there are pros and cons to both Computer Science and Cybersecurity. Are you more interested in computers and computing or security and protecting? Read about the differences between the two and gather more information towards deciding what’s best for you.

Read More Here

Wednesday, June 8

Read about the most popular cybersecurity jobs out there and what paths students can take.
Top 6 Cyber Security Jobs in 2022: Career & Salary

To protect computer networks and information, companies need skilled professionals. This article will help you start a career in cyber security. Here you will learn about top paying cybersecurity jobs and what Simplilearn has to offer with their learning module (and videos).

Read More Here

4 Types of Cyber Security Careers to Look into After Graduation

In this article you learn that Cyber security jobs touch every department of the business and require multi-disciplinary expertise. Also, that Cyber security is one of the fastest growing and most in-demand industries in terms of employment opportunities.

Read More Here

Wednesday, June 8

Read about the benefits of a cybersecurity career and list of alarming facts
What Makes Cybersecurity a Rewarding Career?

Here UTICA University tries to convey the importance of Cyber security professionals and how they are driven by love for the technology and the interesting, challenging, and meaningful work that a cyber security careers provides. Professionals may safeguard top secret government information to ward off online attacks that could compromise our national safety.

Read More Here

woman sits at computer with scull and crossbones on monitor
15 Alarming Cyber Security Facts and Stats

In this article they speak on the still developing field of Cyber security is rapidly growing, but the industry still has a long way to go. Also, they discuss the amount the amount of damage in revenue a cyber-attack can cause. Here you can discover cybersecurity facts that you may not have realized before.

Read More Here

Tuesday, June 7

Read about the current workforce of Cybersecurity, the jobs in high demand and workforce shortages.
The Cybersecurity 202: The government’s facing a severe shortage of cyber workers when it needs them the most

The fact is that the government is struggling to hire cybersecurity workers, with nearly 465,000 unfilled jobs across the nation, which is making it harder to protect government data and improve cybersecurity in vital industries. It has reached a level that is being considered a national security threat to some if the situation doesn’t change.

Read More Here

The Importance of Cybersecurity in Business

We need more cyber professionals to defend attacks so large levels of consumer data stays safe. Every year, cyber-attacks around the world double, and Canadian companies are not immune. Large companies such as Maersk, Uber, and Equifax (regarded as one of the largest holders of private customer data in the world), are a some of the attackers prime targets. The larger the business, the more susceptible it is to an attack.

Read More Here

Tuesday, June 7

Read about the future of Cybersecurity and the predicted circumstances of the workforce.
What is the future of cyber security?

In 2021, the most apparent cyber security challenge will revolve around remote work.
Companies encouraged remote work due to pandemic concerns, but now they need to assume that corporate resources and unsecured devices are sharing the same space.

With many new types of threats emerging throughout time the situation continues to grow more dire. Especially as technology becomes more ‘smart’ leaving increasing ways for hackers to access not only business but home networks. The biggest key to our cyber survival is prevention and awareness.

Read More Here

The Future of Cybersecurity Jobs

What are the different paths and opportunities you have within
cybersecurity? Cybersecurity jobs are in high demand, and the need for these professionals is expected to continue in the foreseeable future. Common cybersecurity positions include Cybersecurity Engineer, Specialist, Analyst, or Architect. Security Analyst, Security Engineer or Architect, Security/IT Director or Manager, CISO/CSO, Systems Administrator, Network Architect or Engineer, Forensics Investigator, Auditor, Systems Engineer or Integrator, among many other titles. Read this article to get help finding jobs, resume assistance, and career advice on their website.

Read More Here

Monday, June 6

Read about tips and tools for your company  below.
We Need to Stop Overlooking Cyberthreats to Operational Technology

This article provides an assortment of quality information for your business, especially if you struggle with the appropriate level of coverage for your company in cybersecurity. Here you can read about the importance of cybersecurity in this day and age as we continue to grow into this more technology involved world.

Read More Here

SEI Sphere: The Future of Cyber Protection

“The best threat intelligence available is an awareness of what is happening on your infrastructure, right now.” This article is on what in your network you should be monitoring and what you need to understand in order to have more awareness of your cyber-network using Network Security, Endpoint Protection, Email Protection, and SIEM.

Read More Here

Monday, June 6

Read about tips and tools for anyone (Personal, home, business) below.
Consumer Assistance Topics

This article is an informative piece for everyday people, providing tips on how to avoid scams or cyber-attacks from people stealing your passwords and information. Find out how to have more secure accounts and being more cybersecurity conscious.

Read More Here

Why is Cybersecurity Important in 2022? Everything You Need to Know

This article discusses what needs to be done in today’s world. We live in a digital world, which makes us vulnerable to malicious attacks, invasions of privacy, fraud, and other unpleasantness. Cybersecurity keeps us safe from hackers, cyber criminals, and other agents of fraud. Here you can find out about cybersecurity, different forms of cyber threats, what good security looks like, and cyber careers/training.

Read More Here