At Cyber Degrees EDU, we are your unbiased, go-to source for comprehensive and independent information about cyber security or computer science as a career path, requirements of different programs, highly rated university programs in the field, as well as scholarships and news. We recommend the best accredited programs in your state that are highly rated for cyber security and/or computer science. We advise you about the types of cyber security and computer science positions that only require an associate degree or minimal coding coursework, as well as positions for those who have a bachelor's or master's degree in the field. We'll help you to afford school by providing scholarship and grant information for computer science and cyber security students With all of the information we provide, you will be able to make a well-informed choice about which program to pursue. Follow Us! Youtube Channel Blogger WordPress Twitter About.me
Don't wanna be here? Send us removal request.
Text
Impact of Coronavirus on Cyber Security and Education
The coronavirus has impacted everyone. Whether you’re in downtown Manhattan or a rural outpost, seemingly far from the problem, it is a global issue. During these times of biological viruses, we are also faced with problems stemming from computer viruses, malware, and other high-tech vectors. Since everyone is more active online than they’d normally be, you should probably be thinking more often about your relationship to cyber security. After all, if you’re working or otherwise interacting with the outside world, the chances are good that you’re doing so via the Internet.
COVID-19 (Coronavirus), Cyber Threats Increase and Moving to Online Learning
What is It?
COVID-19, the disease that stems from SARS-CoV-2, a newly discovered and very contagious coronavirus, is an illness that manifests as a severe respiratory tract infection in the worst of cases. The disease his highly communicable and is now a pandemic, or global epidemic.
Where Did it Come From?
The exact origins of the disease are still unknown. However, scientists do suspect that the disease originated elsewhere in the animal kingdom and then mutated, finding its way into the human population. The first major outbreak of COVID-19 was in Wuhan, China, but it is suspected that the virus could have been circulating well before that event.
How it is Spread?
COVID-19 is spread through interpersonal contact. In particular, it is known to transmit when an infected person is in close quarters with another. The disease spreads on the breath via respiratory droplets and when someone coughs or sneezes. When the drops land in the mouth or nose, infection is likely. It is also possible for droplets to land on surfaces, such as doorknobs or tabletops where they can transmit to another’s hand. When they touch their face, the virus might find a purchase that leads to infection.
Total Cases in the United States
As of April 6 2020, there are over 336,000 total known cases of COVID-19 in the United States; 9,624 deaths have been attributed to the disease. However, since testing is still relatively sparse, there are likely many more cases yet to be discovered and many more milder cases that will never be reported. Sources report that, so far, 4% of the known infected Americans have recovered. Globally, there have been over 1,200,000 known cases with around 21% recovered.
Coronavirus Impact on Business and Cyber Security
Businesses are feeling a tremendous impact due to coronavirus. People are staying home and not driving, which has an immediate impact on the oil markets and local businesses, even if they aren’t closed due to their “non-essential” status. Social/physical distancing means that people are no longer attending concerts, eating in their favorite restaurants, or purchasing party supplies. The economic waves from this pandemic are countless.
Some businesses are able to remain in operation by relying on telecommuting technologies. However, when their methods are ad hoc or reliant on insecure connections, the threat to their cyber security is greatly increased. The teleconferencing application Zoom has already been infiltrated and compromised by bad cyber actors. Though the attacks amount to so much digital vandalism, they do interrupt productivity and may even traumatize some workers.
Some elementary teachers who are attempting to teach youngsters via Zoom have reported their students ditching class for Zoom conferences they create themselves. On the other hand, some yoga studios are able to continue to employ their teachers by using the software. This is a boon to home-bound yoga aficionados.
The opportunities for mischief are multiplying as more people are moving their work to the online medium. However, Zoom is acting fast to address these problems. Where their conferences were previously not protected by passwords, the company has added that layer of security in addition to cryptography and disabling the ability to scan for open meetings, which hackers used to find victims.
Since many workers are now working from home, it’s vital that their home Wi-Fi connections or networks be secured with strong passwords. The best passwords are created using a random string of letters and numbers that includes a symbol, such as a punctuation mark. It is also advised to refrain from using insecure technologies, such as Bluetooth, on one’s work laptop.
Increase in Cyber Threats

The pandemic, and the ensuing push to work from home, are creating more and more opportunities for cyber attackers. Malicious hackers have also chosen to exploit our increased reliance on healthcare systems. Ransomware attacks on hospitals are on the rise and both the Department of Health and Human Services and the World Health Organization have likewise been victims of attempted attacks.
Since more workers are taking laptops home and are using their home connections to access servers at work, there are increased risks to corporate security. Home networks typically have weaker password protections that are easier for hackers to deduce. Some households even leave their networks unprotected for random hackers to find. Further, when workers are using their personal home computers for work, their children might inadvertently download viruses or malware during unsupervised screen time.
Thus, companies need to provide safeguards against such vulnerabilities. Something as simple as installing a secondary hard drive for a worker to use at home can save money and bolster security. It’s also vital to educate workers as to how they can create robust passwords for their home networks and to provide simple steps they can follow, such as using a non-work device to connect to Bluetooth at home as hackers can exploit that technology without any passcodes whatsoever.
To address these issues, federal law enforcement agencies have rallied to protect the public and the world of business. The FBI has been very vocal in its response to attacks on the teleconferencing software Zoom, and the Department of Homeland Security has issued a document to help executives address cyber security issues that may arise due to coronavirus.
The Coronavirus pandemic has seen a spike in cyber security attacks such as:
Ransomware
Phishing
DDoS attacks
Malware Attacks
The Future of Telework
The coronavirus pandemic has resulted in a mass movement of workers to the world of telecommuting. This poses a new set of problems for businesses in terms of workplace efficiency, added costs for equipment, and new cyber security threats. Since the problem arose seemingly overnight, IT departments and cyber security professionals have had to scramble to find workable solutions to the problem.
Inevitably, as the period of social distancing goes on, businesses will discover how to better address telecommuting. While there may be problems in terms of new cyber-attacks, each organization will strive to address these issues, while hackers will shift their strategies.
Once the pandemic is under control and it becomes more feasible for people to return to work, it’s still likely that telework will remain a larger part of the corporate picture. While it has been creeping into the corporate landscape more and more over the years, the coronavirus pandemic has blown the doors wide open. Many workers prefer working from home, but others may decide that they’d rather spend their time in the office, or that a healthy balance is ideal.
Businesses will need to determine how to address certain issues such as hardware. When workers use their personal devices for work, there is an increased risk that those devices may be compromised. Companies have the option of providing proprietary, company-owned laptops or offering a compromise in terms of a secondary hard drive. These drives would be used exclusively for work purposes yet allow the worker to still use the same laptop to access their personal drive that houses their photos, music, and personal documents.
Employees will need to work with employers to create more secure Wi-Fi connections at home. This might be as simple as creating difficult passwords Those connections also need to be fast enough to support technologies such as teleconferencing software.
Originally seen published from Cyber Degrees EDU and to check out the full article, visit Cyber Degrees EDU Coronavirus impact on business.
0 notes
Text
How To Start A Lucrative Career In Cybersecurity

Cybersecurity is an in-demand field. Growing cyber attacks, demand for safe and secure data, and other concerns mean that companies need professionals to keep their information safe.
It’s a financially lucrative one as well: “Cybersecurity professionals report an average salary of $116,000, or approximately $55.77 per hour. That's nearly three times the national median income for full-time wage and salary workers, according to the Bureau of Labor Statistics.” (source)
But many cybersecurity professionals aren’t doing it for the paycheck alone. It’s a role that comes with an incredible amount of responsibility and brings immense value to an organization.
Moreover, there are lots of opportunities in government agencies and defense/aerospace firms for cybersecurity professionals. Also financial services - think industries with classified or private data. However, all kinds of companies are looking for cybersecurity professionals nowadays.
youtube
1. Don’t specialize just in security
The best security professionals have well-rounded experience in tech work. Sean Tierney, head of the cyber intelligence team at Infoblox, says, "The thing that will make you good at security is that you are great at something else first. For example, become a master of the fundamentals of data networks, be an expert at administering multiple operating systems or be proficient at multiple scripting languages (Python, Bash, etc.)."
If you’re coming to cybersecurity from another sector of technical work, Tierney’s colleague Rod Rasmussen, VP of CyberSecurity at Infoblox, has tips for switching over: "If you’re already in IT, then spend time studying up on network security, dealing with endpoint hygiene, or whatever is related to the work you’re already doing. You will find that you will become "the security guru" in your office pretty quick by doing that and from there, the transition becomes a lot easier."
2. Sometimes it’s who you know--so network
This is something that’s true across industries. Tierney says, "Professional networking. Get to know as many people in the industry as you can. Get involved in open source or community projects. Another thing often overlooked in networking is offering to help others more than you ask for help."
In-person networking is ideal: get involved in meetups, attend conferences, ask for tips over coffee with current security professionals of local tech companies. If these things aren’t possible, online networking is a good idea too.
3. Not in tech yet? Start by studying up on IT basics
Rasmussen advises, "If you aren’t in the IT space at all, start with learning IT fundamentals. We’ve seen this as necessary for even folks like FBI or other law enforcement officers who have the investigatory or ‘finding bad guys’ part down really well. That will serve you well in cyber, but regardless of your background, you need those building block fundamentals in IT in order to create an effective new career in cybersecurity."
To gain these skills, check out technical and community colleges near you for night courses. "Most of those, particularly those that provide network management courses, offer good courses in security basics," says Rasmussen. You can also look into online courses through websites like edX that feature top courses from real universities.
Read Full Article Here: How To Start A Lucrative Career In Cybersecurity
1 note
·
View note