In Week 1 of CYB 250: Cyber Defense, we explored one of the biggest cybersecurity risksβhumans. Studies show that 74% of data breaches involve human error, making phishing, social engineering, and insider threats critical challenges in cybersecurity. In my latest update, I break down these risks and the strategies organizations use to defend against them. Watch my full recap video and join the conversation!
Read MoreWeb Excerpt for "7-1 Project Three Submission: Technical Brief"
In this technical brief, Giovanni Hale, a cybersecurity student at SNHU, explores how third-party software vulnerabilities threaten healthcare systems. It outlines the role of threat actors such as cybercriminals and insiders and emphasizes key strategies like network segmentation, patch management, and SIEM and EDR tools to reduce risks. The brief also highlights ethical considerations under HIPAA compliance and vendor agreements. Hale provides actionable insights for improving security posture in healthcare settings through proactive vulnerability management.
Read more on [7-1 Project Three Submission: Technical Brief].
Read MoreThe System Security section of the playbook is practical for daily tasks. It helps security engineers keep systems secure by explaining how parts, connections, and software work together, which is essential for finding and fixing vulnerabilities.
Read More