Author
Lysa Myers
Lysa-Meyers-222x179
Lysa Myers
Security Researcher
Go to latest posts

Education? 15 years in the trenches – helping users, analyzing malware, talking with people implementing security technology, and testing security software.

Highlights of your career? Seeing the first few droplets before the Melissa virus storm hit, surviving the Worm Wars of 2004, my first presentation at VB in 2006, and having an article published in USA Today in 2013.

Position and history at ESET? Joined ESET: 2013. Current title: Security Researcher

What malware do you hate the most? The ExploreZip family – it overwrote files, thus destroying the data. Plenty of people lost a lot of work as a result of those outbreaks.

Favorite activities? Adventuring and whimsy-seeking.

What is your golden rule for cyberspace? An ounce of prevention is worth a pound of cure.

When did you get your first computer and what kind was it? 1981 Commodore VIC-20. And then I continued using a variety of early-80s technology until roughly 1993 (oof!).

Favorite computer game/activity? Catching up on my RSS Feeds.

How to give your social media security a boost

From login credentials to notifications, tracking and ads, ESET’s Lysa Myers explains how you can give your social media security a boost.

Top tips on how to use Pokémon GO safely

The world is going crazy for Pokémon GO. Here are some top tips from ESET’s Lysa Myers on how to enjoy this latest sensation safely.

Expect the unexpected: The importance of audit logging

ESET’s Lysa Myers discusses audit logging and how it can help you track and identify security violations, performance problems, and flaws in applications.

After authentication comes authorization and access control

In our first post in this series, we talked about authentication. The focus shifts to authorization and access control, says ESET’s Lysa Myers.

Authentication 101

Authentication may sound like a very complicated concept, but it’s quite simple: a way of showing that you are who you say you are, says ESET’s Lysa Myers.

The Four “A”s of Account Management

It’s said that the biggest vulnerabilities in a network environment are its users. If only there was a way to control those unruly users – Oh, but there is!

Encryption 101: What is it? When should I use it?

More than perhaps any other security topic, encryption really seems to perplex a lot of people. So, let’s take a closer look – from basics to best practice.

Birds of a feather code together

Lysa Myers, a security researcher at ESET, looks at the diversity challenges and opportunities in information security – while there is much to be done, there’s a lot to be optimistic about she says.

Are healthcare organizations ready to get serious about security … now?

ESET security researcher Lysa Myers looks at a few of the questions she has been hearing more often about the recent surfeit of insurer breaches.

Virus Bulletin small talk: Diversity in tech

Ahead of next week’s Virus Bulletin conference, ESET’s Lysa Myers offers a teaser of what to expect of her “small talk” with colleague Stephen Cobb.

Women in security – why are there so few?

With the annual Executive Women’s Forum conference in Arizona on the horizon, Lysa Myers looks at the importance of having more women in technology posts.

Make password into a story and more parental hacks

It’s important to ensure your child’s data and devices are secure at school and at home. Check out our to back to school digital security guide.

5 security tips to defeat cybervillains at Comic-Con 2015

The crowds at Comic-Con are a tempting target for cybvervillains, so get prepared with these top tips for keeping your data and devices safe.

A beginner’s guide to starting in InfoSec

Much ink has been spilt about the shortage of people trained in information security – especially the lack of women in the industry. Lysa Myers discusses.

Credit Unions and the Data Security Act of 2015

Credit Unions lost a lot of money due to recent breaches, so financial institutions are eager to see merchants held to higher standards for data security.

What is Cyber Insurance?

What is cyber insurance, and is it worth considering to protect your business?

How goes the switch to Chip & Signature cards in the US?

With the deadline for the switchover now just months away, how are vendors doing? Have they begun the conversion already, or will they likely be scrambling at the last minute?

The future of security in healthcare: Mobile devices

The pressure for businesses to allow their employees to access work resources with their personal mobile devices may be overwhelming. How can healthcare IT and Security staff implement this without giving criminals the keys to the castle?

Premera Breach: Healthcare businesses in the crosshairs

Criminals are targeting medical records because of their value, and as a result, medical breaches are the fastest growing type of breach. What can healthcare businesses do to get themselves out of the crosshairs?

Women in Federal cybersecurity – How did they get their start?

While there may still be only a handful of women in Information Security, they can be found in increasing numbers in important, high-profile positions. In this post we look at how three women in Federal cybersecurity got their start.

How to protect your identity at school

Young people are targeted for data theft at 35 times the rate of adults – they are considered an easy target for both digital and physical theft. You can make going back to school an easier transition by ensuring your data and devices are secure both at school and at home.

Homeland Security warns of new Point of Sale attacks

New malware targeting point of sale (PoS) systems, detected by ESET as Win32/Spy.Agent.OKG is described in a warning and analysis distributed by US-CERT, a reminder to increase security around PoS access.

Don’t let social media undermine the promise of graduation

Graduation is a great time to review your social media profile. Don’t let a wild and crazy social network presence undermine the promise of graduation, your chances for a scholarship, job, internship or other career choices.

eBay breach news: Posted data dump not valid, password reset issues

As the 145 million people affected by the security breach at online giant eBay get used to the idea that their personal information may be “out there” and their passwords need to be changed, we wanted to update yesterday’s coverage of the story.

Ransomware on Android: Keep calm but get protected

There has been a lot of talk in the news lately of a new ransomware for Android. While this does sound dire, and the possibility exists for more problematic threats on Androids in the future, it is not yet time to panic.

How do you know if your child’s ID has been stolen?

When it comes to identity theft, the most successful attack is on the person least likely to be aware of activity being carried out in his or her name. That being the case, it is hard to imagine anyone who better fits the bill than a child.

Myths of the Target Breach

One of the realities of news that happens at Internet-speed is that it may not be wholly accurate. Much of what has come out about the Target breach contains factual errors that may not seem obvious, especially as they are repeated by many news outlets. So let us take a moment to examine some of the more common myths that have been flying around.

Follow us

Copyright © 2016 ESET, All Rights Reserved.