What you may be getting wrong about cybersecurity
Attention-grabbing cyberattacks that use fiendish exploits are probably not the kind of threat that should be your main concern – here's what your organization should focus on instead
Education? 20 years helping – helping users, analyzing malware, talking with people implementing security technology, and testing security software.
Highlights of your career? Seeing the first few droplets before the Melissa virus storm hit, surviving the Worm Wars of 2004, my first presentation at VB in 2006, and having an article published in USA Today in 2013.
Position and history at ESET? Joined ESET: 2013. Current title: Security Researcher
What malware do you hate the most? The ExploreZip family – it overwrote files, thus destroying the data. Plenty of people lost a lot of work as a result of those outbreaks.
Favorite activities? Adventuring and whimsy-seeking.
What is your golden rule for cyberspace? An ounce of prevention is worth a pound of cure.
When did you get your first computer and what kind was it? 1981 Commodore VIC-20. And then I continued using a variety of early-80s technology until roughly 1993 (oof!).
Favorite computer game/activity? Checking my Twitter feed.
Attention-grabbing cyberattacks that use fiendish exploits are probably not the kind of threat that should be your main concern – here's what your organization should focus on insteadLysa Myers and Cameron Camp
As education is becoming an increasingly vital tool in companies’ security toolboxes, the question arises: How can they effectively implement security awareness training?Lysa Myers
What technology makers and others can – and should – do to counter the kind of surveillance that starts at homeLysa Myers
Why smaller businesses cannot afford to ignore how they gather, store and protect dataLysa Myers
How can smaller businesses address their cybersecurity risks without the resources of large organizations?Lysa Myers
Every year on March 8, we celebrate International Women's Day to honor the social, economic, cultural and political achievements of women. But we also acknowledge that there is still a long way to go before we’ve truly reached gender parity. This day gives us the opportunity to reflect on how we can achieve that balance. So it’s particularly fitting that the theme of this year’s International Women’s Day is “Balance for Better”Lysa Myers
A strong password is a great start, but there are more ways to make sure that your email is as secure as possibleLysa Myers
In December 2013 news broke that Target suffered a breach that forced consumers and the cybersecurity community to question the security practices of retailersLysa Myers
As the threat of bogus apps continues, what can we do to protect ourselves against these fraudulent practices?Lysa Myers
Defensive steps for Marriott Starwood guests worried their personal information may have been compromised by the massive data breachLysa Myers
Should schools and businesses do more to combat the shortfall of cybersecurity professionals by changing the hiring process for those interested in having a career in the industry?Lysa Myers
Top tips to help you avoid being caught receiving or sending phishing-looking emailsLysa Myers
Diverse background can contribute to your organization's security. Here are some tips to get more diversity in security perspectives.Lysa Myers
If you get sick of shopping sites sending you “I see you stared at this item, here’s some similar stuff” messages, you may be able to modify your subscriptions or notifications to make this stop.Lysa Myers
While it certainly doesn’t hurt to ask for help from local law enforcement, know that even major cities may not have the expertise or the bandwidth to investigate compromised mobile devices. The most important objective is to take steps to make sure you’re safe. Ask for help, but do not wait for others to help you.Lysa Myers
Taking time to think logically and deliberately about your assets can help you determine what needs to be secured. Preparing for the worst can help you see the best course of action to prevent those emergencies in the present.Lysa Myers
Girls Inc. of San Diego County was founded 50 years ago as a local affiliate of the national Girls Inc. The national organization was started as the Girls Club of America more than 150 years ago, to help young women who had migrated from rural communities in search of job opportunities.Lysa Myers
In a world where money is often represented as numbers moving from one place to another, the difference between types of payment cards may seem a bit nebulous.Lysa Myers
Cloud services are very much what you make of them, and you need to apply at least an equivalent level of rigorousness, in terms of risk assessment, as you would with assets that are hosted on your own network.Lysa Myers
In the recent Equifax breach you may have noticed that people in the UK and Canada are also affected but there has been little clarification as to how many.Lysa Myers