Lysa Myers

Lysa Myers

Security Researcher


Education? 20 years helping – helping users, analyzing malware, talking with people implementing security technology, and testing security software.

Highlights of your career? Seeing the first few droplets before the Melissa virus storm hit, surviving the Worm Wars of 2004, my first presentation at VB in 2006, and having an article published in USA Today in 2013.

Position and history at ESET? Joined ESET: 2013. Current title: Security Researcher

What malware do you hate the most? The ExploreZip family – it overwrote files, thus destroying the data. Plenty of people lost a lot of work as a result of those outbreaks.

Favorite activities? Adventuring and whimsy-seeking.

What is your golden rule for cyberspace? An ounce of prevention is worth a pound of cure.

When did you get your first computer and what kind was it? 1981 Commodore VIC-20. And then I continued using a variety of early-80s technology until roughly 1993 (oof!).

Favorite computer game/activity? Checking my Twitter feed.


85 articles by Lysa Myers

Internet of Things

Secure your router: How to help prevent the next internet takedown

Secure your router: How to help prevent the next internet takedown

Internet of Things

Secure your router: How to help prevent the next internet takedown

Secure your router, says ESET's Lysa Myers. It can help protect all of your connected devices while they are in your home.

Lysa Myers08 Nov 20164 min. read


Ransomware

Ransomware: Expert advice on how to keep safe and secure

Ransomware: Expert advice on how to keep safe and secure

Ransomware

Ransomware: Expert advice on how to keep safe and secure

ESET's Lysa Myers offers a detailed and comprehensive overview on how to stay safe against ransomware attacks, a threat that is growing in prominence.

Lysa Myers10 Oct 201610 min. read


Ransomware

School ransomware: A threat to be aware of

School ransomware: A threat to be aware of

Ransomware

School ransomware: A threat to be aware of

Ransomware that targets schools is a threat that needs to be understood, explains ESET's Lysa Myers. Top cybersecurity efforts are needed to keep it at bay.

Lysa Myers06 Sep 20168 min. read


How To

How to give your social media security a boost

How to give your social media security a boost

How To

How to give your social media security a boost

From login credentials to notifications, tracking and ads, ESET's Lysa Myers explains how you can give your social media security a boost.

Lysa Myers25 Aug 20163 min. read


Less Technical

Top tips on how to use Pokémon GO safely

Top tips on how to use Pokémon GO safely

Less Technical

Top tips on how to use Pokémon GO safely

The world is going crazy for Pokémon GO. Here are some top tips from ESET's Lysa Myers on how to enjoy this latest sensation safely.

Lysa Myers18 Jul 20162 min. read


Digital Security

Expect the unexpected: The importance of audit logging

Expect the unexpected: The importance of audit logging

Digital Security

Expect the unexpected: The importance of audit logging

ESET's Lysa Myers discusses audit logging and how it can help you track and identify security violations, performance problems, and flaws in applications.

Lysa Myers16 May 20163 min. read


Digital Security

After authentication comes authorization and access control

After authentication comes authorization and access control

Digital Security

After authentication comes authorization and access control

In our first post in this series, we talked about authentication. The focus shifts to authorization and access control, says ESET's Lysa Myers.

Lysa Myers10 May 20164 min. read


Digital Security

Authentication 101

Authentication 101

Digital Security

Authentication 101

Authentication may sound like a very complicated concept, but it’s quite simple: a way of showing that you are who you say you are, says ESET's Lysa Myers.

Lysa Myers03 May 20165 min. read


The Four “A”s of Account Management

The Four “A”s of Account Management

The Four “A”s of Account Management

It's said that the biggest vulnerabilities in a network environment are its users. If only there was a way to control those unruly users – Oh, but there is!

Lysa Myers19 Feb 20163 min. read