MilitarySpot.com

Serving the U.S. Army, Navy, Air Force, Marines, Coast Guard and National Guard

Follow MilitarySpot:
 
  • Home
  • Enlist
    • Join The Army
    • Join The Navy
    • Join The Air Force
    • Join The Marines
    • Join The Coast Guard
    • Join The National Guard
    • ASVAB
    • Army Physical Fitness Test
    • Military Draft
    • Prior Service Army Enlistment
  • Career
    • Join the Military
    • Jobs for Military and Civilians
    • Career Center
    • Prior Service Army Enlistment
    • Criminal Justice
  • Education
    • Online Schools
    • Spouse Education Benefits
    • GI Bill
    • Military Schools
    • Criminal Justice
  • Benefits
    • Army Benefits
    • Navy Benefits
    • Air Force Benefits
    • Marine Corps Benefits
    • National Guard Benefits
    • Coast Guard Benefits
    • Veteran Benefits
    • Basic Pay Rates
    • Allowances
    • Special & Incentive Pay
    • Military Spouse Education Benefits
    • VA Education Benefits
    • GI Bill
  • News
    • Headline News
  • Finance
    • Debt Relief
    • Military Pay Rates
    • Military Personal Loans
    • VA Loans
    • Military Star Card
    • Military MyPay
  • Spouses
    • School Finder
    • Scholarships & Grants
    • PCS, DITY, & Moving
    • Pay Rates
    • MyCAA
    • Education Benefits
  • Community
    • Military Games
    • Military Reunions
    • Classifieds
    • Photo Gallery
    • Buddy Finder
    • MilitarySpot Pinups
    • Military Bases
  • Resources
    • Military Alphabet
    • Military Reunions
    • Military Acronyms
    • Currency Converter
    • Military Tools
    • Ranks
    • Military Time
    • Military Tactics
    • Military Discounts
    • Military Games
    • Military Videos
    • Photo Gallery
    • Infographics
    • How To
  • Travel

Cyber Security – The Digital Front

Cyber Security

January 31, 2017, by David McCauley – The internet is a vast and interconnected world. Cables and computers cross physical boundaries to share information at an increasingly hectic pace. We do business, connect, and share online. The governments of the world rely upon it, and militaries are no exception. Unfortunately, the internet also functions as a secret passageway into even the most secure facilities in the world. Cyber attacks are a serious threat to American citizens, federal and state governments, and infrastructure services. Cyber Security has never been more important.

According to a White House audit, the U.S. Government alone received more than 77,000 cyber attacks in the 2015 fiscal year. This is frightening to imagine because we don’t often hear about these cyber attacks in the news like we do when a corporation is hacked. When a corporation is hacked, it’s regular people who often pay the price. When service members or government organizations are targeted, classified and unclassified information can be leaked – constituting a security breach.

The average American citizen spends more than ten hours per day consuming digital media. More people using the internet means more opportunities for cyber criminals to strike. Seemingly everyone uses the internet in some way – social media, banking online, or even shopping on their phone. Those digital footprints can leave accounts and systems vulnerable to attack. The same holds true for service members, and they must carefully manage their digital footprints.

Millions of U.S. citizens had their information exposed in major data breaches during 2016. Some of the organizations affected include Yahoo, Anthem, Myspace, and the Office of Child Support Enforcement. Many organizations are building up their digital security efforts as a result. Losing sensitive information of this nature is bad for business, and unacceptable for government entities. The U.S. military employs cybersecurity specialists and countermeasures to protect their assets and secured systems.

Many businesses have access to personally identifiable information like names, addresses, phone numbers, credit card info, and sometimes even social security numbers. The theft of this kind of information can be devastating for consumers. Imagine how devastating it could be for national security if sensitive information from the government or military were to become somehow compromised. This is why classified information is so carefully safeguarded and often accessed only via the intranet, typically a service or military specific network that is separated from the traditional internet.

Nearly everything is connected to the internet in some capacity, including the infrastructure of the United States. Communications services, power grids, and many other public systems have gone digital. Certain types of cyber attacks, like those upon the infrastructure, become a matter of homeland security. One challenge that investigators and cyber security experts face is locating and collecting evidence left behind on the internet or in affected systems.

Just like traditional forensics would help solve a crime, digital forensics steps in to gather evidence of these breaches and crimes committed. Digital forensics is the practice that allows investigators to locate and protect evidence of wrongdoing. In domestic matters, it’s not uncommon for the FBI cybersecurity specialists to step in when hacker groups target government and state entities and services.

For regular people who don’t have legions of cyber specialists to protect their information, staying secure can be challenging. The truth is that there are steps you can take to protect your tech and reduce the likelihood of suffering from a malicious cyber attack. Some types of threats are targeted toward a specific individual or entity, but others are more general. It’s not uncommon for individuals to receive an email containing viruses or malware. If the virus were unleashed on your home computer, the damage is fairly localized and might only affect your household. Say that email had been opened instead while at work, it could affect clients as well.

Keeping your work accounts and home accounts separate is important. In fact, many companies specifically prohibit their employees from accessing personal emails or social media from work computers at least partially to prevent this type of incident. The U.S. military often disallows the use of mobile devices in secured locations in part because mobile devices have their own vulnerabilities.

The best deterrent for cyber crime is the safe practice of data handling standards, including the disposal and storage of that information. It is important to follow procedures to operating those systems to ensure that no loopholes or weaknesses can be exploited in the first place.

About the Author: D.M. McCauley is a former U.S. Navy sailor who worked in Intel. After the service, he has dedicated his time to writing and traveling with his significant other.

Comments

Filed Under: Community

  • News
  • Enlist
  • Education
  • Career
  • Finance

DoW Breaks Ground on New Munitions Facility

FEBRARUY 21, 2026 – The Department of War (DoW) announces the February 19 groundbreaking on the Munitions Campus in Bloomfield, Indiana. This public-private partnership is designed to expand domestic munitions and energetics production and strengthen the resilience of the U.S. defense industrial base. The groundbreaking is an important milestone for the Munitions Campus, for which […]

Air National Guard Unveils New Bonus Program

MARCH 11, 2023 – On March 1st, the Air National Guard (ANG) launched a new bonus program to attract and retain personnel in critical specialties. The initiative offers significant financial rewards, with bonuses of up to $90,000 for eligible members, depending on their Air Force Specialty Codes (AFSCs). This strategic move aims to strengthen the […]

Military Students’ Tips to Balance Service and Studies

OCTOBER 10, 2025 – Studying in college while serving in the military can be highly rewarding but also extremely demanding in some respects. Military members, veterans, and their families typically balance demanding duty schedules, deployments, family responsibilities, and school schedules. It requires careful planning, flexibility, and being willing to seek and take advantage of available […]

Transition Assistance Program Cultivates Success

FEBRUARY 4, 2026 — When Drevon Turner met with the Transition Assistance Program team he knew two things – he wanted to stay in the area, and he wanted to pursue a career in law enforcement. “Ever since I was a kid, I knew I was going to join the military, and I knew I […]

Estate Planning for Vets and Service Members

FEBRUARY 2, 2026 – Why a Will is not enough along with VA Burial Benefit Facts You Need To Know, 10 Important Facts About Your VA Burial Benefits. Join us for our next webinar: Estate Planning Made Easy – Did You Know Everyone has an Estate Plan? Unfortunately most people find this out too late! […]

Recent Posts

  • DoW Breaks Ground on New Munitions Facility
  • Navy Expands Shore Housing Capacity
  • Coast Guard Seizes $13.3 Million in Cocaine
  • Navy Honors Top Military Instructors
  • Alaska Guard Rescues Overdue Snowmachiner
MAINMENU




SITESEARCH
Can't find something? Try using our site search to dig through our entire site.



Still having trouble? Try the Advanced Search to refine your searches.
NEWSLETTERSUBSCRIBE
Sign Up To Receive Information, Updates and Special Officers from MilitarySpot.com.



Don't miss an issue! Jump in the Newsletter Archives to catch up on previous issues.
FOLLOWMILITARY SPOT

Follow us on Facebook, Twitter & StumbleUpon and more. Keep up with MilitarySpot.com news & updates. We also have an RSS Feed.

Advertise | About | Contact | Feedback | Unsubscribe | DMCA | Privacy Policy | Terms of Use
 
Copyright 2004-2026 Sun Key Publishing. All Rights Reserved.



 
This is not the official recruiting website of the U.S. Military. The site you are on is run by Sun Key Publishing, a private company, and is not endorsed by or affiliated with the U.S. Military.