Bachelor's in Cyber Security

Women in STEM: A Guide to Bridging the Gender Gap

Historically, women have been systematically excluded from higher education. Although we’ve made great progress in opening education to women in recent decades, there is still a great deal of work to be done. This is especially true in the STEM fields, which see a great imbalance of male to female students compared to other college degree programs. Although the STEM acronym wouldn’t be coined until the 1980s, the United States first began to push STEM-related fields heavily in the late 1950s when the government passed the National Defense Education Act in response to the launch of Sputnik. The Soviet satellite spurred the U.S. to pour billions of dollars into […]

Tomorrow’s Tech: The Future of Cyber Security at a Glance

If you’re online, cyber security has a direct impact on your life. And with rapid innovations taking place across information technology (IT), cyberspace, and the devices we use on a daily basis, it’s more relevant now than ever. Looking to the future of cyber security, increasing automation is connecting our lives and storing vast amounts of our sensitive data in the cloud. As a result, knowledgeable cyber security professionals who can respond to a complex digital ecosystem are in demand. In the last several years, high-profile attacks have exposed weaknesses in the current cyber security landscape, pointing to opportunities for […]

Computer Science Careers

For those interested in technology, attaining a computer science degree may be the key that unlocks a wide range of interesting job opportunities in the field. The Bureau of Labor Statistics (BLS) predicts significant growth in the number of computer science jobs over the next several years. These jobs represent different areas of the computer science industry. As such, students should carefully analyze the various careers and decide which area is of the most interest. Doing so helps ensure they pursue an education path that most closely suits their technical skills and interests. The Importance of Certifications Maryville University’s computer […]

Bachelor’s and Master’s in Cyber Security Information Session

Are you seeking your Bachelor’s or Master’s degree in Cyber Security? This is the perfect information session for those seeking to obtain or finish their Bachelor’s or Master’s degree online, at your convenience. Learn more about admission, tuition, and an overview of available online courses for Cyber Security’s Bachelor’s and Master’s degree program. Transcript Ruth S.:                Good evening everyone. Thank you for joining us today to speak about our online Masters of Science in Cyber Security, and our Bachelors of Science in Cyber Security program. We’re going to be starting in just a little bit. We’re going to give it […]

Solving the Cybersecurity Skills Gap

Cyber criminals pose a risk to organizations large and small, local and across the globe. More and more, these organizations need qualified cybersecurity analysts and specialists with the skills and experience to mitigate this risk. As you take the first step toward helping meet this need by pursuing an online Bachelor of Science in Cybersecurity, read more about what it will take to solve the gap: About Cyber Crime There are several different types of cyber crime. The motives behind them can be anything from money to hactivism or espionage. The most popular types of cyber crime include: Phishing attacks […]

Emerging trends in global cyber crime

Nothing remains static within the world of technology, and cybersecurity is no different. All around the world, developers and engineers at tech companies – or in IT and information security departments of other businesses – continually work on methods to safeguard valuable personal, financial and professional data. Methods such as encryption, multi-step verification and others have been implemented to protect vulnerable systems. The problem, however, is that while they think they draw a bead on cyber criminals by researching past and present crimes and attempt to act preemptively – and sometimes they do so, successfully – the opposite also occurs. […]

Smart home device security is widely overlooked

Modern society, in the U.S. as well as around the world, now relies on technology more than ever before, and there are no clear and present signs that this trend is going to slow down by any significant degree anytime soon, let alone pause in the near future. By extension, it stands to reason that cybersecurity would rise exponentially in importance. To some extent, that’s exactly what has happened during the past several years. Despite the occurrence of quite a few high-profile cyber attacks within the last decade, information security occupies a role of considerable importance to many, even on […]

HIPAA Compliance and the Protection of Cybersecurity

Network security breaches wreak havoc on healthcare organizations. One hole in a hospital’s cybersecurity network can expose sensitive patient data for those with malicious intent to take and use to their advantage. Electronic health records (EHRs) can be encrypted and made useless by hackers who often demand a ransom in exchange for their encryption key. And sensitive data can be sold all over the world. For a healthcare business to remain compliant with the guidelines and requirements set forth by the Health Insurance Portability and Accountability Act (HIPAA), it must safeguard its patients’ and clients’ personal information. An integral policy of the U.S. Department of Health and Human Services (HHS), HIPAA is a federal law that protects sensitive health information […]

Cyber Security in 2017

If you are interested in pursuing your Online Master of Science in Cyber Security, it’s important to understand the trends that could impact both your studies and your career post-graduation. 2017 has already seen a number of media reports of cyberattacks and data breaches, and the commonplace nature of these events is unlikely to change anytime soon. Cybersecurity Vulnerabilities Top vulnerabilities in 2017 include cloud-based systems, social media, and other web and business applications. Organizations from Phoenix Banner Health to Yahoo! and Time Inc. have been impacted by cybercrime in recent years; indeed, no business or organization is immune from […]