Skip to main content
SNHU Students at Commencement

STEM Articles & Stories

A white envelope email icon caught on a yellow fish hook represents types of phishing

Types of Phishing: Tips to Prevent, Spot and Report Scam Emails

Phishing scams impersonate companies to steal user data. SNHU experts highlight three main phishing types: clone phishing, business email compromise and whaling. The best defense against phishing is unique passwords, email vigilance and user awareness. Report suspicious emails to protect others.
A cybersecurity analyst working at her desk with a laptop and two monitors with cyber code in front of her.

What Does a Cybersecurity Analyst Do?

The role and responsibilities of a cybersecurity analyst vary by team and organization. But whether you’re working on a security operations center team — or perhaps with incident response or insider threats, the mission is the same: Protect an organization from cyberthreats.
People wandering on an abstract illustration of a digital landscape with glowing blue lines and vertical light beams.

How to Start in Cybersecurity With No Experience

At one point, every professional lacked the knowledge and skills critical to their work today. They started as beginners — and it’s no different in cybersecurity. If you're wondering how to start in cybersecurity with no experience in the field, here's what worked for two career-changing SNHU grads.
A woman walking into a dark computer lab glowing in blue.

What Does a Chief Information Security Officer Do?

The Chief Information Security Officer (CISO) is a high-level leadership role in the C-suite, alongside a company’s CEO and other chief executives. If you plan to climb the career ladder to this position, you'll need to understand the job and what your road to it might look like.

View All Posts

[[Article Title]]

[[Summary]]