Defend the network - Cybersecurity Starts with You, First Team

By Barbara GersnaNovember 3, 2022

Capt. Edward Bentz
Capt. Edward Bentz, medical operations officer, 1st Theater Sustainment Command, participates in a culminating training exercise with Soldiers from the 143rd Expeditionary Sustainment Command, an Army Reserve unit from Orlando, Florida in September 2022. (Photo Credit: Sgt. Jacob Wachob) VIEW ORIGINAL

FORT KNOX, Ky. – Cybersecurity isn’t a job just for Soldiers working in their unit’s G-6 section; together, everyone using a government computer and network must protect the confidentiality, integrity, availability, and negation of Army data.

Cybersecurity is defined as the art of protecting networks, devices, and data from unlawful access or criminal use, and providing confidentiality, integrity, and availability of information. It is accomplished using multiple layers of protection.

“Adversaries use a variety of cyber means to compromise our systems, distort narratives and disseminate misinformation…these actions seek to undermine the legitimacy of our institutions,” explained Gen. Paul M. Nakasone, commander, U.S. Cyber Command.

Cyber-attacks are constantly being thwarted. Therefore, they Army safeguards its assets using a robust cybersecurity program.

“Most attacks start with a phishing email,” Sgt. 1st Class Jonathan Wojack, cyber network defense noncommissioned officer in charge, G-6, 1st Theater Sustainment Command, said. These are generally stopped by network protections.

“A phishing email usually conveys a sense of timeliness,” Wojack added. For example, the email might instruct the recipient to do something within the next 24 hours.

Wojack discourages users from opening emails, especially with links, from non-Department of Defense or unknown sources.

He described phishing emails as ones which look legitimate, but appear, “off.”

Furthermore, cybersecurity is described as a holistic program to manage IT-related security risk. To be effective, it must be integrated fully into every aspect of the Army.

Moreover, Soldiers at every level are responsible for procedural compliance with the proper practices and procedures for safeguarding information and IT.

It is a dynamic threat environment which requires the Army to address security, ensuring the Army is poised for defensive and offensive cyber operations.

This same approach can be applied with personal home networks and devices.

The Army urges Soldiers, civilian employees, and family members to keep up their guard and protect their personal identifiable information. They can do this by updating privacy settings, using two-factor authentication, and creating strong passwords.

Finally, another level of protection on personal devices is to disable geo-tracking on smart devices, including applications with listening and recording capabilities, and to not open emails and links from unknown sources in personal emails too.