Stand-to! update Beginning May 2022, STAND-TO! will no longer be published on and/or distributed to its subscribers. Please continue to learn about the U.S. Army on and follow @USArmy on our social media platforms. Thank you for your continued interest in learning about the U.S. Army.

Cyber threats

Thursday, Aug. 13, 2015

What is it?

Cyber crime, cyber theft, and cyber intrusions are real and growing threats to the Army and America, but U.S. Army Cyber Command is also real and growing. Professional cyber operators work 24/7 to stay ahead of malicious state and non-state actors, criminals, hackers and insider threats that seek to disable or compromise Army networks, systems and critical infrastructure. Every member of the Total Army plays an important role in supporting the deliberate efforts of full-time cyber defense forces. Just as physical security begins with individuals, safeguarding Army networks and the information on them requires individual vigilance.

What has the Army done?

The Army continually educates and trains the force on protective measures, but cybersecurity cannot be looked at as a once-a-year mandatory training requirement or a “bumper sticker” slogan. The threat is real and requires daily awareness. While most Army members are familiar with basic tactics to prevent compromises, not everyone follows those best practices. Tactics such as using complex passwords, changing passwords frequently, not selecting active hyperlinks in unsigned e-mails, disabling location access on social networks, and protecting operational and personal security are a few of the ways users can protect themselves and Army networks. Other measures to prevent identity theft and keep networks secure include being aware of the privacy policies of sites and organizations that seek personal information; keeping browser software current with the latest security updates and knowing how to use them; getting independent verification of questionable requests for personal information; getting to know the security features of sites that request personal data and reviewing and updating them regularly; and signing up for continuous credit monitoring.

What continued efforts does the Army have planned for the future?

ARCYBER is on the front line of the Army’s continual operations to reduce the number of access points and vulnerabilities and to build a network that is increasingly more defensible. Efforts to assess and manage risks to Army enterprise and personal information demand flexible, adaptive, continually updated safeguards. Maintaining that edge makes comprehensive, thorough and continuous training for Soldiers, civilian employees, and Family members essential to protecting Army and personal assets.

Why is this important to the Army?

The Army faces increasingly pervasive and sophisticated cyber threats. Malicious activity in cyberspace constantly threatens Army networks, information and people. Every user has an essential role in keeping Army and personal networks and information safe. The only secure way ahead is through nonstop vigilance; continually updated tools, training, tactics and techniques; and a Total Army culture that embraces cybersecurity as a top priority.


Subscribe to STAND-TO! to learn about the U.S. Army initiatives.