An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

1st Theater Sustainment Command


News Stories

Defend the network - Cybersecurity Starts with You, First Team

By Barbara Gersna | 1st Theater Sustainment Command | November 03, 2022

FORT KNOX, Ky. --

Cybersecurity isn’t a job just for Soldiers working in their unit’s G-6 section; together, everyone using a government computer and network must protect the confidentiality, integrity, availability, and negation of Army data.

Cybersecurity is defined as the art of protecting networks, devices, and data from unlawful access or criminal use, and providing confidentiality, integrity, and availability of information. It is accomplished using multiple layers of protection.

“Adversaries use a variety of cyber means to compromise our systems, distort narratives and disseminate misinformation…these actions seek to undermine the legitimacy of our institutions,” explained Gen. Paul M. Nakasone, commander, U.S. Cyber Command.

Cyber-attacks are constantly being thwarted. Therefore, they Army safeguards its assets using a robust cybersecurity program.

“Most attacks start with a phishing email,” Sgt. 1st Class Jonathan Wojack, cyber network defense noncommissioned officer in charge, G-6, 1st Theater Sustainment Command, said. These are generally stopped by network protections.

“A phishing email usually conveys a sense of timeliness,” Wojack added. For example, the email might instruct the recipient to do something within the next 24 hours.

Wojack discourages users from opening emails, especially with links, from non-Department of Defense or unknown sources.

He described phishing emails as ones which look legitimate, but appear, “off.”

Furthermore, cybersecurity is described as a holistic program to manage IT-related security risk. To be effective, it must be integrated fully into every aspect of the Army.

Moreover, Soldiers at every level are responsible for procedural compliance with the proper practices and procedures for safeguarding information and IT.

It is a dynamic threat environment which requires the Army to address security, ensuring the Army is poised for defensive and offensive cyber operations.

This same approach can be applied with personal home networks and devices.

The Army urges Soldiers, civilian employees, and family members to keep up their guard and protect their personal identifiable information. They can do this by updating privacy settings, using two-factor authentication, and creating strong passwords.

Finally, another level of protection on personal devices is to disable geo-tracking on smart devices, including applications with listening and recording capabilities, and to not open emails and links from unknown sources in personal emails too.