The Top 10 Cybersecurity Stories Of 2019 A Window Onto The 2020 Threatscape
The heading of the articles reads as follows; The Top 10 Cybersecurity Stories Of 2019 A Window Onto The 2020 Threatscape. In the article, the title is bolded, the first letter capitalized, and the text has a larger font than the rest of the text. The writer of the article has used numbers in the middle of the text. Numbers attract readers more into being interested in reading. Additionally, by use of the word Top in the text is as objective as it would grab a reader into knowing what the articles are talking about. In regards to the reader’s attention, headings should be put in one sentence so that it is effortless to read and understand. Keywords are essential as they grab and describes the text to a reader just by a single look. If possible, the headings should be short and sweet so that the reader can read and understand quickly.
In the first sentence of the article, the article addresses the trend of cybersecurity in the year 2019 and puts it as “no doubt” to show precision in what the writer is talking about. The article is seeming to address the whole world, if not the entire industry involves in cyber. Duplication of the first sentence can be acquired by use of a better format chronologically as follows; as we come to the end of 2019, it has been an indisputable year in the cybersecurity.
The article follows a standard order in its subheadings. In usual order, the subsequent topics are written, followed by the description that emerges from the topic. In such a format or rules of writing, it is easy to tell that a particular article is referring to different things altogether. However, sometimes, like for our case, the subtopics are from the same main topic but addressing different things entirely.
The title of the article is on the left-hand side and has a bigger font. The author’s name is at the top right, just after the main topic and bolded. The name of the publishing organization is the header of the article and has a bigger font and is bolded as well. Although there are no page numbers, the subheadings are number chronologically. There is a picture at the beginning of the text, which boldly explains that the article is about cybersecurity just by looking at it.
The article uses a formal tone by explains facts about cybersecurity. The voice used is active as it used strong verbs rather than using simple verbs like are, we and the others. At some points, the article uses ‘I,’ for example, “I doubt it will be the last time we see security issues such as this.” There are specific words that characterize this profession example, cyber, hacking, data breach and many others.
The reference from the FBI on the high impact on cyber-attack warnings has been used and put on different colour linked to a website to help a reader identify it and can refer to it from the website given. An example of evidence used is that; “do not install this update” quote from Microsoft. In most cases, authors of images have their names under the image or photos to give them credit.