Explore the latest developments in cybersecurity with this essential guide
Every day it seems we read another story about one company or another being targeted by cybercriminals. It makes some of us wonder: am I safe online? The good news is that we can all be cybersecureand it doesnt take a degree in computer science to make it happen!
Cybersecurity For Dummiesis the down-to-earth guide you need to secure your own data (and your companys, too). Youll get step-by-step guidance on how to implement reasonable security measures, prevent cyber attacks, deal securely with remote work, and what to do in the event that your information is compromised.
The book also offers:Updated directions on how to prevent ransomware attacks and how to handle the situation if you become a targetStep-by-step instructions on how to create data backups and implement strong encryptionBasic info that every aspiring cybersecurity professional needs to know
Cybersecurity For Dummiesis the ideal handbook for anyone considering a career transition into cybersecurity, as well as anyone seeking to secure sensitive information.
Introduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371