Get the know-how you need to safeguard your data against cyber attacks Cybercriminals are constantly updating their strategies and techniques in search of new ways to breach data security-shouldn't you learn how to keep yourself and your loved ones safe? Fully updated with information on AI, hybrid work environments, and more, Cybersecurity For Dummies is the best-selling guide you need to learn how to protect your personal and business information from the latest cyber threats. This book helps you build stronger defenses, with detailed instructions on how to protect your computer, your online…mehr
Get the know-how you need to safeguard your data against cyber attacks Cybercriminals are constantly updating their strategies and techniques in search of new ways to breach data security-shouldn't you learn how to keep yourself and your loved ones safe? Fully updated with information on AI, hybrid work environments, and more, Cybersecurity For Dummies is the best-selling guide you need to learn how to protect your personal and business information from the latest cyber threats. This book helps you build stronger defenses, with detailed instructions on how to protect your computer, your online data, and your mobile devices. Learn how to set up the right security measures and prevent breaches-as well as what to do if your information or systems are compromised. * Learn about the different types of cyberattacks and how to defend against them * Beef up your data security for hybrid work environments and cloud storage * Keep your family members safe against deepfake and other social engineering attacks * Make sure you have a plan to respond quickly and limit damage in the event of a breach Ideal for businesses and individuals who want to be cyber-secure. Cybersecurity For Dummies is also a great primer for anyone interested in pursuing a career in cybersecurity.
Introduction 1 Part 1: Getting Started with Cybersecurity 5 Chapter 1: What Exactly Is Cybersecurity? 7 Chapter 2: Getting to Know Common Cyberattacks 27 Chapter 3: The Bad Guys You Must Defend Against and How They Plan to Attack You 51 Part 2: Improving Your Own Personal Security 75 Chapter 4: Evaluating Your Current Cybersecurity Posture 77 Chapter 5: Enhancing Physical Security 101 Chapter 6: Cybersecurity Considerations When Working from Home 113 Part 3: Protecting Yourself from Yourself 123 Chapter 7: Securing Your Accounts 125 Chapter 8: Passwords 143 Chapter 9: Preventing Social Engineering Attacks 161 Part 4: Cybersecurity for Businesses, Organizations, and Government 181 Chapter 10: Securing Your Small Business 183 Chapter 11: Cybersecurity and Big Businesses 207 Part 5: Handling a Security Incident (This Is a When, Not an If) 221 Chapter 12: Identifying a Security Breach 223 Chapter 13: Recovering from a Security Breach 241 Part 6: Backing Up and Recovery 261 Chapter 14: Backing Up 263 Chapter 15: Resetting Your Device 293 Chapter 16: Restoring from Backups 305 Part 7: Looking Toward the Future 329 Chapter 17: Pursuing a Cybersecurity Career 331 Chapter 18: Meeting the Onrush of Artificial Intelligence 345 Chapter 19: Emerging Technologies Bring New Threats 355 Part 8: The Part of Tens 369 Chapter 20: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 371 Chapter 21: Ten (or So) Lessons from Major Cybersecurity Breaches 379 Chapter 22: Ten Ways to Safely Use Public Wi-Fi 387 Index 393
Introduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Introduction 1 Part 1: Getting Started with Cybersecurity 5 Chapter 1: What Exactly Is Cybersecurity? 7 Chapter 2: Getting to Know Common Cyberattacks 27 Chapter 3: The Bad Guys You Must Defend Against and How They Plan to Attack You 51 Part 2: Improving Your Own Personal Security 75 Chapter 4: Evaluating Your Current Cybersecurity Posture 77 Chapter 5: Enhancing Physical Security 101 Chapter 6: Cybersecurity Considerations When Working from Home 113 Part 3: Protecting Yourself from Yourself 123 Chapter 7: Securing Your Accounts 125 Chapter 8: Passwords 143 Chapter 9: Preventing Social Engineering Attacks 161 Part 4: Cybersecurity for Businesses, Organizations, and Government 181 Chapter 10: Securing Your Small Business 183 Chapter 11: Cybersecurity and Big Businesses 207 Part 5: Handling a Security Incident (This Is a When, Not an If) 221 Chapter 12: Identifying a Security Breach 223 Chapter 13: Recovering from a Security Breach 241 Part 6: Backing Up and Recovery 261 Chapter 14: Backing Up 263 Chapter 15: Resetting Your Device 293 Chapter 16: Restoring from Backups 305 Part 7: Looking Toward the Future 329 Chapter 17: Pursuing a Cybersecurity Career 331 Chapter 18: Meeting the Onrush of Artificial Intelligence 345 Chapter 19: Emerging Technologies Bring New Threats 355 Part 8: The Part of Tens 369 Chapter 20: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 371 Chapter 21: Ten (or So) Lessons from Major Cybersecurity Breaches 379 Chapter 22: Ten Ways to Safely Use Public Wi-Fi 387 Index 393
Introduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Se
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826