Joseph Steinberg
Cybersecurity For Dummies (eBook, PDF)
21,99 €
21,99 €
inkl. MwSt.
Sofort per Download lieferbar
0 °P sammeln
21,99 €
Als Download kaufen
21,99 €
inkl. MwSt.
Sofort per Download lieferbar
0 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
21,99 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
0 °P sammeln
Joseph Steinberg
Cybersecurity For Dummies (eBook, PDF)
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Get the know-how you need to safeguard your data against cyber attacks
Cybercriminals are constantly updating their strategies and techniques in search of new ways to breach data security-shouldn't you learn how to keep yourself and your loved ones safe? Fully updated with information on AI, hybrid work environments, and more, Cybersecurity For Dummies is the best-selling guide you need to learn how to protect your personal and business information from the latest cyber threats. This book helps you build stronger defenses, with detailed instructions on how to protect your computer, your…mehr
- Geräte: PC
- mit Kopierschutz
- eBook Hilfe
- Größe: 9.39MB
Andere Kunden interessierten sich auch für
- Joseph SteinbergCybersecurity For Dummies (eBook, PDF)16,99 €
- Joseph SteinbergCybersecurity For Dummies (eBook, ePUB)21,99 €
- Joseph SteinbergCybersecurity For Dummies (eBook, ePUB)16,99 €
- Cyber Security and Network Security (eBook, PDF)164,99 €
- Gregory C. RasnerCybersecurity and Third-Party Risk (eBook, PDF)27,99 €
- Rida KhatounCybersecurity in Smart Homes (eBook, PDF)126,99 €
- Bruce SchneierSecrets and Lies (eBook, PDF)19,99 €
-
-
-
Get the know-how you need to safeguard your data against cyber attacks
Cybercriminals are constantly updating their strategies and techniques in search of new ways to breach data security-shouldn't you learn how to keep yourself and your loved ones safe? Fully updated with information on AI, hybrid work environments, and more, Cybersecurity For Dummies is the best-selling guide you need to learn how to protect your personal and business information from the latest cyber threats. This book helps you build stronger defenses, with detailed instructions on how to protect your computer, your online data, and your mobile devices. Learn how to set up the right security measures and prevent breaches-as well as what to do if your information or systems are compromised.
Ideal for businesses and individuals who want to be cyber-secure. Cybersecurity For Dummies is also a great primer for anyone interested in pursuing a career in cybersecurity.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Cybercriminals are constantly updating their strategies and techniques in search of new ways to breach data security-shouldn't you learn how to keep yourself and your loved ones safe? Fully updated with information on AI, hybrid work environments, and more, Cybersecurity For Dummies is the best-selling guide you need to learn how to protect your personal and business information from the latest cyber threats. This book helps you build stronger defenses, with detailed instructions on how to protect your computer, your online data, and your mobile devices. Learn how to set up the right security measures and prevent breaches-as well as what to do if your information or systems are compromised.
- Learn about the different types of cyberattacks and how to defend against them
- Beef up your data security for hybrid work environments and cloud storage
- Keep your family members safe against deepfake and other social engineering attacks
- Make sure you have a plan to respond quickly and limit damage in the event of a breach
Ideal for businesses and individuals who want to be cyber-secure. Cybersecurity For Dummies is also a great primer for anyone interested in pursuing a career in cybersecurity.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in D ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: John Wiley & Sons
- Seitenzahl: 435
- Erscheinungstermin: 7. März 2025
- Englisch
- ISBN-13: 9781394318742
- Artikelnr.: 73584139
- Verlag: John Wiley & Sons
- Seitenzahl: 435
- Erscheinungstermin: 7. März 2025
- Englisch
- ISBN-13: 9781394318742
- Artikelnr.: 73584139
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Joseph Steinberg holds many security certifications, including CISSP, ISSAP, ISSMP, and CSSLP. He serves as a cybersecurity expert witness, an advisor to businesses and governments, and a lecturer on cybersecurity at Columbia University. He has been named one of the top three cybersecurity influencers worldwide.
Introduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Se
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Se
Introduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 27
Chapter 3: The Bad Guys You Must Defend Against and How They Plan to Attack
You 51
Part 2: Improving Your Own Personal Security 75
Chapter 4: Evaluating Your Current Cybersecurity Posture 77
Chapter 5: Enhancing Physical Security 101
Chapter 6: Cybersecurity Considerations When Working from Home 113
Part 3: Protecting Yourself from Yourself 123
Chapter 7: Securing Your Accounts 125
Chapter 8: Passwords 143
Chapter 9: Preventing Social Engineering Attacks 161
Part 4: Cybersecurity for Businesses, Organizations, and Government 181
Chapter 10: Securing Your Small Business 183
Chapter 11: Cybersecurity and Big Businesses 207
Part 5: Handling a Security Incident (This Is a When, Not an If) 221
Chapter 12: Identifying a Security Breach 223
Chapter 13: Recovering from a Security Breach 241
Part 6: Backing Up and Recovery 261
Chapter 14: Backing Up 263
Chapter 15: Resetting Your Device 293
Chapter 16: Restoring from Backups 305
Part 7: Looking Toward the Future 329
Chapter 17: Pursuing a Cybersecurity Career 331
Chapter 18: Meeting the Onrush of Artificial Intelligence 345
Chapter 19: Emerging Technologies Bring New Threats 355
Part 8: The Part of Tens 369
Chapter 20: Ten Ways to Improve Your Cybersecurity without Spending a
Fortune 371
Chapter 21: Ten (or So) Lessons from Major Cybersecurity Breaches 379
Chapter 22: Ten Ways to Safely Use Public Wi-Fi 387
Index 393
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 27
Chapter 3: The Bad Guys You Must Defend Against and How They Plan to Attack
You 51
Part 2: Improving Your Own Personal Security 75
Chapter 4: Evaluating Your Current Cybersecurity Posture 77
Chapter 5: Enhancing Physical Security 101
Chapter 6: Cybersecurity Considerations When Working from Home 113
Part 3: Protecting Yourself from Yourself 123
Chapter 7: Securing Your Accounts 125
Chapter 8: Passwords 143
Chapter 9: Preventing Social Engineering Attacks 161
Part 4: Cybersecurity for Businesses, Organizations, and Government 181
Chapter 10: Securing Your Small Business 183
Chapter 11: Cybersecurity and Big Businesses 207
Part 5: Handling a Security Incident (This Is a When, Not an If) 221
Chapter 12: Identifying a Security Breach 223
Chapter 13: Recovering from a Security Breach 241
Part 6: Backing Up and Recovery 261
Chapter 14: Backing Up 263
Chapter 15: Resetting Your Device 293
Chapter 16: Restoring from Backups 305
Part 7: Looking Toward the Future 329
Chapter 17: Pursuing a Cybersecurity Career 331
Chapter 18: Meeting the Onrush of Artificial Intelligence 345
Chapter 19: Emerging Technologies Bring New Threats 355
Part 8: The Part of Tens 369
Chapter 20: Ten Ways to Improve Your Cybersecurity without Spending a
Fortune 371
Chapter 21: Ten (or So) Lessons from Major Cybersecurity Breaches 379
Chapter 22: Ten Ways to Safely Use Public Wi-Fi 387
Index 393
Introduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Se
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Se
Introduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 27
Chapter 3: The Bad Guys You Must Defend Against and How They Plan to Attack
You 51
Part 2: Improving Your Own Personal Security 75
Chapter 4: Evaluating Your Current Cybersecurity Posture 77
Chapter 5: Enhancing Physical Security 101
Chapter 6: Cybersecurity Considerations When Working from Home 113
Part 3: Protecting Yourself from Yourself 123
Chapter 7: Securing Your Accounts 125
Chapter 8: Passwords 143
Chapter 9: Preventing Social Engineering Attacks 161
Part 4: Cybersecurity for Businesses, Organizations, and Government 181
Chapter 10: Securing Your Small Business 183
Chapter 11: Cybersecurity and Big Businesses 207
Part 5: Handling a Security Incident (This Is a When, Not an If) 221
Chapter 12: Identifying a Security Breach 223
Chapter 13: Recovering from a Security Breach 241
Part 6: Backing Up and Recovery 261
Chapter 14: Backing Up 263
Chapter 15: Resetting Your Device 293
Chapter 16: Restoring from Backups 305
Part 7: Looking Toward the Future 329
Chapter 17: Pursuing a Cybersecurity Career 331
Chapter 18: Meeting the Onrush of Artificial Intelligence 345
Chapter 19: Emerging Technologies Bring New Threats 355
Part 8: The Part of Tens 369
Chapter 20: Ten Ways to Improve Your Cybersecurity without Spending a
Fortune 371
Chapter 21: Ten (or So) Lessons from Major Cybersecurity Breaches 379
Chapter 22: Ten Ways to Safely Use Public Wi-Fi 387
Index 393
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 27
Chapter 3: The Bad Guys You Must Defend Against and How They Plan to Attack
You 51
Part 2: Improving Your Own Personal Security 75
Chapter 4: Evaluating Your Current Cybersecurity Posture 77
Chapter 5: Enhancing Physical Security 101
Chapter 6: Cybersecurity Considerations When Working from Home 113
Part 3: Protecting Yourself from Yourself 123
Chapter 7: Securing Your Accounts 125
Chapter 8: Passwords 143
Chapter 9: Preventing Social Engineering Attacks 161
Part 4: Cybersecurity for Businesses, Organizations, and Government 181
Chapter 10: Securing Your Small Business 183
Chapter 11: Cybersecurity and Big Businesses 207
Part 5: Handling a Security Incident (This Is a When, Not an If) 221
Chapter 12: Identifying a Security Breach 223
Chapter 13: Recovering from a Security Breach 241
Part 6: Backing Up and Recovery 261
Chapter 14: Backing Up 263
Chapter 15: Resetting Your Device 293
Chapter 16: Restoring from Backups 305
Part 7: Looking Toward the Future 329
Chapter 17: Pursuing a Cybersecurity Career 331
Chapter 18: Meeting the Onrush of Artificial Intelligence 345
Chapter 19: Emerging Technologies Bring New Threats 355
Part 8: The Part of Tens 369
Chapter 20: Ten Ways to Improve Your Cybersecurity without Spending a
Fortune 371
Chapter 21: Ten (or So) Lessons from Major Cybersecurity Breaches 379
Chapter 22: Ten Ways to Safely Use Public Wi-Fi 387
Index 393