Joseph Steinberg
Cybersecurity For Dummies
22,99 €
inkl. MwSt.
Sofort lieferbar
11 °P sammeln
Joseph Steinberg
Cybersecurity For Dummies
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Explore the latest developments in cybersecurity with this essential guide
Every day it seems we read another story about one company or another being targeted by cybercriminals. It makes some of us wonder: am I safe online? The good news is that we can all be cybersecure--and it doesn't take a degree in computer science to make it happen!
Cybersecurity For Dummies is the down-to-earth guide you need to secure your own data (and your company's, too). You'll get step-by-step guidance on how to implement reasonable security measures, prevent cyber attacks, deal securely with remote work,…mehr
Andere Kunden interessierten sich auch für
- Kevin BeaverHacking For Dummies20,99 €
- David DurocherHTML and CSS QuickStart Guide31,99 €
- Jon DuckettHTML and CSS21,99 €
- Inayaili de LeónMoving to Responsive Web Design25,99 €
- Jon DuckettHTML & CSS39,99 €
- Barry Burd (Drew University, Madison, NJ)Beginning Programming with Java for Dummies24,99 €
- Mike Chapple (University of Notre Dame)(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle65,99 €
-
-
-
-
-
-
-
-
Explore the latest developments in cybersecurity with this essential guide
Every day it seems we read another story about one company or another being targeted by cybercriminals. It makes some of us wonder: am I safe online? The good news is that we can all be cybersecure--and it doesn't take a degree in computer science to make it happen!
Cybersecurity For Dummies is the down-to-earth guide you need to secure your own data (and your company's, too). You'll get step-by-step guidance on how to implement reasonable security measures, prevent cyber attacks, deal securely with remote work, and what to do in the event that your information is compromised.
The book also offers:
_ Updated directions on how to prevent ransomware attacks and how to handle the situation if you become a target
_ Step-by-step instructions on how to create data backups and implement strong encryption
_ Basic info that every aspiring cybersecurity professional needs to know
Cybersecurity For Dummies is the ideal handbook for anyone considering a career transition into cybersecurity, as well as anyone seeking to secure sensitive information.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Every day it seems we read another story about one company or another being targeted by cybercriminals. It makes some of us wonder: am I safe online? The good news is that we can all be cybersecure--and it doesn't take a degree in computer science to make it happen!
Cybersecurity For Dummies is the down-to-earth guide you need to secure your own data (and your company's, too). You'll get step-by-step guidance on how to implement reasonable security measures, prevent cyber attacks, deal securely with remote work, and what to do in the event that your information is compromised.
The book also offers:
_ Updated directions on how to prevent ransomware attacks and how to handle the situation if you become a target
_ Step-by-step instructions on how to create data backups and implement strong encryption
_ Basic info that every aspiring cybersecurity professional needs to know
Cybersecurity For Dummies is the ideal handbook for anyone considering a career transition into cybersecurity, as well as anyone seeking to secure sensitive information.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- For Dummies
- Verlag: For Dummies / Wiley & Sons
- Artikelnr. des Verlages: 1W119867180
- 2. Aufl.
- Seitenzahl: 416
- Erscheinungstermin: 22. Juni 2022
- Englisch
- Abmessung: 227mm x 190mm x 25mm
- Gewicht: 760g
- ISBN-13: 9781119867180
- ISBN-10: 1119867185
- Artikelnr.: 62579305
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- For Dummies
- Verlag: For Dummies / Wiley & Sons
- Artikelnr. des Verlages: 1W119867180
- 2. Aufl.
- Seitenzahl: 416
- Erscheinungstermin: 22. Juni 2022
- Englisch
- Abmessung: 227mm x 190mm x 25mm
- Gewicht: 760g
- ISBN-13: 9781119867180
- ISBN-10: 1119867185
- Artikelnr.: 62579305
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Joseph Steinberg is a master of cybersecurity. He is one of very few people to hold the suite of security certifications including: CISSP®, ISSAP®, ISSMP®, and CSSLP®. Joseph has written several books on cybersecurity, including the previous edition of Cybersecurity For Dummies. He is currently a consultant on information security, and serves as an expert witness in related matters.
Introduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Se
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Se
Introduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 27
Chapter 3: The Bad Guys You Must Defend Against and How They Plan to Attack
You 51
Part 2: Improving Your Own Personal Security 75
Chapter 4: Evaluating Your Current Cybersecurity Posture 77
Chapter 5: Enhancing Physical Security 101
Chapter 6: Cybersecurity Considerations When Working from Home 113
Part 3: Protecting Yourself from Yourself 123
Chapter 7: Securing Your Accounts 125
Chapter 8: Passwords 143
Chapter 9: Preventing Social Engineering Attacks 161
Part 4: Cybersecurity for Businesses, Organizations, and Government 181
Chapter 10: Securing Your Small Business 183
Chapter 11: Cybersecurity and Big Businesses 207
Part 5: Handling a Security Incident (This Is a When, Not an If) 221
Chapter 12: Identifying a Security Breach 223
Chapter 13: Recovering from a Security Breach 241
Part 6: Backing Up and Recovery 261
Chapter 14: Backing Up 263
Chapter 15: Resetting Your Device 293
Chapter 16: Restoring from Backups 305
Part 7: Looking Toward the Future 329
Chapter 17: Pursuing a Cybersecurity Career 331
Chapter 18: Meeting the Onrush of Artificial Intelligence 345
Chapter 19: Emerging Technologies Bring New Threats 355
Part 8: The Part of Tens 369
Chapter 20: Ten Ways to Improve Your Cybersecurity without Spending a
Fortune 371
Chapter 21: Ten (or So) Lessons from Major Cybersecurity Breaches 379
Chapter 22: Ten Ways to Safely Use Public Wi-Fi 387
Index 393
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 27
Chapter 3: The Bad Guys You Must Defend Against and How They Plan to Attack
You 51
Part 2: Improving Your Own Personal Security 75
Chapter 4: Evaluating Your Current Cybersecurity Posture 77
Chapter 5: Enhancing Physical Security 101
Chapter 6: Cybersecurity Considerations When Working from Home 113
Part 3: Protecting Yourself from Yourself 123
Chapter 7: Securing Your Accounts 125
Chapter 8: Passwords 143
Chapter 9: Preventing Social Engineering Attacks 161
Part 4: Cybersecurity for Businesses, Organizations, and Government 181
Chapter 10: Securing Your Small Business 183
Chapter 11: Cybersecurity and Big Businesses 207
Part 5: Handling a Security Incident (This Is a When, Not an If) 221
Chapter 12: Identifying a Security Breach 223
Chapter 13: Recovering from a Security Breach 241
Part 6: Backing Up and Recovery 261
Chapter 14: Backing Up 263
Chapter 15: Resetting Your Device 293
Chapter 16: Restoring from Backups 305
Part 7: Looking Toward the Future 329
Chapter 17: Pursuing a Cybersecurity Career 331
Chapter 18: Meeting the Onrush of Artificial Intelligence 345
Chapter 19: Emerging Technologies Bring New Threats 355
Part 8: The Part of Tens 369
Chapter 20: Ten Ways to Improve Your Cybersecurity without Spending a
Fortune 371
Chapter 21: Ten (or So) Lessons from Major Cybersecurity Breaches 379
Chapter 22: Ten Ways to Safely Use Public Wi-Fi 387
Index 393
Introduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Se
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Se
Introduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 27
Chapter 3: The Bad Guys You Must Defend Against and How They Plan to Attack
You 51
Part 2: Improving Your Own Personal Security 75
Chapter 4: Evaluating Your Current Cybersecurity Posture 77
Chapter 5: Enhancing Physical Security 101
Chapter 6: Cybersecurity Considerations When Working from Home 113
Part 3: Protecting Yourself from Yourself 123
Chapter 7: Securing Your Accounts 125
Chapter 8: Passwords 143
Chapter 9: Preventing Social Engineering Attacks 161
Part 4: Cybersecurity for Businesses, Organizations, and Government 181
Chapter 10: Securing Your Small Business 183
Chapter 11: Cybersecurity and Big Businesses 207
Part 5: Handling a Security Incident (This Is a When, Not an If) 221
Chapter 12: Identifying a Security Breach 223
Chapter 13: Recovering from a Security Breach 241
Part 6: Backing Up and Recovery 261
Chapter 14: Backing Up 263
Chapter 15: Resetting Your Device 293
Chapter 16: Restoring from Backups 305
Part 7: Looking Toward the Future 329
Chapter 17: Pursuing a Cybersecurity Career 331
Chapter 18: Meeting the Onrush of Artificial Intelligence 345
Chapter 19: Emerging Technologies Bring New Threats 355
Part 8: The Part of Tens 369
Chapter 20: Ten Ways to Improve Your Cybersecurity without Spending a
Fortune 371
Chapter 21: Ten (or So) Lessons from Major Cybersecurity Breaches 379
Chapter 22: Ten Ways to Safely Use Public Wi-Fi 387
Index 393
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 27
Chapter 3: The Bad Guys You Must Defend Against and How They Plan to Attack
You 51
Part 2: Improving Your Own Personal Security 75
Chapter 4: Evaluating Your Current Cybersecurity Posture 77
Chapter 5: Enhancing Physical Security 101
Chapter 6: Cybersecurity Considerations When Working from Home 113
Part 3: Protecting Yourself from Yourself 123
Chapter 7: Securing Your Accounts 125
Chapter 8: Passwords 143
Chapter 9: Preventing Social Engineering Attacks 161
Part 4: Cybersecurity for Businesses, Organizations, and Government 181
Chapter 10: Securing Your Small Business 183
Chapter 11: Cybersecurity and Big Businesses 207
Part 5: Handling a Security Incident (This Is a When, Not an If) 221
Chapter 12: Identifying a Security Breach 223
Chapter 13: Recovering from a Security Breach 241
Part 6: Backing Up and Recovery 261
Chapter 14: Backing Up 263
Chapter 15: Resetting Your Device 293
Chapter 16: Restoring from Backups 305
Part 7: Looking Toward the Future 329
Chapter 17: Pursuing a Cybersecurity Career 331
Chapter 18: Meeting the Onrush of Artificial Intelligence 345
Chapter 19: Emerging Technologies Bring New Threats 355
Part 8: The Part of Tens 369
Chapter 20: Ten Ways to Improve Your Cybersecurity without Spending a
Fortune 371
Chapter 21: Ten (or So) Lessons from Major Cybersecurity Breaches 379
Chapter 22: Ten Ways to Safely Use Public Wi-Fi 387
Index 393