Jump to ratings and reviews
Rate this book

Cybersecurity For Dummies

Rate this book
Protect your business and family against cyber attacks

Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being "cyber-secure" means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked.

If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You’ll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!

The who and why of cybersecurity threats Basic cybersecurity concepts What to do to be cyber-secure Cybersecurity careers What to think about to stay cybersecure in the future Now is the time to identify vulnerabilities that may make you a victim of cyber-crime — and to defend yourself before it is too late.

432 pages, Paperback

First published October 1, 2019

176 people are currently reading
310 people want to read

About the author

Joseph Steinberg

37 books5 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
26 (18%)
4 stars
57 (41%)
3 stars
48 (35%)
2 stars
3 (2%)
1 star
3 (2%)
Displaying 1 - 19 of 19 reviews
Profile Image for Chad.
1,252 reviews1,026 followers
October 10, 2024
A decent, basic guide to cybersecurity for individuals and small businesses. It covers a range of topics at a non-technical level. Some Dummies books are better than others, and I was disappointed by this one. It's not nearly as good as Firewalls Don't Stop Dragons or Cyber Smart. Still, it was worth reading because it contains some unique content. It's that unique content that I focus on in my summary, rather than repeating information I've already shared in other book summaries.

I wish this book had more specific software and service recommendations. I realize technology changes rapidly, so including recommendations can date a book, but they would've made it more helpful.

The author has the right perspective on cybersecurity. He says,
It is important to understand that there is no such thing as 100 percent cybersecurity. Rather, adequate cybersecurity is defined by understanding what risks exist, which ones are adequately mitigated, and which ones persist.
I don't completely agree with the author about password managers. He says,
Your online banking password should be strong, unique, and committed to memory — not stored in a database, password manager, or anywhere else electronic.
Later, he says about password managers,
Such technology is appropriate for general passwords, but not for the most sensitive ones. Various password managers have been hacked, and if something does go wrong when all your eggs are in one basket, you may have a nightmare on your hands.
In a perfect world, this would be true, but in reality, we can't expect people to create and remember strong passwords for all their financial accounts and other sensitive accounts. In general, a password manager is the best option.

I read this to learn more about personal cybersecurity.

Notes
Bad Guys and Accidental Bad Guys—The Folks You Must Defend Against
Be aware that online archives of newsletters from churches, synagogues, and other communities often contain birth announcements that include the name of the baby and his or her parents, and the baby's date of birth. These details can help an attacker answer security questions.

Evaluating Your Current Cybersecurity Posture
If your router lets you, disable older Wi-Fi protocols that aren't needed by any of your devices (such as 802.11a, b, and g).

Put your router near the center of your home to limit how far your Wi-Fi extends outside your home, to reduce the risk of others getting access.

Don't publicize medical information, including information about medical facilities you've been to, or conditions you suffer from.

Keep private data out of the cloud unless you encrypt it. Don't rely on the cloud provider's encryption; encrypt it yourself before uploading it.

If you're accessing websites that you don't want associated with you, use private browsing (which is only partial protection) or use the Tor Browser which has better privacy protections than standard browsers.

Don't publicize your mobile phone number. Instead, get a number from a service like Google Voice and give that out. Have it forward to your real number. This protects against SIM-swapping, spam, and other risks.

Ensure that none of your IoT (Internet of Things) devices (smart devices) would create a security risk in the event of a failure. For example, a smart lock preventing you from leaving a room in case of fire, or letting robbers into your house during a power outage or network failure.

If possible, run your IoT devices on a separate network than your main devices. That IoT network should have a firewall protecting it.

Enhancing Physical Security
According to most experts, the majority of information-security incidents involve insider threats — meaning that the biggest risk to businesses are their employees. Likewise, if you share a home computer with family members who are less cyber-aware, they may pose the greatest risk to your cybersecurity.
Securing Your Accounts
Log out of websites when you're finished; don't just close the tab or browser. Only stay logged in on a device that is secure; that no one else has access to.

When a website allows, set limits. For example, limit how much money can be transferred out of a bank account, limit how much can be charged to a credit card when it's not physically present, and limit the maximum amount that can be purchased in one day.

Preventing Social Engineering
Don't list your family members in your Facebook profile. Doing so can leak information to criminals. It can reveal your mother's maiden name or where you grew up, which are often answers to security questions. Listing your family members also gives criminals a list of people to target with social engineering or scams.

Don't share information which contains answers to security questions or could allow others to impersonate you, such as favorite vacation spot, name of first school, details about your first car, or your favorite food.

Sharing images that reveal where your kids go to school, or their after-school activities, may expose them to danger.

If you get a friend request from someone you don't recognize, you can put their profile picture into Google's reverse image search to see where else it appears.

Don't assume that an account is legitimate just because it has a few mutual friends. Some of your friends may have unwittingly connected with a scammer. If an account has many mutual friends, it's more likely to be the person they claim to be.

For safety, use bogus information when possible. For example, a fake birthdate and fake mother's maiden name. However, don't give false information when accurate information is required by law (for example, when opening a credit card account).

Recovering from a Security Breach
If one of your devices is breached, change any passwords that are stored on it, and check all accounts that were accessible from the device without requiring you to enter a password.

Restoring from Backups
Restoring Cryptocurrency
Technically speaking, cryptocurrency is tracked on a ledger, not stored anywhere, so the restoration is not to restore the actual cryptocurrency, but rather to restore the private keys needed in order to control the addresses within the ledger at which the cryptocurrency is stored.
If you lost the device on which your cryptocurrency is stored, get the paper that has your keys printed on it. When you're finished with the paper, return it to a secure location, such as a safe deposit box.

If you store cryptocurrency at an exchange, restore your credentials to the exchange through whatever means the exchange allows. If you properly backed up your passwords, obtain and use them.

If you use hardware wallets to store the keys to your cryptocurrency, the backup for the wallet device is often a recovery seed, which is a list of words that allows the device to recreate the keys needed. The list of words should be written on paper and stored in a bank vault and/or safe, not stored electronically.

Ten Ways You Can Improve Your Cybersecurity without Spending a Fortune
If you work from home, consider connecting your computer to the Internet via a different Wi-Fi network than the one that your family uses to browse the Web and play video games. Most modern routers support at least 2 Wi-Fi networks (one is usually called the guest network).
Profile Image for Sally Kilpatrick.
Author 16 books392 followers
Read
November 16, 2024
Research

Hey, hi. Yeah. In true Sally fashion, I read this book third. Maybe, I would've understood several terms from the other hacker books if I had, oh I don't know, read this one first.

Caution: if you suffer from anxiety, as I do, this book will convince you there's a hacker around every corner. I mean, there probably is, but...yeah. I have plenty of things to worry about. That said, lots of info here to help you be more secure.
Profile Image for Sophie.
292 reviews
August 4, 2021

As the author mentioned, "an ounce of prevention is worth many tons of response," this book offers a lot of decent advice for people to take a look at their habits. But what if there a breach occurred? The best way of course is being a pro, or seek professional help. If there's no pro's to help at the time, the author listed three steps for recovering:


Step 1. Figure out what happened/is happening
Gather as much info as you can about:
a. What happened.
b. What info systems and databases were hit.
c. What could a criminal do with the stolen material.
d. What data and programs have been affected.
e. Who, besides yourself, may face risk because of the breach.


Step 2. Contain the attack
Which may entail:
a. Terminating all network connectivity ASAP: turn off your router by unplugging it.
b. Unplugging any Ethernet cables and disconnect each device from your network.
c. Turning off wi-fi on the infected device.
d. Turning off cellular data: put your device into airplane mode.
e. Turning off bluetooth and NFC: block the possibility of infections spreading of hackers jumping from device to device.
f. Unplugging USB devices and other removable drives from the system
g. Revoking any access rights that the attacker is exploiting.


Step 3. Terminate and eliminate the attack a.k.a. clean up the system
Boot your computer:
- Windows:
a. Remove any external drives.
b. Shut down the computer.
c. Wait ten seconds and push the power button to start the computer.
d. While the computer is starting, press the F8 key repeatedly to display the Boot Options menu.
e. When the Boot Options menu appears, select the option to boot in Safe Mode.
- Mac:
a. Remove any external drives.
b. Shut down the computer.
c. Wait ten seconds and push the power button to start the computer.
d. While the computer is starting, hold down the Shift key.

Profile Image for Annelise.
325 reviews
July 30, 2023
This book was a decent introduction to cyber security, but it contained less technical knowledge than what I had expected. Bottom line - maybe a good book for someone with NO cyber knowledge and who is looking to enhance their own personal cyber practices. If you’re interested in cyber as a career field, there are some tips & future outlook but this book won’t necessarily teach you much to help prep you for it.

Since I listened via audiobook, there were several parts in the book with step-by-step instructions for resetting security on specific devices. Those tips would have been better served in the paper version. However, this was a simple read and one that didn’t take too long to get through to give a nice introduction into cyber as a whole.
Profile Image for Daniel.
731 reviews2 followers
September 24, 2021
One of my interests is cybersecurity so I was excited to read cybersecurity for dummies. I thought it was OK.

One of my favorite chapters was about passwords. It talked about how to make a secure passwords that are easier to remember.

I also liked the chapter about the different types of security careers or was it different types of security certifications. Hmm maybe both of those things are the same thing? I can't remember what that chapter explained exactly.
Profile Image for Katherine.
11 reviews
January 26, 2024
As others said, provides a nice overview of cybersecurity. I do wish it had been more technical. I learned the most from chapter 2 about common cyberattacks and chapter 13 about backing up! Read the whole book front to back aside from Part 4 because I don’t have a business. Now onto a computer science book that will tell me what a router really is!

Also, quite a bit of grammar mistakes, it was kind of distracting at times lol.
Profile Image for Moldir S.
11 reviews
August 21, 2024
decent book for whom cybersecurity seems interesting and attractive. lot of well written information for individuals, small businesses and even enterprises. would even suggest it to people who are not working in tech, to get the basic understanding of how many things work and have the fundamentals of cyber hygiene.
Profile Image for Carlos.
70 reviews
April 22, 2020
Cybersecurity

I like the book, it gives us the supplement on how to protect ourselves from breaches and hacks. Everything in this world is now all computerized, in order to login we all have to use a password. This book helped a lot
Profile Image for Ben.
2,737 reviews232 followers
August 11, 2022
Hardening Can Be Easy

This was a great book on demonstrating how to harden your digital systems.

It had some great tips and great details on some of the history and reasoning behind cybersecurity.

As someone who is heavy into cybersecurity, this was a great and fun read.

4.6/5
133 reviews
May 17, 2023
it just wasn't for me .
Too much law and tech parts .
Expected more algorithm stuff .
It's not bad , it's actually good , but for me personally , I just wasn't interested in that .
But if you are , it has some good explanations
194 reviews4 followers
October 17, 2025
For people who have some technical knowledge it is a good text to learn from. For those looking for more extensive knowledge you would find it lacking. Good topics are covered and easy to understand.
Profile Image for Jacob.
1,722 reviews8 followers
August 23, 2020
Public library copy.

Easy to digest book with some common sense advice for users of different degrees of savvyness.
22 reviews1 follower
January 6, 2022
Iook forward to reading 📚 books

If are looking for any kind of 📖 book or
Dictionary this book is for you
U found your weight in to book and chapters
Profile Image for Kemi looves 2 read.
502 reviews6 followers
April 13, 2022
He kept going on about using Tor as a browser but without much info on it. If one is not tech savvy, that is a definate challenge.
4 reviews
July 22, 2022
Its just a good start if you need enter the cybersecurity career or safe your self from been hacked
Profile Image for Agustiuddin M.
259 reviews
September 17, 2023
A decent basic introductory content about cybersecurity. It touch, barely, the surface of cybersecurity. It was a good read
Profile Image for L-ssar.
153 reviews16 followers
December 9, 2025
Buen libro para adquirir algunas nociones básicas del tema. Si ya has leído algo antes de ciberseguridad puedes saltártelo o sólo consultar el capítulo que te interese.
Profile Image for Blue Caeruleus.
161 reviews33 followers
December 13, 2019
I'm not an IT expert, so I can't rate this book from a professional perspective, but what I can say is that I knew more about cybersecurity after reading this book than I did before I started it, and that was indeed the whole point of reading it in the first place. The book is written clearly, succinctly, and with many examples of security breaches drawn from true events that endow the text with a sense of reality and urgency. I learned about threats that I was previously unaware of and changed some unsafe practices that I hadn't given any thought to before. Reading this book gave me a stronger sense of competence when it comes to protecting myself from cyber threats, and for that, I recommend it heartily to anyone who wishes to become more cyber secure.
Displaying 1 - 19 of 19 reviews

Can't find what you're looking for?

Get help and learn more about the design.