What do you think?
Rate this book


384 pages, Kindle Edition
First published October 1, 2019
It is important to understand that there is no such thing as 100 percent cybersecurity. Rather, adequate cybersecurity is defined by understanding what risks exist, which ones are adequately mitigated, and which ones persist.I don't completely agree with the author about password managers. He says,
Your online banking password should be strong, unique, and committed to memory — not stored in a database, password manager, or anywhere else electronic.Later, he says about password managers,
Such technology is appropriate for general passwords, but not for the most sensitive ones. Various password managers have been hacked, and if something does go wrong when all your eggs are in one basket, you may have a nightmare on your hands.In a perfect world, this would be true, but in reality, we can't expect people to create and remember strong passwords for all their financial accounts and other sensitive accounts. In general, a password manager is the best option.
According to most experts, the majority of information-security incidents involve insider threats — meaning that the biggest risk to businesses are their employees. Likewise, if you share a home computer with family members who are less cyber-aware, they may pose the greatest risk to your cybersecurity.Securing Your Accounts
Technically speaking, cryptocurrency is tracked on a ledger, not stored anywhere, so the restoration is not to restore the actual cryptocurrency, but rather to restore the private keys needed in order to control the addresses within the ledger at which the cryptocurrency is stored.If you lost the device on which your cryptocurrency is stored, get the paper that has your keys printed on it. When you're finished with the paper, return it to a secure location, such as a safe deposit box.
As the author mentioned, "an ounce of prevention is worth many tons of response," this book offers a lot of decent advice for people to take a look at their habits. But what if there a breach occurred? The best way of course is being a pro, or seek professional help. If there's no pro's to help at the time, the author listed three steps for recovering:
Step 1. Figure out what happened/is happening
Gather as much info as you can about:
a. What happened.
b. What info systems and databases were hit.
c. What could a criminal do with the stolen material.
d. What data and programs have been affected.
e. Who, besides yourself, may face risk because of the breach.
Step 2. Contain the attack
Which may entail:
a. Terminating all network connectivity ASAP: turn off your router by unplugging it.
b. Unplugging any Ethernet cables and disconnect each device from your network.
c. Turning off wi-fi on the infected device.
d. Turning off cellular data: put your device into airplane mode.
e. Turning off bluetooth and NFC: block the possibility of infections spreading of hackers jumping from device to device.
f. Unplugging USB devices and other removable drives from the system
g. Revoking any access rights that the attacker is exploiting.
Step 3. Terminate and eliminate the attack a.k.a. clean up the system
Boot your computer:
- Windows:
a. Remove any external drives.
b. Shut down the computer.
c. Wait ten seconds and push the power button to start the computer.
d. While the computer is starting, press the F8 key repeatedly to display the Boot Options menu.
e. When the Boot Options menu appears, select the option to boot in Safe Mode.
- Mac:
a. Remove any external drives.
b. Shut down the computer.
c. Wait ten seconds and push the power button to start the computer.
d. While the computer is starting, hold down the Shift key.