Cybersecurity All-in-One For Dummies
- 24h 50m 38s
- Ira Winkler, Joseph Steinberg, Kevin Beaver, Ted Coombs
- Recorded Books, Inc.
- 2023
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems—and explains why doing so is more important now than ever. Dig in for info on what kind of risks are out there, how to protect a variety of devices, strategies for testing your security, securing cloud data, and steps for creating an awareness program in an organization.
With this book, you'll: explore the basics of cybersecurity at home and in business; learn how to secure your devices, data, and cloud-based assets; test your security to find holes and vulnerabilities before hackers do; and create a culture of cybersecurity throughout an entire organization.
Cybersecurity All-in-One For Dummies is a stellar reference for business owners and IT support pros who need a guide to making smart security choices. Any tech user with concerns about privacy and protection will also love this comprehensive guide.
About the Author
Joseph Steinberg is a cybersecurity and emerging technologies advisor with two decades of industry experience. He writes an independent column covering cybersecurity and privacy, after previously covering those topics for Forbes and Inc. magazine. He also authors thought leadership articles for many technology companies, including IBM and Microsoft, and has invented various cybersecurity-related technologies, which are cited in more than 400 US patent filings.
Kevin Beaver is an information security guru and has worked in the industry for more than three decades as a consultant, writer, and speaker. He earned his master's degree in management of technology at Georgia Tech.
Ira Winkler, president of Secure Mentem, is considered one of the world's most influential security professionals. He has gained media notoriety for performing espionage simulations, where he physically and technically "broke into" some of the largest companies in the world and investigating crimes against them, and telling them how to cost effectively protect their information and computer infrastructure. He continues to perform these espionage simulations, as well as assisting organizations in developing cost effective security programs. Ira also won the Hall of Fame award from the Information Systems Security Association, as well as several other prestigious industry awards. Most recently, CSO Magazine named Ira a CSO Compass Award winner as The Awareness Crusader. Ira is also a columnist for Dark Reading and ComputerWorld, and writes for several other industry publications. Mr. Winkler has been a keynote speaker at almost every major information security related event, on six continents, and has keynoted events in many diverse industries.
Ted Coombs is the author of Cloud Security for Dummies.
In this Audiobook
-
Introduction
-
Chapter 1 - What Exactly Is Cybersecurity?
-
Chapter 2 - Getting to Know Common Cyberattacks
-
Chapter 3 - The Bad Guys You Must Defend Against
-
Chapter 1 - Evaluating Your Current Cybersecurity Posture
-
Chapter 2 - Enhancing Physical Security
-
Chapter 3 - Cybersecurity Considerations When Working from Home
-
Chapter 4 - Securing Your Accounts
-
Chapter 5 - Passwords
-
Chapter 6 - Preventing Social Engineering Attacks
-
Chapter 1 - Securing Your Small Business
-
Chapter 2 - Cybersecurity and Big Businesses
-
Chapter 3 - Identifying a Security Breach
-
Chapter 4 - Recovering from a Security Breach
-
Chapter 5 - Backing Up
-
Chapter 6 - Resetting Your Device
-
Chapter 7 - Restoring from Backups
-
Chapter 1 - Clouds Aren’t Bulletproof
-
Chapter 2 - Getting Down to Business
-
Chapter 3 - Developing Secure Software
-
Chapter 4 - Restricting Access
-
Chapter 5 - Implementing Zero Trust
-
Chapter 6 - Using Cloud Security Services
-
Chapter 1 - Introduction to Vulnerability and Penetration Testing
-
Chapter 2 - Cracking the Hacker Mindset
-
Chapter 3 - Developing Your Security Testing Plan
-
Chapter 4 - Hacking Methodology
-
Chapter 5 - Information Gathering
-
Chapter 6 - Social Engineering
-
Chapter 7 - Physical Security
-
Chapter 1 - Knowing How Security Awareness Programs Work
-
Chapter 2 - Creating a Security Awareness Strategy
-
Chapter 3 - Determining Culture and Business Drivers
-
Chapter 4 - Choosing the Best Tools for the Job
-
Chapter 5 - Measuring Performance
-
Chapter 6 - Assembling Your Security Awareness Program
-
Chapter 7 - Running Your Security Awareness Program
-
Chapter 8 - Implementing Gamification