Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing
- 11h 43m 10s
- Roger A. Grimes
- Gildan Media
- 2024
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture.
- Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them.
- Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin.
- Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading.
- Develop technology and security policies that protect your organization against the most common types of social engineering and phishing.
About the Author
ROGER A. GRIMES has 35 years of experience in computer security and has authored 13 previous books on the topic. He is the Data-Driven Defense Evangelist at KnowBe4, a security awareness education company, and a senior computer security consultant and cybersecurity architect.
In this Audiobook
-
Introduction
-
Chapter 1 - Introduction to Social Engineering and Phishing
-
Chapter 2 - Phishing Terminology and Examples
-
Chapter 3 - 3x3 Cybersecurity Control Pillars
-
Chapter 4 - Acceptable Use and General Cybersecurity Policies
-
Chapter 5 - Anti-Phishing Policies
-
Chapter 6 - Creating a Corporate SAT Policy
-
Chapter 7 - DMARC, SPF, and DKIM
-
Chapter 8 - Network and Server Defenses
-
Chapter 9 - Endpoint Defenses
-
Chapter 10 - Advanced Defenses
-
Chapter 11 - Security Awareness Training Overview
-
Chapter 12 - How to Do Training Right
-
Chapter 13 - Recognizing Rogue URLs
-
Chapter 14 - Fighting Spear Phishing
-
Chapter 15 - Forensically Examining Emails
-
Chapter 16 - Miscellaneous Hints and Tricks
-
Chapter 17 - Improving Your Security Culture
-
Conclusion