Introduction 1Part 1: Getting Started with Cybersecurity 5Chapter 1: What Exactly Is Cybersecurity? 7Chapter 2: Getting to Know Common Cyberattacks 23Chapter 3: The Bad Guys You Must Defend Against 49Part 2: Improving Your Own Personal Security 69Chapter 4: Evaluating Your Current Cybersecurity Posture 71Chapter 5: Enhancing Physical Security 93Chapter 6: Cybersecurity Considerations When Working from Home 105Part 3: Protecting Yourself from Yourself 115Chapter 7: Securing Your Accounts 117Chapter 8: Passwords 135Chapter 9: Preventing Social Engineering Attacks 151Part 4: Cybersecurity for Businesses, Organizations, and Government 173Chapter 10: Securing Your Small Business 175Chapter 11: Cybersecurity and Big Businesses 201Part 5: Handling a Security Incident (This Is a When, Not an If) 217Chapter 12: Identifying a Security Breach 219Chapter 13: Recovering from a Security Breach 239Part 6: Backing Up and Recovery 259Chapter 14: Backing Up 261Chapter 15: Resetting Your Device 289Chapter 16: Restoring from Backups 299Part 7: Looking toward the Future 321Chapter 17: Pursuing a Cybersecurity Career 323Chapter 18: Emerging Technologies Bring New Threats 337Part 8: The Part of Tens 351Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367Index 371ntroduction 1Part 1: Getting Started with Cybersecurity 5Chapter 1: What Exactly Is Cybersecurity? 7Chapter 2: Getting to Know Common Cyberattacks 23Chapter 3: The Bad Guys You Must Defend Against 49Part 2: Improving Your Own Personal Security 69Chapter 4: Evaluating Your Current Cybersecurity Posture 71Chapter 5: Enhancing Physical Security 93Chapter 6: Cybersecurity Considerations When Working from Home 105Part 3: Protecting Yourself from Yourself 115Chapter 7: Securing Your Accounts 117Chapter 8: Passwords 135Chapter 9: Preventing Social Engineering Attacks 151Part 4: Cybersecurity for Businesses, Organizations, and Government 173Chapter 10: Securing Your Small Business 175Chapter 11: Cybersecurity and Big Businesses 201Part 5: Handling a Security Incident (This Is a When, Not an If) 217Chapter 12: Identifying a Security Breach 219Chapter 13: Recovering from a Security Breach 239Part 6: Backing Up and Recovery 259Chapter 14: Backing Up 261Chapter 15: Resetting Your Device 289Chapter 16: Restoring from Backups 299Part 7: Looking toward the Future 321Chapter 17: Pursuing a Cybersecurity Career 323Chapter 18: Emerging Technologies Bring New Threats 337Part 8: The Part of Tens 351Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367Index 371ntroduction 1Part 1: Getting Started with Cybersecurity 5Chapter 1: What Exactly Is Cybersecurity? 7Chapter 2: Getting to Know Common Cyberattacks 23Chapter 3: The Bad Guys You Must Defend Against 49Part 2: Improving Your Own Personal Security 69Chapter 4: Evaluating Your Current Cybersecurity Posture 71Chapter 5: Enhancing Physical Security 93Chapter 6: Cybersecurity Considerations When Working from Home 105Part 3: Protecting Yourself from Yourself 115Chapter 7: Securing Your Accounts 117Chapter 8: Passwords 135Chapter 9: Preventing Social Engineering Attacks 151Part 4: Cybersecurity for Businesses, Organizations, and Government 173Chapter 10: Securing Your Small Business 175Chapter 11: Cybersecurity and Big Businesses 201Part 5: Handling a Security Incident (This Is a When, Not an If) 217Chapter 12: Identifying a Security Breach 219Chapter 13: Recovering from a Security Breach 239Part 6: Backing Up and Recovery 259Chapter 14: Backing Up 261Chapter 15: Resetting Your Device 289Chapter 16: Restoring from Backups 299Part 7: Looking toward the Future 321Chapter 17: Pursuing a Cybersecurity Career 323Chapter 18: Emerging Technologies Bring New Threats 337Part 8: The Part of Tens 351Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367Index 371
Joseph Steinberg is a master of cybersecurity. He is one of very few people to hold the suite of security certifications including: CISSP(r), ISSAP(r), ISSMP(r), and CSSLP(r). Joseph has written several books on cybersecurity, including the previous edition of Cybersecurity For Dummies. He is currently a consultant on information security, and serves as an expert witness in related matters.