Introduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371
ntroduction 1
Part 1: Getting Started with Cybersecurity 5
Chapter 1: What Exactly Is Cybersecurity? 7
Chapter 2: Getting to Know Common Cyberattacks 23
Chapter 3: The Bad Guys You Must Defend Against 49
Part 2: Improving Your Own Personal Security 69
Chapter 4: Evaluating Your Current Cybersecurity Posture 71
Chapter 5: Enhancing Physical Security 93
Chapter 6: Cybersecurity Considerations When Working from Home 105
Part 3: Protecting Yourself from Yourself 115
Chapter 7: Securing Your Accounts 117
Chapter 8: Passwords 135
Chapter 9: Preventing Social Engineering Attacks 151
Part 4: Cybersecurity for Businesses, Organizations, and Government 173
Chapter 10: Securing Your Small Business 175
Chapter 11: Cybersecurity and Big Businesses 201
Part 5: Handling a Security Incident (This Is a When, Not an If) 217
Chapter 12: Identifying a Security Breach 219
Chapter 13: Recovering from a Security Breach 239
Part 6: Backing Up and Recovery 259
Chapter 14: Backing Up 261
Chapter 15: Resetting Your Device 289
Chapter 16: Restoring from Backups 299
Part 7: Looking toward the Future 321
Chapter 17: Pursuing a Cybersecurity Career 323
Chapter 18: Emerging Technologies Bring New Threats 337
Part 8: The Part of Tens 351
Chapter 19: Ten Ways to Improve Your Cybersecurity without Spending a Fortune 353
Chapter 20: Ten (or So) Lessons from Major Cybersecurity Breaches 359
Chapter 21: Ten Ways to Safely Use Public Wi-Fi 367
Index 371