Nick Ioannou's Amazon Author Page can be found at: https://www.amazon.com/author/nick-ioannou
Internet Security Fundamentals
Level: Beginner to Intermediate - eBook (updated monthly - current edition July 2021)
Author: nick ioannou
Antivirus software is now incredibly advanced, yet every day thousands of people fall for email phishing scams and are tricked into installing malware, the same way that a sophisticated alarm system and door security is not much use if you open the door to let a criminal in.
With 47 chapters split into 'Stuff you need to know' and 'Things you need to do', this illustrated 206 page eBook, with over 150+ images of real scams and attacks, explains why you cannot just rely on technology, due to the various tricks used by cyber criminals. It is an easy to understand guide of the most commonly faced security threats any user is likely to come across via email, social media and online shopping. Because now, one wrong click can cost you a lot of money and inconvenience.
Also includes free monthly updates with new content as the threats evolve. Please note, this book is aimed at everyday users, it is not aimed at people studying professional security certifications like CISSP.
Please note issuhub is the older March 2020 edition
'Unlike similar books, the author has ensured that Internet Security Fundamentals provides the reader with statistics drawn from recently released publications and reports, which greatly reflects the current situation that users are facing.'
'a very useful, comprehensive, informative eBook. It's especially useful for a typical computer user who has limited knowledge of what can and will go wrong on the internet'
'found it very comprehensive and accurate'
CEO @ First Base Technologies LLP
'well written with great real-time examples and gives the user concrete actions what to do and not to do'
Consultant @ Arclight
A Practical Guide to Cyber Security for Small Businesses
Level: Beginner to Intermediate - eBook (2018)
Author: nick ioannou
Cybercrime is a massive 21st century problem and small businesses face a huge hurdle to effectively protect themselves and their customers, compared to larger firms. Budgets are tight and not fully understanding the risks means that gaps can easily be left. This practical guide acts like a pocket cyber security consultant, helping you build a layered cyber security strategy using a mixture of free and paid for services. Just because you are a small business, it doesn’t mean you need to be a victim of cybercrime.
Also you can watch the free 19 minute companion video to this book at: https://youtu.be/sR2TAUvnJ28 and the Cybertalks presentation from the Data Protection World Forum at: https://cybertalks.co.uk/talks/cyber-security-101-a-practical-guide-for-small-businesses/
For the interview about my book: http://bit.ly/CyberTalks-nick-ioannou
Available as a Kindle eBook, PDF, paperback and audiobook.
'A trove of tips and tricks for securing a small firm on a budget'
Conquer the Web: The Ultimate Cybersecurity Guide
Level: Beginner to Intermediate - Paperback or eBook (2018)
Authors: tim mitchell, maureen kendal, nick ioannou, nick wilding
Edited by Jonathon Reuvid
This is the ultimate guide to protect your data on the web. From passwords to opening emails, everyone knows what they should do but do you do it?
Tons of malicious content floods the internet which can compromise your system and your device, be it your laptop, tablet or phone. How often do you make payments online? How often do you sit at a coffee shop and log onto their free WIFI? How often do you use social media on the train or bus? If you believe using an antivirus software will keep you safe . . . you are wrong.
This book will guide you and provide solutions to avoid common mistakes and to combat cyber attacks, covering areas such as: Building resilience into our IT Lifestyle, Online Identity, Cyber Abuse: Scenarios and Stories, Protecting Devices, Download and share, Gaming, gamble and travel, Copycat websites, Banking, apps and Passwords.
'Overall, Conquer The Web - The Ultimate Cybersecurity Guide provides excellent advice throughout its chapters that anyone can follow and easily put into place.'
Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career
Author: Jessica Barker
This jargon-busting guide will give you a clear overview of the world of cyber security. Exploring everything from the human side to the technical and physical implications, this book takes you through the fundamentals: how to keep secrets safe, how to stop people being manipulated and how to protect people, businesses and countries from those who wish to do harm.
Featuring real-world case studies from Disney, the NHS, Taylor Swift and Frank Abagnale, as well as social media influencers and the entertainment and other industries, this book is packed with clear explanations, sound advice and practical exercises to help you understand and apply the principles of cyber security. Let Confident Cyber Security give you that cutting-edge career boost you seek. This book will guide you and provide solutions to avoid common mistakes and to combat cyber attacks, covering areas such as: Building resilience into our IT Lifestyle, Online Identity, Cyber Abuse: Scenarios and Stories, Protecting Devices, Download and share, Gaming, gamble and travel, Copycat websites, Banking, apps and Passwords.
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global
Author: Geoff White
On 4 May 2000, an email that read 'kindly check the attached LOVELETTER' was sent from the Philippines. Attached was a virus, the Love Bug, and within days it had paralysed banks, broadcasters and businesses across the globe. The outbreak presaged a new era of online mayhem: the age of Crime Dot Com had begun.
Investigative journalist Geoff White charts the astonishing development of hacking, from its conception in America's hippy tech community in the 1970s, through its childhood among the ruins of the Eastern Bloc, to its coming of age as the most pervasive threat to our digital world. He takes us inside the workings of real-life cybercrimes, drawing on interviews with those behind the most devastating hacks and revealing how the tactics employed by high-tech crooks are being harnessed by nation states to target voters, cripple power networks and prepare, even, for cyber-war. Crime Dot Com is a thrilling, dizzying and terrifying account of hacking, past and present, and of what the future has in store and how we might protect ourselves from it.
Author: Scott Augenbaum
There are bad people in the world, and they are on the internet. They want to hurt you. They are based all over the world, so they're hard at "work" when even you're sleeping. They use automated programs to probe for weaknesses in your internet security programs. And they never stop. Cybercrime is on the increase internationally, and it's up to you to protect yourself. But how?
The Secret to Cybersecurity is the simple and straightforward plan to keep you, your family, and your business safe. Written by Scott Augenbaum, a 29-year veteran of the FBI who specialized in cybercrimes, it uses real-life examples to educate and inform readers, explaining who/why/how so you'll have a specific takeaway to put into action for your family. Learn about the scams, methods, and ways that cyber criminals operate--and learn how to avoid being the next cyber victim.
HEARD THE ONE ABOUT IDENTITY THEFT?
Author: Bennett Arron
Comedian Bennett Arron was in serious debt. He owed thousands of pounds to phone networks, banks and department stores. Only it wasn’t him. Bennett had become one of Britain's first major victims of Identity Theft. It left him and his pregnant wife penniless and homeless.
Years later Bennett made a documentary on the subject, in which he stole the identity of the Home Secretary. As a result of the programme Bennett was shortlisted for a BAFTA and arrested in a dawn raid by Scotland Yard.
This is a true, disturbing and very funny account of what it's like to have your identity stolen and shows the devastating consequences of proving a point in the public interest.