Internet Security Fundamentals - 10th Anniversary Edition
Level: Beginner to Intermediate - eBook (updated quarterly - current edition July 2024)
Author: nick ioannou
Antivirus software is now incredibly advanced, yet every day thousands of people fall for email phishing scams and are tricked into installing malware, the same way that a sophisticated alarm system and door security is not much use if you open the door to let a criminal in.
With 49 chapters split into 'Stuff you need to know' and 'Things you need to do', this illustrated 226 page eBook, with over 150+ images of real scams and attacks, explains why you cannot just rely on technology, due to the various tricks used by cyber criminals. It is an easy to understand guide of the most commonly faced security threats any user is likely to come across via email, social media and online shopping. Because now, one wrong click can cost you a lot of money and inconvenience.
Also includes free updates with new content as the threats evolve. Please note, this book is aimed at everyday users, it is not aimed at people studying professional security certifications like CISSP.
Volume Licensing available for up to 100 copies from £0.40 a copy
Reviews
'Unlike similar books, the author has ensured that Internet Security Fundamentals provides the reader with statistics drawn from recently released publications and reports, which greatly reflects the current situation that users are facing.'
Infosecurity Magazine
www.infosecurity-magazine.com/reviews/review-internet-security/
'a very useful, comprehensive, informative eBook. It's especially useful for a typical computer user who has limited knowledge of what can and will go wrong on the internet'
ScamSearch
'found it very comprehensive and accurate'
Peter Wood
CEO @ First Base Technologies LLP
'well written with great real-time examples and gives the user concrete actions what to do and not to do'
Michael
Consultant @ Arclight
Free editions are for individuals only
Volume Licensing available for up to 100 copies from £0.40 a copy
Grow and Evolve Your Business
Editor: Jonathan Reuvid
Author: Chapter 2.2 Countermeasures to Advanced Threats - nick ioannou
As 2022 progresses, the legacy of the pandemic coupled with the after-effects of Brexit have compounded business leaders' problems. Any 'new normal' is not yet within our grasp. Established businesses, start-ups or early-stage companies will need resilience and flexibility.
In Grow and Evolve Your Business contributors look at these problems from two directions. Part One focuses on the development of entrepreneurial skills and tools for growth generation and includes a dissertation on the severe risks to cybersecurity daily afflicting all growing businesses.
Part Two reminds us of management fundamentals and the threats that can trip us up and ambush corporate growth. New business owners and managers need to take this advice on board and managers of established businesses are invited to take the time to revisit current practice. The book offers directions through which companies can ‘build back better.’.
Copyright (c) 2022 UBP Open Books
(University of Buckingham Press)
Be Cyber Secure: Tales, Tools and Threats
Editor: Jonathan Reuvid
Author: Chapters 1.5 and 4.1 - nick ioannou
This important edition focuses on the human factor in training, cautionary tales of breaches that occurred through human error, while also identifying storytelling as an effective tool in cyber education.
PART ONE: Cybersecurity in the Information Age
PART TWO: Addressing the Management Issues
PART THREE: General Data Protection Regulation
PART FOUR: Innovative Tools for Cyber Threat Response
PART FIVE: Cautionary Tales from the Frontline
Copyright (c) 2022 UBP Open Books
(University of Buckingham Press)
A Practical Guide to Cyber Security for Small Businesses
Level: Beginner to Intermediate - eBook (2023 - 3rd edition)
Author: nick ioannou
Cybercrime is a massive 21st century problem and small businesses face a huge hurdle to effectively protect themselves and their customers, compared to larger firms. Budgets are tight and not fully understanding the risks means that gaps can easily be left. This practical guide acts like a pocket cyber security consultant, helping you build a layered cyber security strategy using a mixture of free and paid for services. Just because you are a small business, it doesn’t mean you need to be a victim of cybercrime.
Also you can watch the free 19 minute companion video to this book at: https://youtu.be/sR2TAUvnJ28
Available as a Kindle eBook, PDF, paperback and audiobook.
Reviews
'A trove of tips and tricks for securing a small firm on a budget'
Computing
Conquer the Web: The Ultimate Cybersecurity Guide
Level: Beginner to Intermediate - Paperback or eBook (2018)
Authors: tim mitchell, maureen kendal, nick ioannou, nick wilding
Edited by Jonathon Reuvid
This is the ultimate guide to protect your data on the web. From passwords to opening emails, everyone knows what they should do but do you do it?
Tons of malicious content floods the internet which can compromise your system and your device, be it your laptop, tablet or phone. How often do you make payments online? How often do you sit at a coffee shop and log onto their free WIFI? How often do you use social media on the train or bus? If you believe using an antivirus software will keep you safe . . . you are wrong.
This book will guide you and provide solutions to avoid common mistakes and to combat cyber attacks, covering areas such as: Building resilience into our IT Lifestyle, Online Identity, Cyber Abuse: Scenarios and Stories, Protecting Devices, Download and share, Gaming, gamble and travel, Copycat websites, Banking, apps and Passwords.
Reviews
'Overall, Conquer The Web - The Ultimate Cybersecurity Guide provides excellent advice throughout its chapters that anyone can follow and easily put into place.'
Infosecurity Magazine
www.infosecurity-magazine.com/reviews/review-conquer-web-guide/
Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career
Author: Jessica Barker
This jargon-busting guide will give you a clear overview of the world of cyber security. Exploring everything from the human side to the technical and physical implications, this book takes you through the fundamentals: how to keep secrets safe, how to stop people being manipulated and how to protect people, businesses and countries from those who wish to do harm.
Featuring real-world case studies from Disney, the NHS, Taylor Swift and Frank Abagnale, as well as social media influencers and the entertainment and other industries, this book is packed with clear explanations, sound advice and practical exercises to help you understand and apply the principles of cyber security. Let Confident Cyber Security give you that cutting-edge career boost you seek. This book will guide you and provide solutions to avoid common mistakes and to combat cyber attacks, covering areas such as: Building resilience into our IT Lifestyle, Online Identity, Cyber Abuse: Scenarios and Stories, Protecting Devices, Download and share, Gaming, gamble and travel, Copycat websites, Banking, apps and Passwords.
Hacked: The Secrets Behind Cyber Attacks
Author: Jessica Barker
When it comes to cyber attacks, everyone's a potential victim. But you don't have to be helpless against these threats.
Hacked offers the knowledge and strategies you need to protect yourself and your business. In this book, cybersecurity expert Jessica Barker uncovers how hackers are weaponizing cutting-edge tactics and technologies to target individuals and organizations, before showing how you can safeguard yourself against any potential attacks and how to react if you do become a target.
Featuring expert commentary from world-leading cybersecurity experts and ethical hackers, this book uncovers the fascinating stories of the most insidious and notorious cyber attacks.
From social engineering and data theft to ransomware and Distributed Denial-of-Service (DDoS) attacks, there are numerous strategies that hackers use to target our finances and data. Uncover their secrets and learn how to safeguard your data with Hacked.
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global
Author: Geoff White
On 4 May 2000, an email that read 'kindly check the attached LOVELETTER' was sent from the Philippines. Attached was a virus, the Love Bug, and within days it had paralysed banks, broadcasters and businesses across the globe. The outbreak presaged a new era of online mayhem: the age of Crime Dot Com had begun.
Investigative journalist Geoff White charts the astonishing development of hacking, from its conception in America's hippy tech community in the 1970s, through its childhood among the ruins of the Eastern Bloc, to its coming of age as the most pervasive threat to our digital world. He takes us inside the workings of real-life cybercrimes, drawing on interviews with those behind the most devastating hacks and revealing how the tactics employed by high-tech crooks are being harnessed by nation states to target voters, cripple power networks and prepare, even, for cyber-war. Crime Dot Com is a thrilling, dizzying and terrifying account of hacking, past and present, and of what the future has in store and how we might protect ourselves from it.
Author: Scott Augenbaum
There are bad people in the world, and they are on the internet. They want to hurt you. They are based all over the world, so they're hard at "work" when even you're sleeping. They use automated programs to probe for weaknesses in your internet security programs. And they never stop. Cybercrime is on the increase internationally, and it's up to you to protect yourself. But how?
The Secret to Cybersecurity is the simple and straightforward plan to keep you, your family, and your business safe. Written by Scott Augenbaum, a 29-year veteran of the FBI who specialized in cybercrimes, it uses real-life examples to educate and inform readers, explaining who/why/how so you'll have a specific takeaway to put into action for your family. Learn about the scams, methods, and ways that cyber criminals operate--and learn how to avoid being the next cyber victim.
HEARD THE ONE ABOUT IDENTITY THEFT?
Author: Bennett Arron
Comedian Bennett Arron was in serious debt. He owed thousands of pounds to phone networks, banks and department stores. Only it wasn’t him. Bennett had become one of Britain's first major victims of Identity Theft. It left him and his pregnant wife penniless and homeless.
Years later Bennett made a documentary on the subject, in which he stole the identity of the Home Secretary. As a result of the programme Bennett was shortlisted for a BAFTA and arrested in a dawn raid by Scotland Yard.
This is a true, disturbing and very funny account of what it's like to have your identity stolen and shows the devastating consequences of proving a point in the public interest.
As an Amazon Associate, I earn from qualifying purchases.