7 Part 3: Protecting Yourself from Yourself Chapter 7: Securing Your Accounts Realizing You’re a Target Securing Your External Accounts Securing Data Associated with User Accounts Securing Data with Parties You’ve Interacted With Securing Data at Parties You Haven’t Interacted With Securing Data by Not Connecting Hardware with Unknown Pedigrees Chapter 8: Passwords Passwords: The Primary Form of Authentication Avoiding Simplistic Passwords Password Considerations Creating Memorable, Strong Passwords Knowing When to Change Passwords Changing Passwords after a Breach Providing Passwords to Humans Storing Passwords Transmitting Passwords Discovering Alternatives to Passwords Chapter 9: Preventing Social Engineering Attacks Don’t Trust Technology More than You Would People Types of Social Engineering Attacks Six Principles Social Engineers Exploit Don’t Overshare on Social Media Leaking Data by Sharing Information as Part of Viral Trends Identifying Fake Social Media Connections Using Bogus Information Using Security Software General Cyberhygiene Can Help Prevent Social Engineering
8 Part 4: Cybersecurity for Businesses, Organizations, and Government Chapter 10: Securing Your Small Business Making Sure Someone Is In Charge Watching Out for Employees Dealing with a Remote Workforce Considering Cybersecurity Insurance Complying with Regulations and Compliance Handling Internet Access Managing Power Issues Chapter 11: Cybersecurity and Big Businesses Utilizing Technological Complexity Managing Custom Systems Continuity Planning and Disaster Recovery Looking at Regulations Deeper Pockets — and Insured Considering Employees, Consultants, and Partners Looking at the Chief Information Security Officer’s Role
9
Part 5: Handling a Security Incident (This Is a When, Not an If)
Chapter 12: Identifying a Security Breach