Scott Schober's small business got hacked, and hacked again. The harrowing experience led him to write a book - "Hacked Again", which could just as easily have been called the Cybersecurity Bible for small business owners.
Schober starts out by explaining the exact details of how his corporate checking account got hacked - which led him to switch banks, only to have his new checking account hacked. He helps cyber novices to understand what a hack is, how to recover from it, and the cybercriminal mentality which motivates the hacks.
Although the book tells a story - it is broken down into chapters that cover one aspect of cybersecurity after the next, which are specific to small businesses. The first thing readers learn about is the hacker's practice of social engineering, the shady art of manipulating others into sharing their personal identities, credit card digits, and other information (or stealing that same information).
Small businesses can be at greater risk for cybercrime because they generally don't employ people who are tasked with protecting them against hackers. The budgets are simply not there to dedicate full-time resources to security. Knowledge is power, and Hacked Again arms readers with a lot of it - including:
- Website invasions - how they happen, and how to protect against them;
- How hackers can compromise Twitter accounts... and what to do about it;
- Spam, phishing, spoofing and other terms demystified and defined;
- Best practices for choosing passwords, and how often to update them;
- The different types of hackers ranging from the garden variety thrill seekers to organized cybercrime gang members;
- What employees should (and shouldn't) know about security;
- The dark web - where hackers hang out and conspire with each other and on their own; and more.
After learning how to protect their small businesses against the most common cyber threats, readers have an opportunity to delve into the big corporate and federal hacks which have been committed against J.P. Morgan Chase, Target, Sony, and the Office of Personnel Management (OPM). Schober breaks it down so that a high-schooler can understand what really happened.
If you are a small business owner, "Hacked Again" belongs on your bookshelf. The next time you read about a bot, brute force or DDoS attack, keylogger, malware, ransomware, Trojan horse, worm, or some other cyber term - you can flip to the glossary at the back of the book for a quick definition.
Download this exclusive report highlighting 25 top security products – as rated by actual enterprise...
Contrast Security has addressed the recent backlash over section A7 of the OWASP Top 10 list for 2017....
A clinic in Baltimore is just one example of a healthcare provider having its records stolen, only to...
Sponsored by AT&T
Setting up and protecting the network infrastructure is a major challenge and needs to be even more...
Web optimization and security firm Cloudflare launched a service that could allow IoT manufacturers to...
Roomba 960 seamlessly navigates room to room to clean an entire level of your home, recharging and...
The Hajime botnet is nearly 300,000 strong, making it a latent threat nearly as powerful as the...