The Personal Cybersecurity Manual
Marlon Buchanan
Cybercriminals can ruin your life—this book teaches you to stop them before they can.
Cybercrime is on the rise. Our information is more valuable and vulnerable than ever. It’s important to learn to protect ourselves from those who wish to exploit the technology we rely on daily. Cybercriminals want to steal your money and identity and spy on you.
You don’t have to give up on the convenience of having an online life. You can fight back and protect yourself and your loved ones, all with the tools and information in this book.
This book will teach you to protect yourself from:
…And so much more!
Don’t be a victim of cybercrime. Anyone can follow the information in this book and keep hackers and other cybercriminals at bay. You owe it to yourself to read this book and stay safe.
Duration - 4h 21m.
Author - Marlon Buchanan.
Narrator - Helpful Matthew.
Published Date - Sunday, 22 January 2023.
Copyright - © 2022 Marlon Buchanan ©.
Location:
United States
Networks:
Marlon Buchanan
Helpful Matthew
Home Technology Manuals
HomeTechHacker
English Audiobooks
Findaway Audiobooks
Description:
Cybercriminals can ruin your life—this book teaches you to stop them before they can. Cybercrime is on the rise. Our information is more valuable and vulnerable than ever. It’s important to learn to protect ourselves from those who wish to exploit the technology we rely on daily. Cybercriminals want to steal your money and identity and spy on you. You don’t have to give up on the convenience of having an online life. You can fight back and protect yourself and your loved ones, all with the tools and information in this book. This book will teach you to protect yourself from: …And so much more! Don’t be a victim of cybercrime. Anyone can follow the information in this book and keep hackers and other cybercriminals at bay. You owe it to yourself to read this book and stay safe. Duration - 4h 21m. Author - Marlon Buchanan. Narrator - Helpful Matthew. Published Date - Sunday, 22 January 2023. Copyright - © 2022 Marlon Buchanan ©.
Language:
English
Opening Credits
Duration:00:00:29
Preface
Duration:00:02:57
About This Book
Duration:00:05:31
Part 1: Intro To Cybersecurity
Duration:00:00:09
What Is Cybersecurity?
Duration:00:03:20
Why Is Cybersecurity Important?
Duration:00:02:09
Why Cyberattacks Are on the Rise
Duration:00:02:26
What Are the Different Types of Cyberattacks?
Duration:00:12:19
Why Do Hackers Hack?
Duration:00:03:10
How Do Cybercriminals Monetize Their Attacks?
Duration:00:31:43
Part 2: Best Practices for Safeguarding Your Privacy and Protecting Yourself from Cyberattacks and Data Breaches
Duration:00:00:14
Can Protecting Yourself Really Make a Difference?
Duration:00:01:46
Use Unique Strong Passwords for Everything
Duration:00:01:34
Know When to Change Your Passwords
Duration:00:02:17
Use Multi-factor Authentication
Duration:00:09:24
Social Media Cybersecurity Best Practices
Duration:00:16:16
Limit How Much You Are Tracked on the Internet
Duration:00:04:52
How to Protect Yourself from Phishing and Other Social Engineering Attacks
Duration:00:10:32
Take Extra Precautions on Public Wi-Fi
Duration:00:11:49
Protecting Your Smartphone
Duration:00:03:31
The Best Ways to Protect Your Bank and Credit Card Information When Paying for Items
Duration:00:21:11
What to Do If You Suspect You’re the Victim of Fraud
Duration:00:13:14
Part 3: Protecting Your Home Network
Duration:00:00:09
The Importance of Protecting Your Home Network
Duration:00:02:17
Basic Network Security Tasks
Duration:00:06:06
Intermediate Network Security Tasks
Duration:00:08:52
Advanced Network Security Tasks
Duration:00:07:14
Have a Disaster Recovery Plan
Duration:00:07:27
How to Perform a Security Audit on Your Home Network
Duration:00:02:48
Remotely Connecting to Your Home Network Securely
Duration:00:05:11
Part 4: Special Considerations for Older People and Children
Duration:00:00:49
Why Cybercriminals Target Older People
Duration:00:01:47
How Cybercriminals Target Older People
Duration:00:02:27
How to Protect Older Adults
Duration:00:03:08
Why and How Cybercriminals Target Children
Duration:00:01:36
How to Protect Children
Duration:00:04:06
Part 5: The Future of Cybersecurity
Duration:00:08:06
Appendix A – Checklists
Duration:00:05:34
Appendix B – How to Set Recommended Facebook, Instagram, and Browser Privacy Settings
Duration:00:08:36
Appendix C – Additional Resources
Duration:00:04:13
Glossary
Duration:00:17:25
About the Author
Duration:00:01:25
What Did You Think of The Personal Cybersecurity Manual?
Duration:00:01:04
Ending Credits
Duration:00:00:32