CYBER 101

  • Alerts
  • Blog
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Subscribe to our newsletter

FOLLOW US

No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Jobs
  • Vendors
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Book

Firewalls Don’t Stop Dragons

Carey Parker

Reading Time: 2 mins read
in Book, Privacy

Book description (from Amazon’s page)

Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people — though even technically savvy readers will find many useful tips here. This book contains everything you need to protect yourself-step by step, without judgment, and with as little jargon as possible.

Protecting your digital domain is much like defending a medieval castle. Wide moats, towering walls and trained guards provide defense in depth, safeguarding the people and property within against the most common threats. But attempting to dragon-proof your castle would be counterproductive and costly. The goal of this book is to keep your devices and data safe from the most likely and impactful hazards – not a targeted attack by the NSA. Like wearing seat belts and sunscreen in the real world, there are dozens of simple, effective precautions we need to take in the virtual world.

Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what you need to do, each chapter includes a detailed checklist of expert tips. But the book also explains why you need to do these things, using entertaining analogies and straightforward explanations. This revised and expanded fifth edition includes:

  • Updated for Windows 11, macOS 13 (Ventura), iOS 16 and Android 13. 
  • Updated recommendations for most secure and private products. 
  • Over 200 tips with complete step-by-step instructions and screenshots. 

What You Will Learn

  • Maximize your computer and smartphone security. 
  • Minimize your vulnerabilities and data footprint. 
  • Solve your password problems and use two-factor authentication. 
  • Browse the web safely and confidently with a secure, private browser. 
  • Shop and bank online with maximum security and peace of mind. 
  • Defend against identity theft, ransomware and online scams. 
  • Safeguard your children online, at home and in school. 
  • Block online tracking, data mining and malicious online ads. 
  • Send files and messages with end-to-end encryption. 
  • Secure your home network and keep your smart devices from spying on you. 
  • Create automated backups of all your devices. 
  • Learn how to deal with account hacks, data. breaches and viruses. 
  • Understand how computers, the internet, VPNs and encryption really work 
  • And much more!

GET BOOK

*Disclaimer: As an Amazon Associate we earn from qualifying purchases.
Tags: BooksCarey ParkerData PrivacyDigital FootprintDigital Footprint BooksFirewalls Don't Stop DragonsPrivacyPrivacy Books
ADVERTISEMENT

Related Posts

Countering Cyber Threats to Financial Institutions

Countering Cyber Threats to Financial Institutions

January 29, 2023
Hands-On Cybersecurity for Finance

Hands-On Cybersecurity for Finance

January 28, 2023
The Essential Cybersecurity Guide for Accounting/Tax Practices and Financial Firms

The Essential Cybersecurity Guide for Accounting/Tax Practices and Financial Firms

January 28, 2023
Cybersecurity and Financial System Resilience Report: Report To Congress

Cybersecurity and Financial System Resilience Report: Report To Congress

January 28, 2023

More Articles

Alerts

IBM security advisory (AV22-370)

July 4, 2022
Alerts

CISA Adds One Known Exploited Vulnerability

July 12, 2022
Alerts

[Control Systems] Fuji Electric Security Advisory

October 26, 2021
Incidents

Mantis Botnet Can Launch More Powerful DDoS Attacks Than Mirai

July 15, 2022
Document

Cyber Threats 2020: A Year in Retrospect

January 20, 2022

Data breach at New York university potentially affects 47,000 citizens

August 16, 2021
Book

Cybersecurity Incident Response

August 10, 2022
Course

Security Event Triage: Statistical Baselining with SIEM

March 17, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.