Cybersecurity: The Ultimate Beginners Guide to Learn and Understand Cybersecurity Measures Effectively

Narrated by: William Bahl
Length: 1 hr and 26 mins
4.4 out of 5 stars (43 ratings)

Audible Premium Plus

$14.95 a month

1 audiobook of your choice.
Stream or download thousands of included titles.
$14.95 a month after 30 days. Cancel anytime.
Buy for $6.95

Buy for $6.95

Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.

Publisher's Summary

Each week it seems that some major corporation or another is having serious issues thanks to the leaks of some malicious hacker. Hearing stories like this can make it seem difficult, if not impossible, for individuals and smaller organizations to ensure their own cybersecurity to keep their own information private; after all, if the big guys can’t manage, then it can be hard to see the point. This defeatist attitude is just what the criminals want. However, the truth of the matter is there is plenty you can do to improve your cybersecurity, right now. If you like the sound of that, then The Ultimate Beginners Guide to Learn and Understand Cybersecurity Measures Effectively is the book you have been waiting for.  

While everyone knows that they need to exhibit some level of caution when interacting with the Online world, with the bounds of technology changing all the time, this can be easier said than done. Luckily, this is where this book comes in to discuss the types of cybersecurity you should care about and how to put them to use for you in a way that is proven to be effective in both the short and the long-term. So, what are you waiting for? Take control of your technological future and buy this book today.  

Inside you will find:

  • Easy ways to identify potential security threats at a glance
  • Top cyber threats and how to stop them in their tracks
  • Ways to put the world’s crippling shortage of cybersecurity professional to work for you
  • Tips for ensuring your personal cybersecurity is up to snuff
  • Special considerations to keep in mind when keeping your smart devices secure
  • And more
©2018 Zach Webber (P)2018 Zapata Publishing

What listeners say about Cybersecurity: The Ultimate Beginners Guide to Learn and Understand Cybersecurity Measures Effectively

Average Customer Ratings
Overall
  • 4.5 out of 5 stars
  • 5 Stars
    30
  • 4 Stars
    4
  • 3 Stars
    6
  • 2 Stars
    2
  • 1 Stars
    1
Performance
  • 4.5 out of 5 stars
  • 5 Stars
    31
  • 4 Stars
    5
  • 3 Stars
    2
  • 2 Stars
    1
  • 1 Stars
    3
Story
  • 4.5 out of 5 stars
  • 5 Stars
    31
  • 4 Stars
    4
  • 3 Stars
    1
  • 2 Stars
    5
  • 1 Stars
    1

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Statistics brings a lot of value

In September 2014, Home Depot announced that it was hacked, probably during the spring of that year; this hack led to the theft of the credit card information of 56 million customers. The hack began when malware masquerading as antivirus software infected the POS systems of the company's stores. The company had to pay nearly twenty million dollars in damages and identity theft protection services to those whose information had been compromised. In February 2015, the largest security breach in healthcare history occurred when a group of cyber criminals, allegedly sponsored by a foreign government, hacked into the Anthem Health Insurance website. The attack led to millions of names, addresses, dates of birth, and the personal health information of individuals insured by Anthem to become compromised. The breach began when an Anthem employee opened up a phishing email; that one email led to well over one hundred million dollars in damages. In the fall of 2016, while Yahoo was in negotiations to sell itself to the company Verizon, it disclosed that back in 2014, it had been hacked. 500 million email addresses, real names, dates of birth, and other sensitive information that can lead to identity theft had all been hacked. In the early winter of 2016, it disclosed that it had also been similarly hacked back in 2013. This security breach led to compromising the information of one billion users. Yahoo lost $350 million in its sell price to Verizon, as well as its good name. The above information isn't intended to scare you. It's intended to sober you into understanding the importance of cybersecurity and protecting yourself online. You may be thinking that these are major companies, so of course, they will be targeted by hackers. But consider this: companies like Yahoo and Target spend millions and millions of dollars every year in cybersecurity yet were still susceptible to security breaches by hackers.

24 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Process Driven Approach to Day Trading

A stock market index refers to a collection of stocks which are combined together to create a bellwether for a group of similar companies in the market. The idea is to present an index which tracks a certain sector, market, currency, commodity, bond, or other type of financial asset. Stocks which are collected in such an index are put into a so-called basket. An example of this is easy to understand. A person who wished to invest in the DJIA Dow Jones Industrial Average index would buy into the shares of the index basket that represented the 30 component companies. This means that the investor would then own 30 different companies’ stock shares. The idea behind indices is that they track the underlying assets or market. The XAU Gold and Precious Metals Index is comprised of those companies which mine precious metals including gold. Purchasing shares in this index means that an investor has the benefit of exposure to the entire gold mining sector. They achieve this without having to acquire shares in all of the gold mining firms of the globe. It is accomplished because shares in XAU represent all of the gold mining shares in the form of the entire industry. These indices were fashioned to imitate particular markets. This does not mean they will ever be accurate all of the time nor even 100 percent at any given point. This is because there are a wide range of factors that can change the market course which indices will not always capture with perfection immediately.

21 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Xcellent Advice From the Expert

Webber and Bahl are two of the great thought leaders in the cybersecurity landscape. The research and combined years of experience that has gone into this book really shows through and the reader will gain immediate benefit from every chapter. If you are new to the security field, and want to learn more than just the tools, this book will provide you with the understanding required to define strategies, implement procedures, and refine the tools you have to make a bigger impact in the security posture of your organization. If you are an experience security expert, there is plenty more to learn. I recommend this audio book to my own teams to ensure they keep testing their own knowledge and improve at every opportunity.

19 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Embrace the uncertainty and change the game

It is also important to ensure that your flow paths for communications are not only well defined but authorized or documented as well. From there, you will want to strive to increase awareness of systems that can be utilized as a gateway to laterally pivot as needed or directly connect to relevant endpoints found anywhere throughout the enterprise. Whatever you do, it is important to do what you can to ensure that these systems are maintained within these restrictive VLANs with appropriate network access control and segmentation as needed. When it comes to ensuring the right amount of control over who has access to what, it is important that enterprise systems that can interface with numerous endpoints directly all require dual-factor authentication for any interactive logins. Further, it is important to make sure that authorized users are limited to a specific subset of the organization’s personnel. Whatever you do, it is important that the default user group doesn’t have the ability to authenticate or access these systems directly. You will also need to ensure that unique domain accounts are documented and utilized for every service that involves and enterprise application. The context in which these permissions are assigned to various accounts should always be fully documented and also configured in such a way that the greatest number of users have the fewest number of privileges possible. Doing so provides the enterprise the ability to track and monitor actions that are taken based on assigned service accounts.

15 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Can we be more secure? YES! Thanks you Zach !!!

While cybersecurity has managed to cobble together a handful of codified rules and processes in the years since the internet went mainstream, compared to many industries this field is still relatively light on clear career paths. Information security has grown into a unique career specialization as an off-shoot from general information technology which means it is common for many people to get their start there, but it is far from required. While this means you can’t find a readily available career path and stick to it with blind faith, it does often create a system that favors merit over experience which means that those who want to enter the field from more arcane angles are welcome as well. It doesn’t matter if you are looking to land your first job in the industry or work your way up the chain of command, a proactive mindset is key in this environment. This isn’t the type of position where you can sit back on cruise control and expect benefits to come your way, you need to seek out problems to solve if you hope to be known for solving problems and need to work on your own to earn additional industry certifications to show that you are qualified to take on more advanced rolls in the company. Great choices to start with include the Certified Information Systems Security Professional and the CompTIA Security+ certification. Beyond certifications, it is important to go out of your way to get all the experience you can as only by coming up against threats that you haven’t seen before will you be able to learn how to combat them effectively. If you cannot find paying opportunities to do so, this could include taking on volunteer positions, just to get your feet in the door. Organizations such as the Information Systems Security Association are always looking for volunteers and can also help to put you in touch with companies that may have paying work further down the line.

13 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Comprehensive, doable, effective computer security

While it was once possible to expect to purchase a piece of software that was completed at the time of sale, this is no longer the case and new updates and patches for software are released all the time. While it can be time consuming reading through patch notes for the various programs you use, you are going to want to do so to ensure you don’t accidentally miss any that relate to crucial security updates in the process. It is especially important that you manually go to the websites of all of the product’s you are keeping that were preinstalled on your machine and ensure you are using the most up to date version of the software possible. When it comes to ensuring your operating system itself is properly updated, it is important that you turn on the auto-update functionality often found under the security options. Generally speaking, you are going to want to have three levels of passwords, basic, medium and extremely secure. Basic passwords can be used for accounts that you don’t care about and that don’t require any of your private data. Medium passwords can be used for things that have access to your private data, but not information that could be used to steal your identity or your financial data. Finally, extremely secure passwords should all be one-offs and should be used for the most secure of all your data.

11 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Important to Know

The United States Government employees a fair portion of the contractor cybersecurity force in the country today. As such, that means if you want to ensure you are qualified for as many different positions as possible you will need to ensure that you are able to obtain security clearance for the type of work that can easily require access to secure information. Unfortunately, this can mean sticking to a fairly strict personal lifestyle as well. Depending on your level of security clearance, you may need to report when and where they travel, what their current debts might be and possibly even who they speak with. Failing to monitor such interactions, and a host of others could ultimately put your clearance in jeopardy. It is also a significant amount of work to obtain a higher security clearance, so it is up to you if access to many higherpaying jobs is worth the hassle. Every time a particularly high-profile cybersecurity attack makes the news, the demand for cybersecurity professionals grows a little more. In fact, according to the Bureau of Labor Statistics, cybersecurity jobs are estimated to increase in demand by about 20 percent each year through at least 2025. That’s more than 10 percent higher the average estimate of 7 percent per year for most occupations.

7 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

New addition to my cybersecurity canon

It starts by describing cybersecurity and its various types and what they could mean to you. Next, you will learn about a variety of different cyber threats and proposes ways to protect yourself and/or your business from them in both the short and the long-term. It also describes careers in this growing and vital field, including engineer and analyst, among others. You will then learn all about how to maximize your personal cybersecurity to the fullest before learning about additional cybersecurity practices and means of protection to try. When it comes to the importance of ensuring the cybersecurity of your portable devices, only you can accurately determine what’s at risk besides the machine itself. However, with most portable devices these days, if the thief is able to access the information that is stored within it successfully, a lot more than the data directly on the device itself is at risk. You have likely heard stories about the uproar caused when a senior manager for one major corporation or another leaves a laptop or a smartphone somewhere they shouldn’t. Confidential information of this type can cause untold damage to a company, especially if it has something to hide. Even if your devices don’t have serious secrets hidden within, there is still enough on the average smart device to make your life very difficult if the wrong person gained access to it. Keep the following in mind when it comes to keeping your data private on the go.

4 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Building a foundation for security

As a law firm administrator, this book has been my go-to for understanding my firm's exposure, the risks, and my options. I use it as a guide for talking with my vendors and my staff. Invaluable!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

One of the Great Books of this era

Online predators of all types represent another significant threat children as they have not yet built up a thick outer layer of distrust when it comes to online interactions it is easy for those with malicious intent to misrepresent themselves for the purposes of tricking children. Don’t forget, many adults still fall for these types of phishing scams which means it is downright unrealistic to not expect the same thing to happen to children. Luckily, if you keep the following in mind you will find that there is plenty you can do to help ensure your children stay safe online.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Ruth Hudson
  • Ruth Hudson
  • 06-01-20

Remarkable book for everyone

This book is a solid guide to understanding what it takes to get a job in information security. If you’re a recent grad looking to get into the field, or a veteran of another industry, you’ll learn the history, the lingo, and the mindset you need to break into information security. The author breaks down that you don’t even have to be technical to get a job in information security - strong analytical skills and an appreciation of process are more valuable than being a programmer or having a network engineering background. It was an enjoyable and informative read.

24 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Efren Bright
  • Efren Bright
  • 06-03-20

If you own an electronic device, please

With smart devices so ubiquitous, it can be easy to be flippant about them when you are out and about, especially if you are busy or otherwise in a hurry. Regardless of the personal cost of the device in question, it is important to not just think about the physical value if the device was lost but the value of the time wasted in changing literally every password and credit/debit card you own. Furthermore, think about the potential value of keeping your identity secure and act accordingly. Likewise, you should make a habit of keeping an eye on your surroundings when using your device, which will likely be easier said than done. Nevertheless, you should try and pay attention to those around you, including anyone who may be trying to look over your shoulder for a peek at your sweet, sweet data. Generally speaking, if you don’t need your device at the moment, it is best to keep it hidden away from prying eyes, just to be safe. If you are using a company laptop, you may even want to consider a third-party alarm that can be set to ensure that anyone who tries to access the computer without your permission is in for a rude awakening. Regardless of how important your information is, it is important to have at least one backup of all your data stored in a secure location or, more likely, the cloud. This way you will be able to ensure you are able to get back to where you were as quickly as possible, you will also know exactly what information is now at risk, allowing you to take additional precautions as needed. The first thing you are going to want to do is report the theft to the proper authorities as they may have procedures in place that you might not be aware of for this sort of thing. It is also important to cancel any mobile data service that is on the device as quickly as possible to delay the culprit as much as possible and give yourself time to change all of the relevant passwords in the interim.

23 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Joseph Lawson
  • Joseph Lawson
  • 06-04-20

A convincing argument for quantitative methods

Along with cutting down on inessential programs, turning off default features you know you won’t be using is a great way to limit potential attack vectors. As such, all you need to do is to is review the features that come with the operating system and customizing those you will be using with as much security as possible while at the same time turning off those you don’t plan on using, after all, you can always turn them back on again later. If you plan on modifying features or services, it is important to research them fully beforehand to prevent damaging the functionality of your system in a way that is difficult to easily fix. The principal of least privilege refers to the fact that if malware infects a specific user on a computer, it is then limited in the damage it can do based on the privileges that user has access to. As such, a good way to limit the potential threats that you are at risk from is to user a specially created user account that has very limited access for daily user, as well as a secondary full-access account that you only use as needed. The web browser that comes installed on your new computer is unlikely to have its security settings turned up to the maximum which means you will need to do so, or download a better browser, as soon as you get online for the first time. This is as easy as locating the security settings of your chosen browser and then turning them up to high and there is no excuse for not taking this simple, yet effective, step.

19 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Trumble
  • Trumble
  • 06-05-20

Don’t be the next victim

Cybersecurity defends computers, programs and data against hard drive crashes, hackers, viruses, direct attacks and other situations that interrupt or destroy the flow of computer work and safety. Companies, organizations and government agencies receive and process volumes of confidential information, then store and transmit that data to other computers. Ever-increasing cyber-attacks at even the highest levels (The Pentagon, e.g.) demonstrate the need for the development of cybersecurity plans to ensure business flow, protect personal confidentiality and safeguard national security. Basic measures of protection include maintaining strong authentication practices (passwords, etc.) and not storing sensitive data where it is openly accessible, but a strong cybersecurity plan must also take into account that the digital world expands continually. The cloud, the use of personal devices at work, the growing internet of things (IoT, the inter-connection of home appliances, autos, digital devices, power plants and more)—all of these have created a need to keep up with progress, or even stay a step ahead of it.

18 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Nicole  Dunigan
  • Nicole Dunigan
  • 06-07-20

The book is a must read for everyone using social

While social media makes taking this fact seriously difficult, it is important to ensure that you are comfortable with anyone in the world seeing what you post online. This means more than avoiding posting photos that could be embarrassing ten years down the road, however, it also means avoiding posting pictures that contain information that could be reverse engineered to create details that could let someone access your various accounts without your knowledge. While this might sound easy, consider the last time you went to a hometown football game, odds are that it was your high school, with that, your name and email address, a hacker could be well on their way to gaining access to a site that you secured with a verification question about your high school. The same goes for family, pets, the list goes on and on. Watch what you let others know about yourself: It used to be possible to find a person’s name and contact information, and little else. These days, however, companies are interested in learning as much about you as possible, which means that those who are looking to steal your information have a whole wealth of additional options to choose from. When deciding what information to share with the outside world, keep in mind that the more you put your email address out there, the more spam email you will receive as a result. Likewise, providing details about things like your friends, family, past, job, hobbies, etc. will give those looking to do you wrong additional options when it comes to performing social engineering attacks on you. Don’t forget, anything that you post online is going to be available, in some shape or form, for the foreseeable future. Use some discretion in what you post, after all, you can always post it later.

14 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Taylor John
  • Taylor John
  • 06-08-20

The need for greater computer security awareness!

Computers are an important part of everyday life, but they can also lead to a wide variety of headaches if you don’t take the time to secure them properly, and this starts before you even connect a new computer to the internet. What follows are a number of suggestions to help secure your computer; it is important to keep in mind, however, that while they will help to minimize your risk, they won’t serve to remove it completely, so you will still need to practice safe internet usage for the best results. When you connect your computer to the internet, you are also connecting it to every other internet-enabled computer out there which makes it possible for attackers to access your computer as well. Information flows into your home network from the Internet, starting with your modem, moving to your router and then reaching your computer directly. While the average internet service provider can provide some level of security, it is crucial to ensure that your router is properly secured before you connect to the internet for the first time from a new computer. A firewall is a useful precautionary measure that serves to control the flow of information that moves between your computer and the internet, in much the same way as a router does. Regardless of what operating system you are using, you will find that it includes a firewall built in and you should be sure to set it up to full strength, including a quality password, before you connect to the internet for the first time.While this will likely require you to go online, if you can’t trust the purveyor of malware software to run a clean site, then you probably shouldn’t be dealing with their software in the first place. Many types of antispyware and antivirus software can detect the presence of malware on your system by looking for known files or patterns of memory usage active on your computer. The vendors then provide updated virus signatures to look for in order to ensure that your system stays protected against future threats as well. What’s more, many of these programs offer automatic timers that set them to run on a regular basis and ensure they are updated as well to ensure that your cybersecurity needs are as automated as possible.

12 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Kieran Chandler
  • Kieran Chandler
  • 06-09-20

Easy read on a complex set of topics.

While interacting with the internet can seem more freeing than dealing with other people directly, it is important to keep in mind that, these days, that sense of anonymity is largely an illusion. The truth of the matter is that you are rarely truly alone when you are online, which means that it can be extremely easy for others to gain access to your personal information whether you want them to or not. This is unfortunate as, while most people would be unwilling to give up personal details to a random stranger on the street, the proliferation of social media options available at the click of a button means that these same people don’t think twice about posting those same details online. While they may not be giving out all of their personal information directly, a determined thief can do a lot with a steady stream of Instagram photos and a Facebook timeline. For these reasons and more, it is important to keep the following in mind when putting details of yourself online. Financial regulators, investment banks and commercial banks attract cybercriminals who see an avenue to market manipulation and illegal gains. Any website than enables transfer of funds or buying goods is also a target, as are ATMs, which are frequently hacked for customer data and PINs.

7 people found this helpful

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Amelia
  • Amelia
  • 06-11-20

A must read for all Cybersecurity practitioners!!

"Cybersecurity: The Ultimate Beginners Guide to Learn and Understand Cybersecurity Measures Effectively," covers some of the more recent trends in threats and cyber defense. There's great information included such as Top cyber threats and how to stop them in their tracks, Cloud Security, identifying different types of cyberattacks, Ways to put the world’s crippling shortage of cybersecurity professional to work for you, Tips for ensuring your personal cybersecurity is up to snuff, Special considerations to keep in mind when keeping your smart devices secure and so much more. Cybersecurity specialists can use this book as a manual to improve the security posture of their own organization as there are some excellent methods explained by two highly qualified experts in the field. Easily a five star read!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Richard
  • Richard
  • 06-11-20

A Must Read for Our Digital Age!

This book details is really amazing. After reading this book i am really so impressed. I would must recommended for this book to anyone. Overall, specially thanks to author.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Charles
  • Charles
  • 06-11-20

IT security

Cybersecurity is an issue for everyone in the digital age. This book is written for the 99.8% of people who are NOT in the IT/Cybersecurity world. It is written with real-world examples of actual cybercrime victims and provides simple common sense solutions that anyone can employ in their daily use of technology. The recommendations in this book will keep you, your family, and your business safe from diverse cyber threats that face us all. Read it and get copies for those you care about.