Book Review: ‘Cybersecurity Is Everybody’s Business’

The technology and cybersecurity industries are rapidly evolving before our eyes. Although hacking, data breaches, denial of service attacks, other Internet security incidents and cybercrime are not new, the online world is changing now more than ever as we head toward 2020.

So how can Internet users keep-up with this dizzying pace of change, much less the new terminology, cyberattack scenarios, criminal online tricks and related matters? How can we make sense of cybersecurity trends without confusing people with technical jargon?

In addition, what can be done to protect home networks, small businesses and large enterprises?

As a cybersecurity expert who has dedicated my entire career to understanding our complex technology problems and offering solutions to governments, businesses and home users, I constantly reexamine these questions. I am always looking for new, cutting-edge resources that I can recommend to others.

I also look for true stories and helpful analogies that can bring points home and help readers better understand the stakes involved and their role in protecting their corner of cyberspace. As I said back in 2007 in an interview for on security culture, “helping people understand the impact of their actions, that is our greatest challenge.”

Introducing ‘Cybersecurity Is Everybody’s Business’

Perhaps most important of all, I look for people who I can trust (and recommend to others) as we continue to “navigate the brave new web” as I wrote in my book Virtual Integrity in 2008.

Fast-forward to October 2019, I highly recommend the new book by Scott Schober and Craig Schober titled: “Cybersecurity is Everybody’s Business.” The new book’s subtitle is: “Solve the Security Puzzle for Your Small Business and Home.”

Why do I recommend this book? Put simply, it covers all the most important cybersecurity topics in an easy-to-read (Read more...)

*** This is a Security Bloggers Network syndicated blog from Lohrmann on Cybersecurity authored by Lohrmann on Cybersecurity. Read the original post at: