In nontechnical language and engaging style, 10 Don'ts on Your
Digital Devices explains to non-techie users of PCs and handheld
devices exactly what to do and what not to do to protect their
digital data from security and privacy threats at home, at work,
and on the road. These include chronic threats such as malware and
phishing attacks and emerging threats that exploit cloud-based
storage and mobile apps. It's a wonderful thing to be able to use
any of your cloud-synced assortment of desktop, portable, mobile,
and wearable computing devices to work from home, shop at work, pay
in a store, do your banking from a coffee shop, submit your tax
returns from the airport, or post your selfies from the Oscars. But
with this new world of connectivity and convenience comes a host of
new perils for the lazy, the greedy, the unwary, and the ignorant.
The 10 Don'ts can't do much for the lazy and the greedy, but they
can save the unwary and the ignorant a world of trouble. 10 Don'ts
employs personal anecdotes and major news stories to illustrate
what can-and all too often does-happen when users are careless with
their devices and data. Each chapter describes a common type of
blunder (one of the 10 Don'ts), reveals how it opens a particular
port of entry to predatory incursions and privacy invasions, and
details all the unpleasant consequences that may come from doing a
Don't. The chapter then shows you how to diagnose and fix the
resulting problems, how to undo or mitigate their costs, and how to
protect against repetitions with specific software defenses and
behavioral changes. Through ten vignettes told in accessible
language and illustrated with helpful screenshots, 10 Don'ts
teaches non-technical readers ten key lessons for protecting your
digital security and privacy with the same care you reflexively
give to your physical security and privacy, so that you don't get
phished, give up your password, get lost in the cloud, look for a
free lunch, do secure things from insecure places, let the snoops
in, be careless when going mobile, use dinosaurs, or forget the
physical-in short, so that you don't trust anyone over...anything.
Non-techie readers are not unsophisticated readers. They spend much
of their waking lives on their devices and are bombarded with and
alarmed by news stories of unimaginably huge data breaches,
unimaginably sophisticated "advanced persistent threat" activities
by criminal organizations and hostile nation-states, and
unimaginably intrusive clandestine mass electronic surveillance and
data mining sweeps by corporations, data brokers, and the various
intelligence and law enforcement arms of our own governments. The
authors lift the veil on these shadowy realms, show how the little
guy is affected, and what individuals can do to shield themselves
from big predators and snoops.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!