Who should read this book?
Author’s profile
Copyright
Acknowledgments
1.Accounts and Passwords
- 1.1Create good passwords
- 1.2Complex passwords aren’t always better
- 1.3Use dedicated accounts for each user
- 1.4Change the default passwords
2.Online Security
- 2.1Online Protection
- 2.2Harden your Facebook account
- 2.3Enable two-factor authentication
- 2.4Enable two-factor authentication for Google
- 2.5Enable two-factor authentication for Facebook
- 2.6Enable two-factor authentication for Dropbox
- 2.7Enable two-factor authentication for Twitter
- 2.8Enable two-factor authentication for LinkedIn
- 2.9Enable two-factor authentication for Tumblr
- 2.10Improve your browser’s security and privacy in 5 steps
3.Device Security
- 3.1Securing your notebook
- 3.2Update your Software often
- 3.3Password protect your smartphone
- 3.4Make backups
- 3.5Encrypt your data
- 3.6What to do if your computer has a virus
- 3.7Cleaning your computer
- 3.8Goodbye, Windows XP?
4.Tips that you can print
- 4.120 Tips to improve your overall security
- 4.25 signs you’ll notice if your social media account has been hacked
- 4.3How to secure a new computer in 10 steps
- 4.4How to protect your social media account
- 4.510 tips to improve your mobile device’s security
- 4.6Security tips for safe online shopping
- 4.75 tips to keep your mobile devices safe while using 3/4G and LTE
- 4.8Tips to secure your photos (including those private)
- 4.9Security checklist for “Back to school”
5.Protect yourself against advertisements and tracking
- 5.1What to do to stop phone and mail advertisements
- 5.2Protect yourself and all your devices against aggressive advertisements for FREE
- 5.3Protect yourself and all your devices against tracking for FREE
- 5.4Did you know you can opt-out from Google’s targeted ads and tracking?
6.IT Security Myths
- 6.1This can never happen to me
- 6.2Our network is secure, we can’t be hacked!
- 6.3Our employees would never steal data!
- 6.4Why would anyone hack exactly us/me?
- 6.5I have an antivirus, therefore i can’t get infected
- 6.6Security suites are overrated
- 6.7I don’t surf on dangerous websites, therefore i am safe
- 6.8Spam is just annoying, not dangerous
- 6.9Why deactivate unused services since nobody is using them anyway?
- 6.10Products advertised in spam emails are so cheap just because they don’t require any expensive marketing
- 6.11Antivirus vendors write the viruses themselves so that they can sell their expensive products
- 6.12Open source software is by definition unsecure
- 6.13Any computer virus will produce something visible on the screen
- 6.14If a website is using ssl it must be secure and reliable
- 6.15Macs never get infected
- 6.16Security risks can be quantified
- 6.17Security is the CISO´s problem
- 6.18Backup on an external disk is the safest as it can be
- 6.19Free security solutions are all I need
- 6.20If i use ssl to send emails nobody can peek into my emails
- 6.21I am invisible if I use ‘incognito’, ‘private’ or ‘guest’ browsing
- 6.22Hiding your wireless network’s name improves its security
7.Online safety for parents
- 7.1Advises for parents and tutors in regard to online safety
- 7.2Parental supervision for sharing
- 7.3Parental control for browsing
8.10 signs you should invest in your personal cyber security
- 8.1You see unauthorized expenses
- 8.2You have one single password for everything
- 8.3Your computer and browser are slower than before
- 8.4You appear logged on from various geographical locations
- 8.5You see posts you never authorized or wrote on Facebook
- 8.6Your emails are marked as spam
- 8.7You see a lot more ads in the browser
- 8.8You unsubscribe from spams
- 8.9You give personal information when requested by a stranger
- 8.10You install software a page pretends to require