About the Book
As a business or corporate leader
- Does the idea of dealing with cybersecurity seem overwhelming? After all, who wants to deal with how to protect your connected systems, hardwared, software, and data from hacks and cyberattacks?
- Is your current strategy to hope your systems and data will never be harmed?
(It always happens to someone else...until it happens to you)
- Are you wondering how in the world to start addressing this, when all the articles and books you see about protecting your digital assets are so technical that they may as well have been written in a foreign language?
This book is for you!
Book 1 in the CyberNightmares Series:
Did you know that, over the past decade, these 3 factors have been present in 80% of the reported data breaches
- Stolen or weak passwords
- Weakly Authenticated Administrative Access
- Missing Security Patches for Software or Operating Systems
The good news is that all of these are behavioral issues that can be easily addressed. This handbook helps you can do just that, with resources you likely already have. There are several things you can do personally and in your company policy to reduce these factors today …without a huge budget
About the Author
Wolf Halton has been in Information Technology roles since before there was a named IT Industry. He holds a Master’s Degree in IT Project Management and Leadership with a focus on Information Security. He spent six years working his way up from adjunct to acting chair of the School of Computer Networking at a technical college in Atlanta GA, where he taught penetration testing, Python programming, and operating systems.
In addition to serving as a consultant to colleges to create graduate degrees (Master’s and PhD) in IT Security, he has been lead author of four textbooks, a course, and about a dozen articles about the nuts and bolts of how systems are compromised (hacked). Most recently he has worked with large companies in the Financial and Communications Industries as a Principal Security Architect, focused generally on Compliance and Policy.Click Here for Today's Special
How to Achieve Network Security:
Using Risk Assessment and
Game Theory to Protect Your Systems