Cyber Crisis Audiolibro Por Eric Cole arte de portada

Cyber Crisis

Protecting Your Business from Real Threats in the Virtual World

Vista previa

Prueba por $0.00
Escucha audiolibros, podcasts y Audible Originals con Audible Plus por un precio mensual bajo.
Escucha en cualquier momento y en cualquier lugar en tus dispositivos con la aplicación gratuita Audible.
Los suscriptores por primera vez de Audible Plus obtienen su primer mes gratis. Cancela la suscripción en cualquier momento.

Cyber Crisis

De: Eric Cole
Narrado por: Michael Butler Murray
Prueba por $0.00

Escucha con la prueba gratis de Plus

Compra ahora por $17.19

Compra ahora por $17.19

Confirma la compra
la tarjeta con terminación
Al confirmar tu compra, aceptas las Condiciones de Uso de Audible y el Aviso de Privacidad de Amazon. Impuestos a cobrar según aplique.
Cancelar

Acerca de esta escucha

Based on news reports, you might think there's a major cybersecurity threat every four to five months. In reality, there's a cybersecurity attack happening every minute of every day.

Today, we live our lives - and conduct our business - online. Our data is in the cloud and in our pockets on our smartphones, shuttled over public Wi-Fi and company networks. To keep it safe, we rely on passwords and encryption and private servers, IT departments, and best practices. But as you read this, there is a 70 percent chance that your data is compromised...you just don't know it yet.

In Cyber Crisis, Eric Cole gives listeners a clear-eyed picture of the information war raging in cyberspace. Drawing on 30 years of experience, Cole offers practical, actionable advice that even those with little technical background can implement, including steps to take on a daily, weekly, and monthly basis to protect their businesses and themselves.

No matter who you are or where you work, cybersecurity should be a top priority. The information infrastructure we rely on in every sector of our lives is both critical and vulnerable, and sooner or later, you or your company will be a target.

©2021 Secure Anchor Consulting, LLC (P)2021 Tantor
Ciencias Sociales Historia y Cultura Privacidad y Vigilancia Tecnología y Sociedad Negocio Seguridad para computadora Hackeo Guerra

Lo que los oyentes dicen sobre Cyber Crisis

Calificaciones medias de los clientes
Total
  • 4.5 out of 5 stars
  • 5 estrellas
    43
  • 4 estrellas
    11
  • 3 estrellas
    1
  • 2 estrellas
    1
  • 1 estrella
    0
Ejecución
  • 5 out of 5 stars
  • 5 estrellas
    39
  • 4 estrellas
    5
  • 3 estrellas
    2
  • 2 estrellas
    0
  • 1 estrella
    0
Historia
  • 4.5 out of 5 stars
  • 5 estrellas
    35
  • 4 estrellas
    7
  • 3 estrellas
    3
  • 2 estrellas
    1
  • 1 estrella
    0

Reseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.

Ordenar por:
Filtrar por:
  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars

Great info!

I have always admired Dr. Cole and he did not disappoint me with this book.
Great read for all levels

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars

Lots of good true stories

Dr. Cole uses many facts and true stories to help the reader understand the risk and he also provides practical examples of how to treat such risk. I thought about four star because I think that the book sometimes uses a bint of FUD but being in the space I cannot negate the facts.

Great book for your executive leadership team.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars

Great insightful resource

Concise and straight to the point, great examples and suggestions to secure an environment from a high level. Check this out, you won't regret it.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars

Extremely Informative and Insightful

I’ve been working in IT for over 25 years specifically in the Application Integration space and this book has increased my awareness to the cyber security challenges we are facing globally. I highly recommend!

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars

Industry Best Practices

Cyber security cannon
slightly paranoid but for great reason
Lovk up your computer they got haxors out here just hacking people

It is not your fault cyber security suck at the places you work and do business BUT it is your responsibility to protect yourself.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    3 out of 5 stars
  • Ejecución
    4 out of 5 stars
  • Historia
    3 out of 5 stars

Not garbage but also not great

This book is a good starting point but the philosophies for security are a bit dated for it to have been written in 2021. There is no mention of Zero Trust principles. Least privilege was only suggested for third party accounts on your network.

The security model that is discussed is very old school network-centric. It focuses on firewalls and segmentation as the perimeter deference instead of the more modern approach of identity being the deciding perimeter. Network segmentation and firewalling is still very important in the layered approach but is no longer good enough to be the deciding factor of what is trusted and what is not. This book does not seem to acknowledge that.

If you do buy and read this book, please keep in mind that there is a new modern way to secure your assets and you should look deeply into the Zero Trust methodology where every resource request begins with a trust level of zero and increases by verifying explicitly that the request is coming from a verified account, a device that is secure, a location that is approved, and without a heuristics score that puts it all into question. We no longer trust the fact that they are on the corp network or using a company laptop or have the right password as sole trust factors. Assume that your most trusted network segments are already breached with no ability to clean them, and act accordingly.

This book also fails to talk about the modern move to passwordless authentication. There is a slight mention of tokens and multifactor but not in the context of eliminating the password from the mix all together; which is what modern enterprises are striving for. The only people who love passwords are the hackers (and apparently Eric Cole).

I don't want to discourage you from reading this book but I do want to encourage you to not make this the last book you read on this subject.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña