{"id":106258,"date":"2020-02-17T06:00:38","date_gmt":"2020-02-17T14:00:38","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=106258"},"modified":"2020-04-21T14:15:46","modified_gmt":"2020-04-21T21:15:46","slug":"cyber-cannon-cyber-smart","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/02\/cyber-cannon-cyber-smart\/","title":{"rendered":"Book Review: \u201cCyber Smart\u201d"},"content":{"rendered":"<p><b>Cyber Canon Book Review: <\/b><span style=\"font-weight: 400;\">\u201cCyber Smart: Five Habits to Protect Your Family, Money from Cyber Criminals\u201d by Bart McDonough (published Dec. 5,\u00a0 2018)<\/span><\/p>\n<p><b>Book Reviewed by: <\/b><span style=\"font-weight: 400;\">Paul W. Smith, NetworkDataPedia, April 2019.<\/span><\/p>\n<p><b>Bottom Line: <\/b><i><span style=\"font-weight: 400;\">I recommend this book for the Cybersecurity Canon Hall of Fame.<\/span><\/i><\/p>\n<p><b>Review:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Each of us has a unique relationship with our possessions \u2013 especially stuff like smartphones, tablets, laptops, connected cars and all the sundry members of the Internet of Things (IoT) family. We may see these as a means of making our lives simpler and more comfortable, or perhaps as tangible proof that we are affluent and technologically savvy. Bart McDonough however, author of \u201cCyber Smart,\u201d treats each as yet another threat to personal privacy, mental well-being and financial security.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The golden key on this book\u2019s cover conjures thoughts of encryption, security and perhaps some special knowledge that might be valuable. While the Internet can seem intimidating to many, the book\u2019s subtitle, \u201cFive Habits to Protect Your Family, Money and Identity from Cyber Criminals,\u201d hints that there might be a manageable approach to avoiding catastrophe. \u201cCyber Smart<\/span><i><span style=\"font-weight: 400;\">\u201d <\/span><\/i><span style=\"font-weight: 400;\">is not about becoming an expert in all things internet, but rather a very readable attempt to raise awareness of the many serious threats that do exist, while offering understandable and actionable ways to make oneself a tougher target. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">The two main sections of the book, titled \u201cSetting the Stage\u201d and \u201cSpecific Recommendations,\u201d provide the framework for a deep-dive into the variety and extent of the bad things that can happen in the cyber world, followed by a step-by-step process to secure one\u2019s digital life from bad actors. As part of \u201cSetting the Stage,\u201d the author introduces his \u201cBrilliance in the Basics\u201d approach, a forthright discipline for self-protection. A detailed Table of Contents will make it easy to go directly to a particular topic for those who may find themselves operating in crisis mode. The author\u2019s extensive industry experience is aimed at protecting the individual, whereas much of the literature on this topic is for businesses and corporations.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Many of the mistakes described in the book begin with things that most of us routinely do. It is surprising how a bad actor sitting at home at a keyboard can leverage their computer skills to make a great deal of money or cause enormous disruption. The book purports to be much more than just fear-mongering, although there is a fair amount of that. The good news is that there is hope; just because governments and huge corporations experience data breaches doesn\u2019t mean that the little guy is powerless. If you finish this book and don\u2019t at least implement two-factor authentication, you weren\u2019t paying attention.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cCyber Smart\u201d provides some worthwhile insight into bad actors and what motivates them. Most are males, under 34 years of age, and many have full-time jobs but are hacking in their spare time, motivated as much by the challenge as the money.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Through necessity, \u201cCyber Smart\u201d uses lots of terminology that may not be familiar to all readers, and as a result, a glossary of terms would have been nice. The notes at the end of each chapter are comprised of URLs, some of which are long and complicated to type in (my review copy was a paper edition \u2013 perhaps these are live links in the digital version?). The author actually warns against typing in such long strings, as mistakes can lead to dangerous, bogus websites that often make subtle name changes as a way of trapping their victims. And if you\u2019re looking for the oft-referenced principles labeled \u201cBrilliance in the Basics,\u201d the core of the book\u2019s advice to readers, they don\u2019t show up until Chapter 7.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Despite these minor issues, \u201cCyber Smart\u201d is an entertaining read that exposes the Internet as a bad neighborhood where extreme caution is advisable. The author does a lot of foreshadowing of what\u2019s to come in subsequent chapters, but then draws the storylines together for the now-motivated reader. Unless you are a seasoned professional cybersecurity expert, \u201cCyber Smart\u201d will open your eyes to the Internet\u2019s abundance of risks, and then outline a straightforward action plan for self-defense.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As the Internet grows and spreads into more areas of our lives, so does the list of cyber-vulnerabilities and their disruptive potential. Few people realize how things they routinely do online can heighten their exposure. The case-history stories that the author tells make it clear that cybersecurity is not just an academic exercise \u2013 they help instill a sense of urgency in the reader. The sense of panic in each of the victims is conveyed and then followed with a message of hope that the little guy need not feel powerless. \u201cCyber Smart\u201d presents a well-balanced combination of cyber threats and smart practices that the non-expert can understand and implement. It\u2019s nearly impossible to read this book without making at least some changes in one\u2019s online life.<\/span><\/p>\n<p><i>We modeled the\u00a0<\/i><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/\"><i>Cybersecurity Canon<\/i><\/a><i>\u00a0after the Baseball or Rock &amp; Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that.\u00a0Please write a review and nominate your favorite.\u00a0<\/i><\/p>\n<p><i>The Cybersecurity Canon is a real thing for our community. We have designed it so that you can\u00a0<\/i><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/nominate-a-book\/\"><i>directly participate in the process<\/i><\/a><i>. Please do so!<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cCyber Smart\u201d presents a well-balanced combination of cyber threats and smart practices that the non-expert can understand and implement.<\/p>\n","protected":false},"author":663,"featured_media":32398,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4521,6724],"tags":[251,4270],"coauthors":[7014],"class_list":["post-106258","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-canon","category-points-of-view","tag-cybersecurity-canon","tag-cybersecurity-canon-review"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/06\/cybersecuity-canon-blog-600x260.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/106258","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=106258"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/106258\/revisions"}],"predecessor-version":[{"id":106260,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/106258\/revisions\/106260"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/32398"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=106258"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=106258"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=106258"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=106258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}