THE SECRET TO CYBERSECURITY

A SIMPLE PLAN TO PROTECT YOUR FAMILY AND BUSINESS FROM CYBER CRIME

HOME

THE SECRET TO CYBERSECURITY

A SIMPLE PLAN TO PROTECT YOUR FAMILY AND BUSINESS FROM CYBER CRIME

OVERVIEW

WHAT IS THE SECRET TO CYBERSECURITY?

It’s 2 a.m. – do you know who your child is online with?

According to author Scott Augenbaum, between 80 to 90 percent of students say they do whatever they want on their smartphones—and their parents don’t have a clue. Is that you? What about your online banking passwords, are they safe? Your weaknesses are not always what you think they are.

There are bad people all around us and on the internet. They want to hurt you. They are based all over the world, so they’re hard at “work” when even you’re sleeping. They use automated programs to probe for weaknesses in your internet security programs. And they never stop.

Cybercrimes are on the increase internationally, and it’s up to you to protect yourself. But how?

The Secret to Cybersecurity is the simple and straightforward plan to keep you and your family safe. Written by Scott Augenbaum, a 30-year veteran of the FBI who specialized in cybercrimes, it uses real-life examples to educate and inform readers, explaining who/why/how so you’ll have a specific takeaway to put into action for your family. Learn about the scams, methods, and ways that cyber criminals operate—and learn how to fight back.

The Secret to Cybersecurity contents:

  • INTRODUCTION: Fear from Real Experience
  • CHAPTER 1: Cybercrime
  • CHAPTER 2: The Four Truths
  • CHAPTER 3: Phishing
  • CHAPTER 4: Think Before You Click
  • CHAPTER 5: Mobile Device Safety
  • CHAPTER 6: Password Safety
  • CHAPTER 7: Strong Passwords
  • CHAPTER 8: Two-Factor Authentication
  • CHAPTER 9: Social Media Safety
  • CHAPTER 10: Is the Cloud Safe?
  • CHAPTER 11: Business Email Compromise
  • CHAPTER 12: Real Estate Rip-offs
  • CHAPTER 13: Work-from-Home Nightmares
  • CHAPTER 14: Finding Mr. or Mrs. Wrong
  • CHAPTER 15: Ransomware
  • CHAPTER 16: Better Online Banking
  • CHAPTER 17: Elder Scams
  • CHAPTER 18: Keeping Kids Safe

AUTHOR

AUTHOR SCOTT AUGENBAUM

After joining the Federal Bureau of Investigation (FBI) in the New York Field Office in 1988 as a support employee, Scott Augenbaum became a Special Agent in 1994 and was assigned to the Syracuse, New York Office, where he worked domestic terrorism, white collar and hate crimes, and all computer crime investigations. In October 2003, Agent Augenbaum was promoted to Supervisory Special Agent at FBI Headquarters, Washington D.C in the Cyber Division, Cyber Crime Fraud Unit and was responsible for managing the FBI’s Cyber Task Force Program and Intellectual Property Rights Program. In 2006, Mr. Augenbaum transferred to Nashville, TN and managed the FBI Memphis Division Computer Intrusion/Counterintelligence Squad in Nashville, TN.

Over the past ten years, Retired Special Agent Scott Augenbaum has had the opportunity to provide hundreds of computer intrusion threat briefings with the goal of educating the community on emerging computer intrusion threats and how to not to be the victim of a data breach.Scott earned an MBA at American Sentinel University in Information Technology and a Masters Certificate in Information Security Management from Villanova University in addition to holding numerous General Information Assurance Certifications.

To learn more about and connect with Scott, please click below:

GET TO KNOW SCOTT

 

FACTS

CYBERSECURITY FACTS

In 2002, it took a lot of skill to become a cybercriminal. Today, the necessary tools are available to almost anyone online. Crimeware is a term used by law enforcement to describe the tools needed by crooks to commit cybercrime—and these tools are readily available at a low cost. There is a part of the Internet called the dark web that exists on darknets and overlay networks and requires special software and routers to access. The dark web is usually encrypted content and isn’t indexed on conventional search engines. This is where criminals sell drugs, hack software, counterfeit money, and more. It’s also the place where stolen classified information is brokered and traded by hackers, and it’s where human traffickers conduct their abhorrent work.

LEARN MORE

CONTACT

CONTACT SCOTT

For questions, concerns, or consult requests please fill out the form below and a member of Scott’s team will contact you within one (1) business day.

 

Order Now