Chapter 7

Securing Your Accounts

IN THIS CHAPTER

Bullet Understanding that you’re a target

Bullet Understanding the different types of data that need to be secured

Bullet Securing your accounts from human error

Bullet Being careful when connecting external storage media

The weakest link in the cybersecurity chain is almost always people, and the greatest threat to your own cybersecurity is likely yourself, with the members of your family being a close second. As such, all of the technology and technical knowledge in the world won’t deliver much value if you don’t also address various human shortcomings.

Realizing You’re a Target

Perhaps the most significant first step in securing yourself digitally is to understand that you’re a target and that nefarious parties have the desire to breach your computer systems, electronically accessible accounts, and anything else they can get their hands on.

Even if you already realize that you’re a target, it is important that you truly internalize such a notion. People who believe that criminals want to breach their computers and phones act differently than people who do ...

Get Cybersecurity For Dummies, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.