Chapter 7
Securing Your Accounts
IN THIS CHAPTER
Understanding that you’re a target
Understanding the different types of data that need to be secured
Securing your accounts from human error
Being careful when connecting external storage media
The weakest link in the cybersecurity chain is almost always people, and the greatest threat to your own cybersecurity is likely yourself, with the members of your family being a close second. As such, all of the technology and technical knowledge in the world won’t deliver much value if you don’t also address various human shortcomings.
Realizing You’re a Target
Perhaps the most significant first step in securing yourself digitally is to understand that you’re a target and that nefarious parties have the desire to breach your computer systems, electronically accessible accounts, and anything else they can get their hands on.
Even if you already realize that you’re a target, it is important that you truly internalize such a notion. People who believe that criminals want to breach their computers and phones act differently than people who do ...
Get Cybersecurity For Dummies, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.