Chapter 7
Securing Your Accounts
IN THIS CHAPTER
Understanding that you’re a target
Understanding the different types of data that need to be secured
Securing your accounts from human error
Being careful when connecting external storage media
The weakest link in the cybersecurity chain is almost always people, and the greatest threat to your own cybersecurity is likely yourself, with the members of your family and whoever else uses your computer or network on a regular basis being a close second. As such, all the technology and technical knowledge in the world won’t deliver much value if you don’t also address various human shortcomings.
Realizing You’re a Target
Perhaps the most significant first step in securing yourself digitally is to understand that you’re a target and that nefarious parties have the desire to breach your computer systems, electronically accessible accounts, and anything else they can get their hands on.
Even if you already realize that you’re a target, it is important that you truly internalize such a notion. People who believe that criminals want to breach ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access