10 How to Defeat Black Hats

So far in this book, you’ve learned what cybersecurity is, why black hats want to steal your data, how adversaries attack your systems in various ways, and what you can do to stop specific types of attacks. You should have a good idea of the threats you might face across various landscapes, such as your networks, social media, email, and more. However, as you’ve probably guessed by now, quality security can’t be reactive. If you wait for an attack to happen before trying to prevent it, you’ve already lost. It’s like playing a game of Whac-A-Mole: you might hit one mole, but unless you fix all the holes, another ...

Get How Cybersecurity Really Works now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.