December 2018
Beginner
208 pages
5h 45m
English
The other chapters of this book primarily discuss personal cybersecurity. We have examined how you can protect your personal computers, devices, accounts, and networks from cyber harm. These good practices help to protect your home IT environment, and protect you, your friends, and your family members online. However, although good practices at home can help to reduce your risk at work, such practices are only one part of the cyber defenses you may have at your workplace.
Work computer networks are becoming increasingly complicated, with large numbers of network-connected devices, cloud-base services, and connections to third-party partners, customers, and vendors. As shown in Figure 12.1, work computer ...