Sounded ID: 9798823496988
ISBN: 9798823496988
Publication Date: December 08, 2023
Publisher: Author's Republic
Language: English
Author Name: Oscar Fernandez
Narrator Name: Nathan Ashcroft
If you're like most business owners, you may feel overwhelmed (and sometimes intimidated) by the topic of cybersecurity. You're not alone! The good news is that help is here. The Cybersecurity Handbook for Small to Mind-size Businesses is designed to demystify cybersecurity and data protection for you. It provides essential knowledge about these topics, as well as cost-effective solutions you can use to protect your business. Plus, you'll better understand the security risks your business faces and learn some of the best practices for protection. Armed with this information, you can confidentl...
If you're like most business owners, you may feel overwhelmed (and sometimes intimidated) by the topic of cybersecurity. You're not alone! The good news is that help is here. The Cybersecurity Handbook for Small to Mind-size Businesses is designed to demystify cybersecurity and data protection for you. It provides essential knowledge about these topics, as well as cost-effective solutions you can use to protect your business. Plus, you'll better understand the security risks your business faces and learn some of the best practices for protection. Armed with this information, you can confidently take steps to safeguard your company's valuable data.
# | Title | Duration |
---|---|---|
1. | Opening Credits |
0 mins 16 secs |
2. | Disclosure |
0 mins 42 secs |
3. | Cybersecurity Handbook Ch 1 |
3 mins 29 secs |
4. | Understanding Cybersecurity Ch 2 |
1 mins 05 secs |
5. | What is Cybersecurity Ch 3 |
1 mins 24 secs |
6. | How Can Businesses Protect Ch 4 |
4 mins 52 secs |
7. | What Are Phishing and Social Ch 5 |
0 mins 45 secs |
8. | What is Phishing Ch 6 |
0 mins 59 secs |
9. | What is a Phishing Attack Test Ch 7 |
0 mins 42 secs |
10. | What is Social Ch 8 |
0 mins 44 secs |
11. | What is Malware Ch 9 |
0 mins 45 secs |
12. | What Are Ransomware and Spyware |
1 mins 03 secs |
13. | What is a Ransomware Attack |
0 mins 47 secs |
14. | What is Adware |
0 mins 43 secs |
15. | What Are DDoS |
0 mins 55 secs |
16. | What is a Network Intrusion |
0 mins 50 secs |
17. | What is a Data Breach |
1 mins 06 secs |
18. | What are Website Vulnerabilities |
0 mins 42 secs |
19. | What is a Security Scan |
0 mins 37 secs |
20. | What is a Zero Day Attack |
0 mins 44 secs |
21. | What is Data Exfiltration |
0 mins 42 secs |
22. | What is Encryption |
0 mins 41 secs |
23. | What is an SQL Injection Attack |
0 mins 55 secs |
24. | What is a Brute |
0 mins 33 secs |
25. | What Are Data Breaches |
0 mins 32 secs |
26. | What Are Backdoors |
0 mins 34 secs |
27. | Weak Passwords |
0 mins 33 secs |
28. | Password Manager |
0 mins 50 secs |
29. | Passwords Best Practices |
0 mins 58 secs |
30. | Intrusion Detection |
0 mins 45 secs |
31. | Zero Trust |
0 mins 38 secs |
32. | Endpoint |
1 mins 12 secs |
33. | Cell Phones |
0 mins 41 secs |
34. | Remote Employees |
1 mins 24 secs |
35. | Incident Response Plan |
0 mins 51 secs |
36. | Cybersecurity Response Plan |
1 mins 17 secs |
37. | Cybersecurity Incident Plan |
0 mins 52 secs |
38. | Automatic Wifi |
0 mins 49 secs |
39. | VPN |
0 mins 43 secs |
40. | SDP |
0 mins 56 secs |
41. | SDP vs VPN |
0 mins 56 secs |
42. | Firewall |
0 mins 53 secs |
43. | Proxy Server |
1 mins 23 secs |
44. | Cloud Security |
0 mins 40 secs |
45. | Identity and Access |
0 mins 44 secs |
46. | Application Security |
0 mins 43 secs |
47. | 2FA |
2 mins 21 secs |
48. | Afford |
0 mins 29 secs |
49. | Where do I Start |
0 mins 34 secs |
50. | What Steps to Take When Data is Compromised |
1 mins 34 secs |
51. | How to Stay Up To Date |
3 mins 11 secs |
52. | Laws |
1 mins 40 secs |
53. | Pricing |
1 mins 48 secs |
54. | Recommendations |
1 mins 06 secs |
55. | Summary |
1 mins 52 secs |
56. | Epilogue 2 |
1 mins 18 secs |
57. | Closing Credits |
0 mins 22 secs |