• Cyber Crisis

  • Protecting Your Business from Real Threats in the Virtual World
  • De: Eric Cole
  • Narrado por: Michael Butler Murray
  • Duración: 6 h y 28 m
  • 4.7 out of 5 stars (53 calificaciones)

Prime logotipo Exclusivo para miembros Prime: ¿Nuevo en Audible? Obtén 2 audiolibros gratis con tu prueba.
Elige 1 audiolibro al mes de nuestra inigualable colección.
Escucha todo lo que quieras de entre miles de audiolibros, Originals y podcasts incluidos.
Accede a ofertas y descuentos exclusivos.
Premium Plus se renueva automáticamente por $14.95 al mes después de 30 días. Cancela en cualquier momento.
Cyber Crisis  Por  arte de portada

Cyber Crisis

De: Eric Cole
Narrado por: Michael Butler Murray
Prueba por $0.00

US$14.95 al mes después de 30 días. Cancela en cualquier momento.

Compra ahora por US$17.19

Compra ahora por US$17.19

la tarjeta con terminación
Al confirmar tu compra, aceptas las Condiciones de Uso de Audible y el Aviso de Privacidad de Amazon. Impuestos a cobrar según aplique.

Resumen del Editor

Based on news reports, you might think there's a major cybersecurity threat every four to five months. In reality, there's a cybersecurity attack happening every minute of every day.

Today, we live our lives - and conduct our business - online. Our data is in the cloud and in our pockets on our smartphones, shuttled over public Wi-Fi and company networks. To keep it safe, we rely on passwords and encryption and private servers, IT departments, and best practices. But as you read this, there is a 70 percent chance that your data is compromised...you just don't know it yet.

In Cyber Crisis, Eric Cole gives listeners a clear-eyed picture of the information war raging in cyberspace. Drawing on 30 years of experience, Cole offers practical, actionable advice that even those with little technical background can implement, including steps to take on a daily, weekly, and monthly basis to protect their businesses and themselves.

No matter who you are or where you work, cybersecurity should be a top priority. The information infrastructure we rely on in every sector of our lives is both critical and vulnerable, and sooner or later, you or your company will be a target.

©2021 Secure Anchor Consulting, LLC (P)2021 Tantor

¿Te gustan los libros? Te encantará Audible.

Transforma tu día

Transforma tu día

Cambia el scrolling interminable por la escucha interminable. Los quehaceres pueden ser divertidos.

Placeholder Image Alt Text

Escucha en dónde sea

No puedes darle vuelta a la página mientras conduces, pero puedes escuchar

Placeholder Image Alt Text

Lleva toda tu biblioteca contigo

Tus historias van a donde tú vayas. Los audiolibros viajan ligero.

Placeholder Image Alt Text

Escucha y aprende

Descubre historias que pueden renovar tu mente, tu bienestar y tu vida.

Placeholder Image Alt Text

Alcanza tus objetivos de lectura

Descarga títulos para escucharlos sin conexión, en cualquier parte del mundo.

Placeholder Image Alt Text

Encuentra tu nicho

Con miles de títulos para explorar, hay algo para todos.

Prueba por $0.00 Renovación automática por $14.95 al mes después de 30 días. Cancela en cualquier momento.

Lo que los oyentes dicen sobre Cyber Crisis

Calificaciones medias de los clientes
Total
  • 4.5 out of 5 stars
  • 5 estrellas
    40
  • 4 estrellas
    11
  • 3 estrellas
    1
  • 2 estrellas
    1
  • 1 estrella
    0
Ejecución
  • 5 out of 5 stars
  • 5 estrellas
    36
  • 4 estrellas
    5
  • 3 estrellas
    2
  • 2 estrellas
    0
  • 1 estrella
    0
Historia
  • 4.5 out of 5 stars
  • 5 estrellas
    32
  • 4 estrellas
    7
  • 3 estrellas
    3
  • 2 estrellas
    1
  • 1 estrella
    0

Reseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.

Ordenar por:
Filtrar por:
  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars

Great info!

I have always admired Dr. Cole and he did not disappoint me with this book.
Great read for all levels

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars

Lots of good true stories

Dr. Cole uses many facts and true stories to help the reader understand the risk and he also provides practical examples of how to treat such risk. I thought about four star because I think that the book sometimes uses a bint of FUD but being in the space I cannot negate the facts.

Great book for your executive leadership team.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars

Extremely Informative and Insightful

I’ve been working in IT for over 25 years specifically in the Application Integration space and this book has increased my awareness to the cyber security challenges we are facing globally. I highly recommend!

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    5 out of 5 stars
  • Ejecución
    5 out of 5 stars
  • Historia
    5 out of 5 stars

Great insightful resource

Concise and straight to the point, great examples and suggestions to secure an environment from a high level. Check this out, you won't regret it.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña

  • Total
    3 out of 5 stars
  • Ejecución
    4 out of 5 stars
  • Historia
    3 out of 5 stars

Not garbage but also not great

This book is a good starting point but the philosophies for security are a bit dated for it to have been written in 2021. There is no mention of Zero Trust principles. Least privilege was only suggested for third party accounts on your network.

The security model that is discussed is very old school network-centric. It focuses on firewalls and segmentation as the perimeter deference instead of the more modern approach of identity being the deciding perimeter. Network segmentation and firewalling is still very important in the layered approach but is no longer good enough to be the deciding factor of what is trusted and what is not. This book does not seem to acknowledge that.

If you do buy and read this book, please keep in mind that there is a new modern way to secure your assets and you should look deeply into the Zero Trust methodology where every resource request begins with a trust level of zero and increases by verifying explicitly that the request is coming from a verified account, a device that is secure, a location that is approved, and without a heuristics score that puts it all into question. We no longer trust the fact that they are on the corp network or using a company laptop or have the right password as sole trust factors. Assume that your most trusted network segments are already breached with no ability to clean them, and act accordingly.

This book also fails to talk about the modern move to passwordless authentication. There is a slight mention of tokens and multifactor but not in the context of eliminating the password from the mix all together; which is what modern enterprises are striving for. The only people who love passwords are the hackers (and apparently Eric Cole).

I don't want to discourage you from reading this book but I do want to encourage you to not make this the last book you read on this subject.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña