|
|
|||
|
||||
OverviewThe phone rang at 2 AM. Within minutes, Richard Lowe knew someone's digital life had just collapsed. His friend had clicked one email attachment. Thirty years of family photos - weddings, first steps, her mother's last Christmas - were gone. Encrypted by ransomware. She paid the $500. The criminals kept the money and the photos. That night changed everything about how Richard thinks about security. Cybercrime now generates more revenue than the global drug trade. Professional criminal organizations employ thousands of people whose only job is stealing your information and money. They punch in at 9 AM, take lunch breaks, and go home to their families after spending eight hours figuring out new ways to ruin yours. They target families because families are easy. No million-dollar security budgets. No IT department. Just kids who click on everything, teenagers who share passwords, and grandparents who believe every email that claims to be from their bank. Add smart speakers that listen to your conversations, security cameras that strangers can access, and a router that probably still uses the factory default password - and criminals see an open door. Most security books read like technical manuals written by engineers for engineers. They drown you in jargon, overwhelm you with procedures you'll never follow, and leave you more confused than when you started. This book is different. Every technique Richard recommends, he uses on his own devices. Every story he tells happened to real people he knows - the neighbor whose unsecured WiFi got him investigated by the FBI, the grandmother whose birthday password cost her life savings, the teenager whose ""private"" photos ended up circulating through her entire school. Every chapter starts with someone learning an expensive lesson, so you don't have to. Richard Lowe spent nearly two decades as Director of Computer Operations at Trader Joe's, managing IT security for a $16 billion retail operation. He holds CERT emergency response certifications and serves as Technical Editor for KnowBe4's cybersecurity publications. He has been cleaning up digital disasters for 45 years. He knows what criminals look for, how they get in, and exactly how to stop them. This book covers your router, your smart home devices, your computers and phones, your kids' accounts, your backups, your passwords, and what to do when something goes wrong - because something eventually will. The techniques don't require technical expertise or expensive equipment. The goal is reasonable protection against realistic threats, not perfect security that nobody in your house will actually use. The criminals are counting on you to stay confused and vulnerable. This book is how you prove them wrong. Full Product DetailsAuthor: Richard LowePublisher: Writing King Imprint: Writing King Dimensions: Width: 15.20cm , Height: 1.20cm , Length: 22.90cm Weight: 0.295kg ISBN: 9781946458438ISBN 10: 1946458430 Pages: 216 Publication Date: 08 April 2026 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: Available To Order We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||