Nick Espinosa Easy Prey Book

EASY PREY

PREFACE

By Robin Robins

 

CHAPTER 1

SMALL BUSINESS: A CYBERCRIMINAL’S EASIEST PREY

By Darren Coleman………………………………………………………………….15

 

CHAPTER 2

HISTORY OF CYBERCRIME

By Michael Bubernack…………………………………………………………….. 25

 

CHAPTER 3

WHO ARE THE BAD GUYS? – THE MEANS AND MOTIVES OF CYBERCRIME

By John Rutkowski…………………………………………………………………..33

 

CHAPTER 4

THE TOP TEN SECURITY CONCERNS FOR SMALL BUSINESSES

By Larry Burbano……………………………………………………………………. 43

 

CHAPTER 5

HOW TO RUN AN EFFECTIVE CYBER SECURITY PROGRAM WITHOUT BREAKING THE BANK

By Allen Cason…………………………………………………………………………51

 

CHAPTER 6

SMARTER EMPLOYEES – TRAINING THOSE YOU RELY ON TO KEEP CYBERCRIMINALS OUT

By Bob Jenner………………………………………………………………………… 61

 

CHAPTER 7

SECURE BACKUPS – THE KEY TO MITIGATING A CYBER ATTACK

By David Jordan……………………………………………………………………….71

 

CHAPTER 8

MOBILE DEVICE SECURITY

By Femi Dada…………………………………………………………………………. 79

 

CHAPTER 9

MALWARE AND VIRUSES – DEFENSE IN DEPTH

By Jeff Kuhn…………………………………………………………………………… 89

 

CHAPTER 10

MID-TIER BUSINESS MUST EMBRACE THE CLOUD IN THIS CYBER-HACKED WORLD

By Greg Hanna……………………………………………………………………….. 97

 

CHAPTER 11

HOW TO MANAGE SECURITY IN A CLOUD-BASED WORLD

By Matt Katzer……………………………………………………………………… 107

 

CHAPTER 12

BEATING BAD GUYS AT THEIR OWN GAME – USING AUTOMATION FOR PREVENTION

By Hal Lonas………………………………………………………………………….115

 

CHAPTER 13

BUSINESS REALITIES OF COMPLIANCE PENALTIES FROM DATE BREACH

By Kevin Fream………………………………………………………………………123

 

CHAPTER 14

UNBREAKABLE -PASSWORD SECURITY FOR YOUR BUSINESS

By Milton Bartley…………………………………………………………………….133

 

 CHAPTER 15

PCI, HIPPA, AND SOX – GOVERNMENT REGULATORY COMPLIANCE

By Nick Espinosa……………………………………………………………………141

 

CHAPTER 16

STRENGTHING BUSINESSES WEAKEST LINKS – WHY EMPLOYEES NEED CYBER SECURITY TRAINING

By Peter Horewitch………………………………………………………………… 151

 

CHAPTER 17

RANSOMWARE

By Aldan Berrie…………………………………………………………………….. 161

 

CHAPTER 18

IT SECURITY – TARGETING AND INVESTING WISELY

By Simon Fontaine………………………………………………………………… 171

 

CHAPTER 19

SEVEN STEPS YOU NEED TO TAKE TODAY TO SECURE YOUR COMPANY AGAINST CYBERCRIMINALS

 

By Michael C. Skomba…………………………………………………………….181

 

CHAPTER 20

YOU’VE LOST IT ALL. . . HOW QUICKLY CAN YOU RECOVER YOUR DATA?

By Scott E. Palmquist……………………………………………………………..193

 

CHAPTER 21

HOW CLOUD COMPUTING IS THE ANSWER TO MOST CYBER-SECURITY CONCERNS

By Frank M. DeBenedetto………………………………………………………. 203

 

CHAPTER 22

WHAT TO DO IF YOU’VE BEEN HACKED

By Greg Blanc………………………………………………………………………..213

 

CHAPTER 23

SPAM

By Craig Ray………………………………………………………………………… 223

 

CHAPTER 24

LOCKING THE DOOR

By Alan Adcock………………………………………………………………………231

 

CHAPTER 25

CYBER SECURITY IN HEALTHCARE -C AT AND MOUSE GAME!

By Dan Edwards……………………………………………………………………..241

 

CHAPTER 26

CYBERSECURITY FOR LAW FIRMS – CREATING A SOUND CORPORATE SECURITY POLICY

By Ilan
Sredni……………………………………………………………………….. 253