Delinea Ebook Cybersecurity For Dummies
Delinea Ebook Cybersecurity For Dummies
Delinea Ebook Cybersecurity For Dummies
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Cybersecurity For Dummies®, Delinea Special Edition
Published by
John Wiley & Sons, Inc.
111 River St.
Hoboken, NJ 07030-5774
www.wiley.com
Copyright © 2022 by John Wiley & Sons, Inc. Hoboken, New Jersey.
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise,
except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without
the prior written permission of the Publisher. Requests to the Publisher for permission should be
addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ
07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com,
Making Everything Easier, and related trade dress are trademarks or registered trademarks of
John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not
be used without written permission. Delinea and the Delinea logo are trademarks of Delinea. All
other trademarks are the property of their respective owners. John Wiley & Sons, Inc., is not
associated with any product or vendor mentioned in this book.
For general information on our other products and services, or how to create a custom For Dummies
book for your business or organization, please contact our Business Development Department in
the U.S. at 877-409-4177, contact [email protected], or visit www.wiley.com/go/custompub.
For information about licensing the For Dummies brand for products or services, contact
BrandedRights&[email protected].
ISBN: 978-1-119-88720-1 (pbk); ISBN: 978-1-119-88721-8 (ebk). Some blank pages in the print
version may not be included in the ePDF version.
Publisher’s Acknowledgments
Some of the people who helped bring this book to market include the following:
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
T
he issues and challenges associated with cybersecurity — the
measures taken to protect computer systems against unau-
thorized access or attack — come up almost daily in your
work and home lives these days. Media headlines highlight the
latest breaches of confidential information, exposing millions of
personal information records. Executives lose their jobs because
of these incidents. Companies sometimes see a sudden drop in
their stock market value. Others must pay a “ransom” to get their
hijacked information back. And for smaller organizations, their
very existence as a business may be threatened.
Introduction 1
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Icons Used in This Book
This book uses the following icons to indicate special content.
The Tip icon points out practical advice that saves you time and
effort in improving your own cybersecurity hygiene, and this
information also helps you avoid getting cyber fatigue and reduces
your risk of being a victim of cybercrime.
»» www.cisa.gov/cybersecurity-awareness-month
»» iamcybersafe.org/s
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Targeting humans as the primary cause
of breaches
Chapter 1
Cybersecurity Is
Everyone’s Responsibility
I
n our always-connected world where the private information of
individuals and organizations is vulnerable to exposure and
misuse, cybersecurity is everyone’s responsibility because mali-
cious hackers or threat actors who steal proprietary information
don’t care about age, gender, race, culture, beliefs, or nationality.
They probe your digital footprint and your Internet-connected
computers based on opportunity, often seeking financial gain.
Targeting Humans
People are the top target and cause of cybersecurity failures
because most of them are trusting individuals who want to help
or contribute as part of human nature and their jobs. Malicious
hackers and insiders take advantage of that trust by appearing to
make legitimate business requests from bosses or sharing social
items of a more personalized nature. They’re counting on peo-
ple’s curiosity and willingness to cooperate to get them to “click
on the link” in a business or personal email.
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
One single click on a malicious link, however, can download mal-
ware onto your computer that can immediately lock up data in a
“ransomware” attack, and oftentimes, you have to send money
to regain access. Or, the downloaded malware can, unknowingly
to the user, begin instantly collecting information aimed at gain-
ing credentials and passwords for exploiting later. While many
of these actions by humans are accidental or not intended to
be harmful, the result can cause considerable damage to them-
selves, their family, their co-workers, their company, and their
community.
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Malicious hackers are specifically looking to steal your username
and password credentials so they can access your information and
impersonate as you. And, when your identity is stolen, an attacker
can easily bypass the traditional technical security perimeter con-
trols without being detected. Once inside the computer network,
cybercriminals can carry out malicious attacks or access and steal
confidential information by posing as a legitimate user.
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
To overcome cyber fatigue (or to avoid it all together), I suggest
following these tips:
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Identifying different email scams
Chapter 2
Recognizing Top
Cybersecurity Threats
C
ybercriminals utilize an expanding set of online tools and
services available with hacking as a service, distributed
denial of service (DDoS), and the latest ransomware as a
service. This means attackers no longer require any deep techni-
cal knowledge to carry out their attacks — they just need a laptop
and an Internet connection. So you’ll be targeted now more than
ever, and you must be prepared.
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Ransomware
If you have a ransomware attack, you know almost immediately
because you see a message from the cybercriminal that your files
have been encrypted or that you have been locked out of your
computer. Note that it’s common to see mistakes in spelling and
formatting in these types of messages. This message can look
similar to Figure 2-1. You will then be asked to pay a ransom to
get an encryption key and restore your files. Payment is typically
demanded in Bitcoins or some other well-known cryptocurrency.
If you see such a message, it’s vital that you make sure it doesn’t
spread to other devices at work or at home. Disconnect the infected
computer from the Internet or your company network. Remove
the network cable, turn off Wi-Fi, and power off your device. If
it occurs on a company computer or occurs on your company’s
network, immediately notify your IT department.
Email Threats
Email continues to be the most popular weapon of choice when it
comes to stealing credentials, installing malware, or locking up
information in a ransomware attack. Cybercriminals prefer email
because all it takes is for one victim to open an attachment in an
email or click on a link to open the door for attackers to exploit.
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Spam emails
Spam emails show some personal information and can look very
authentic so you must examine them all carefully. While spam
filter technologies do a better job at screening threats, spam-
mers are getting better at incorporating authentic details, includ-
ing already disclosed or stolen personal information, that enable
them to get through into your email inbox.
Phishing emails
Phishing emails often contain personal information and can be
very authentic looking, typically pretending to be a legitimate ser-
vice from a known vendor. Phishing emails almost always pose as
an urgent message from an authority that requires a quick action,
such as clicking a link or opening an attached file to avoid further
trouble, late fees, and so on. These emails normally contain mul-
tiple hyperlinks — some are legitimate to disguise the one mali-
cious link among them — and may contain spelling errors (in this
example, judgement versus judgment and plantiff versus plaintiff).
You can see an example of this type of email in Figure 2-3.
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
FIGURE 2-3: A phishing email example with highlighted indicators of threats.
Watch out if the email display name doesn’t match the email
address of the sender or if the attachment has a random sounding
name, or if the hyperlink display names don’t match the actual
URL of the attachment. Simply hover your mouse over the link to
reveal the real URL address, but do not click the link. These threats
are also becoming more popular on social media and messaging
applications that are very difficult to tell the difference —
sometimes only containing a single character difference — so
watch out for these threats via messenger applications.
Just like with known spam, mark the senders of your suspected
phishing emails as junk or spam, and report them immediately to
your IT Security department if they appear directly in your work
inbox. Don’t forward a phishing email. Make sure you’ve taken
basic steps to protect your devices and scanned your system and
emails for malware.
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Spear phishing emails
Spear phishing emails target you personally, pretending to be
from someone you know and trust, such as a friend, colleague,
or boss. They contain a hyperlink or attachment, such as a PDF,
Word document, Excel spreadsheet, or PowerPoint presentation.
Limit what you share on social media, and enable privacy and
security settings on your Facebook, Twitter, or other social
accounts. Don’t accept “friend” requests unless you know the
person well.
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
As you create more online accounts, social media accounts offer
themselves as a single sign on, as shown in Figure 2-4, to sim-
plify and reduce the ever-growing cyber fatigue of remember-
ing passwords, but such convenience disguises huge risks. If your
social media account is compromised, a cybercriminal can easily
access all your other associated accounts by using that one social
media account password. Instead of using social logon, consider
using a password manager (details in Chapter 4).
Get into the habit of reviewing your account activity logs. Get
alerts about your logging activity through proactive notifications
like the one shown in Figure 2-5. Continuously reviewing your
activity log allows you to get familiar with your social activity, be
more cautious, and limit what you post.
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
FIGURE 2-5: Setting up extra security for your logins.
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Remove the connections after you’ve finished joining a
Wi-Fi network. If you don’t, you risk what’s known as a Wi-Fi
Man in The Middle (MITM) attack, which is a Wi-Fi hotspot
that uses common Wi-Fi names such as home, airport, café,
or free Wi-Fi. When your device sees a known network, it will
automatically connect. Make sure to know what networks
you are connecting to.
»» Disable the “automatically join known networks,” feature
on your portable devices. That way, when connecting to
Wi-Fi, you’ll need to review the correct network name and see
whether it’s secure and protected. Note: On some devices this
feature may be named slightly different, so check your user
manual.
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Discovering you’ve been compromised
Chapter 3
Responding in the Wake
of a Cyberattack
W
ith cyber threats, it’s only a matter of when and not if
you’re going to be impacted. Some attacks are within
your control, and some aren’t, so you need to be pre-
pared on what to do when you do become a victim. Understanding
the method of threats you face (covered in Chapter 2) can hope-
fully help you identify any hack or compromise before it becomes
a major incident.
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
procedures. Every employee should be familiar with these proce-
dures because rapid responses tend to reduce problems or damage
from the incident.
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Fixing Your Personal Devices
If a personal device, such as a laptop, tablet, or cellphone has been
infected with malware, seek expert advice from the IT department
where you work or from a computer services firm. In many cases,
you may need to connect the hard drive of your device to another
system that can then scan the file system for a virus or malware.
This will also enable you to back up your critical and important files
to another removable hard drive so you can conduct a complete
reinstallation of the operating system. You should scan your backup
files for any sign of the malware and only then restore them.
Assume that any data stored on an infected device has been sto-
len and is now in the hands of a cybercriminal. You should also
assume that any USB devices you may have used with this device
are also infected, and they should all be scanned for any sign of
the malware.
Be aware that any Internet services you accessed using the infected
device have also been compromised, including the passwords for
account access to your bank, financial details, email accounts, and
social media accounts, including your social logins that connect
you with other Internet accounts.
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
This factor is typically a PIN or token that’s generated via an
SMS text message or mobile phone authenticator app.
»» Password manager: A password manager helps you in
generating strong, long, and complex unique passwords for
each account you have. Consider using free password
manager software that helps you create these passwords.
This security process reduces cyber fatigue and makes it
easier to protect your accounts with a password vault. Some
password managers allow you to check for the age of
passwords, duplicate passwords, and weak passwords.
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Backing up your important data
Chapter 4
Ten Ways to Protect
Yourself
T
he next time you’re about to go online — whether at work
or home — stop, think, and then connect. Remember that
you are both the target of cybercriminals and the strongest
line of defense against cyber threats to your employer, your loved
ones, friends, and yourself. In this chapter, I give you ten best
practices to help you stay safe online.
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
basic information required to get the account activated, and don’t
provide excessive information that could put you at risk. For more
information, see Chapter 2.
For each account you create, check the minimum required infor-
mation and think twice about entering data that’s classified as
Personal Identifiable Information (PII).
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
issue of remembering multiple passwords, but it poses a greater
security that many people don’t realize.
When using Single Sign On, most apps request read/write access
or access to your basic information that most people are okay
with, but some apps request full access, which means access to
almost everything including emails, calendar, location informa-
tion, friends, family, and so on.
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Always assume someone is monitoring your data over public
Wi-Fi. For more tips, see Chapter 2.
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
WILEY END USER LICENSE AGREEMENT
Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.