Improve Your Security
Improve Your Security
Everything what you wanted to know about IT security and didn't know who to ask
About the Book
A MUST read book if:
- You are regularly using a computer.
- You have an account on Google, Facebook, Twitter, LinkedIn, MySpace, Yahoo, Pinterest, Skype or any other online service.
- You are using online backup like Dropbox, Memopal, CX and others.
The goal of this book is to allow everybody to understand where the cyber dangers are and how to avoid them.
Simple language, real life examples, no abstract security expert talk.
For even more information visit: http://www.improve-your-security.org
Table of Contents
- Who should read this book?
- Author’s profile
1. Accounts and Passwords
- 1.1 Create good passwords
- 1.2 Complex passwords aren’t always better
- 1.3 Use dedicated accounts for each user
- 1.4 Change the default passwords
2. Online Security
- 2.1 Online Protection
- 2.2 Harden your Facebook account
- 2.3 Enable two-factor authentication
- 2.4 Enable two-factor authentication for Google
- 2.5 Enable two-factor authentication for Facebook
- 2.6 Enable two-factor authentication for Dropbox
- 2.7 Enable two-factor authentication for Twitter
- 2.8 Enable two-factor authentication for LinkedIn
- 2.9 Enable two-factor authentication for Tumblr
- 2.10 Improve your browser’s security and privacy in 5 steps
3. Device Security
- 3.1 Securing your notebook
- 3.2 Update your Software often
- 3.3 Password protect your smartphone
- 3.4 Make backups
- 3.5 Encrypt your data
- 3.6 What to do if your computer has a virus
- 3.7 Cleaning your computer
- 3.8 Goodbye, Windows XP?
4. Tips that you can print
- 4.1 20 Tips to improve your overall security
- 4.2 5 signs you’ll notice if your social media account has been hacked
- 4.3 How to secure a new computer in 10 steps
- 4.4 How to protect your social media account
- 4.5 10 tips to improve your mobile device’s security
- 4.6 Security tips for safe online shopping
- 4.7 5 tips to keep your mobile devices safe while using 3/4G and LTE
- 4.8 Tips to secure your photos (including those private)
- 4.9 Security checklist for “Back to school”
5. Protect yourself against advertisements and tracking
- 5.1 What to do to stop phone and mail advertisements
- 5.2 Protect yourself and all your devices against aggressive advertisements for FREE
- 5.3 Protect yourself and all your devices against tracking for FREE
- 5.4 Did you know you can opt-out from Google’s targeted ads and tracking?
6. IT Security Myths
- 6.1 This can never happen to me
- 6.2 Our network is secure, we can’t be hacked!
- 6.3 Our employees would never steal data!
- 6.4 Why would anyone hack exactly us/me?
- 6.5 I have an antivirus, therefore i can’t get infected
- 6.6 Security suites are overrated
- 6.7 I don’t surf on dangerous websites, therefore i am safe
- 6.8 Spam is just annoying, not dangerous
- 6.9 Why deactivate unused services since nobody is using them anyway?
- 6.10 Products advertised in spam emails are so cheap just because they don’t require any expensive marketing
- 6.11 Antivirus vendors write the viruses themselves so that they can sell their expensive products
- 6.12 Open source software is by definition unsecure
- 6.13 Any computer virus will produce something visible on the screen
- 6.14 If a website is using ssl it must be secure and reliable
- 6.15 Macs never get infected
- 6.16 Security risks can be quantified
- 6.17 Security is the CISO´s problem
- 6.18 Backup on an external disk is the safest as it can be
- 6.19 Free security solutions are all I need
- 6.20 If i use ssl to send emails nobody can peek into my emails
- 6.21 I am invisible if I use ‘incognito’, ‘private’ or ‘guest’ browsing
- 6.22 Hiding your wireless network’s name improves its security
7. Online safety for parents
- 7.1 Advises for parents and tutors in regard to online safety
- 7.2 Parental supervision for sharing
- 7.3 Parental control for browsing
8. 10 signs you should invest in your personal cyber security
- 8.1 You see unauthorized expenses
- 8.2 You have one single password for everything
- 8.3 Your computer and browser are slower than before
- 8.4 You appear logged on from various geographical locations
- 8.5 You see posts you never authorized or wrote on Facebook
- 8.6 Your emails are marked as spam
- 8.7 You see a lot more ads in the browser
- 8.8 You unsubscribe from spams
- 8.9 You give personal information when requested by a stranger
- 8.10 You install software a page pretends to require
The Leanpub 60-day 100% Happiness Guarantee
Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
See full terms
80% Royalties. Earn $16 on a $20 book.
We pay 80% royalties. That's not a typo: you earn $16 on a $20 sale. If we sell 5000 non-refunded copies of your book or course for $20, you'll earn $80,000.
(Yes, some authors have already earned much more than that on Leanpub.)
In fact, authors have earnedover $12 million USDwriting, publishing and selling on Leanpub.
Learn more about writing on Leanpub
Free Updates. DRM Free.
If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).
Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.
Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.
Learn more about Leanpub's ebook formats and where to read them