A cybersecurity expert breaks down what every manager needs to know about the ever evolving threat of hackers in this debut manual.
Fire brings necessary warmth and light, but it can also be a destructive force, one whose power humanity has often had to find ways to protect against. Technology and the internet have become equally ubiquitous, but unlike fire, the perils they pose are always changing, requiring a special vigilance to combat. For executives, vigilance doesn’t mean absolute expertise, and Boyle, in his manual, shares with readers the “lite” version of the easily understandable lessons he has crafted to help businesses both large and small become shrewd cyber-risk managers. Mitigating these dangers underscores cyber-readiness as not just a matter of tech, but also worker education. Numerous templates are offered for addressing employees on the subject of cybersecurity, not just informing them, but also discovering what they already know and can contribute. The adaptive NIST Cybersecurity Framework, developed by the Department of Commerce, is explained as well as strategies for identifying problem areas, preventing hacking, and addressing the crime after it happens, internally and through press releases. The book is divided into two parts, the first emphasizing good cyberhygiene, offering helpful tips free of confusing and unnecessary technical jargon. Where technical information is necessary, the text provides simple-to-understand history lessons, looking at past cybercrime and espionage like the Equifax hack, the National Security Agency’s EternalBlue exploit, the infamous Evgeniy Bogachev, and the dark web. Though human error and education are emphasized, the guide does not neglect the technical tools available, walking readers through useful programs like password managers and virtual private networks and providing advice on the best ones. The second part is a condensed version of the lessons the author teaches directly to his customers. Charts, tables, and equations provided here help calculate risk mitigation and cost/benefit analysis with relative ease. In both parts, helpful “phases” sections and accessible lists make revisiting the multitude of tips and tricks a breeze. The Online Cyber Risk Workbook this manual links to is also immensely informative. A comprehensive, valuable, and reader-friendly cybersecurity guide.