Cyber Attack Survival Manual Book Review

I’d like to share with you my summary of the book Cyber Attack Survival Manual: From Identity Theft To The Digital Apocalypse And Everything In Between by Nick Selby and Heather Vescent.

Cyber Attack Survival Manual Book Review & Summary

The book contains pretty good personal cybersecurity advice covering a range of topics, but it’s not as helpful as other books I’ve read, and it’s not very engagingly written. Each chapter ends with takeaways in 3 levels: basic security, advanced measures, and tinfoil-hat brigade (for the extremely cautious or paranoid). The book has a realism and grittiness that probably comes from co-author Selby’s police work. I like the artwork throughout the book (see sample below).

Co-author Nick Selby is a police detective who investigates computer crime, fraud, and child exploitation. He consults law enforcement agencies on cyber intelligence and investigations. He has fought cybercrime for over a decade and is well-acquainted with online scams, fraud, and hacks.

Co-author Heather Vescent is a futurist with expertise in cyber-economics and cryptocurrency.

Here are my notes from each chapter.

The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse
  • Amazon Kindle Edition
  • Selby, Nick (Author)
  • English (Publication Language)
  • 405 Pages - 10/10/2017 (Publication Date) - Weldon Owen (Publisher)
Cyber Attack Survival Guide illustration
Illustration from Cyber Attack Survival Manual by Nick Selby and Heather Vescent.

Keep Your Identity Safe

Password managers

LastPass: Secure Password Management
Free

LastPass helps you remember and manage your secure passwords all in one place. Never forget a password again.

Check Out LastPass
We may earn a commission if you click this link and make a purchase at no additional cost to you.
Keeper: Personal and Business Password Manager
Free

Keeper is a top-rated password manager for protecting you, your family, and your business from password-related data breaches and cybersecurity threats.

Check Out Keeper
We may earn a commission if you click this link and make a purchase at no additional cost to you.
1Password: Password Manager For Homes and Businesses
$35.88

1Password remembers all your passwords, so you can easily log in to sites with a single click.

Check Out 1Password
We may earn a commission if you click this link and make a purchase at no additional cost to you.
Dashlane: Password Manager App For Home, Mobile, and Business
Free

Dashlane fills all your passwords, payments, and personal details wherever you need them, across the web, on any device.

Check Out Dashlane
We may earn a commission if you click this link and make a purchase at no additional cost to you.

Takeaways

  • Use a different strong password for every login (websites, desktop programs, phone apps).
  • Use a password vault program (password manager).
  • Don’t get your kids’ social security cards unless necessary.
  • Check kids’ credit at least quarterly.

Where the Money Is

  • If you get a message from your bank asking you for info, call the bank’s known number to ensure it’s legit.
  • Check credit reports regularly.
  • Use only cards with chips (don’t swipe).

Protect Your Privacy Online

Hackers can “sniff” insecure public W-Fi to see what you’re doing. Hackers can set up a second network with the same or a similar name as a trap. Always ask for the name of the network, and use a secured network whenever possible.

Think twice about storing sensitive data online (identification, tax docs, etc.).

Takeaways

  • Set all social media privacy settings as high as possible.
  • Protect home Wi-Fi with WPA2.
  • Don’t accept friend requests from strangers.
  • Never use public Wi-Fi without a VPN.
  • Restrict what you share on social media.
  • Consider covering cameras and microphones with electrical tape.
ProtonVPN: Secure and Free VPN Service
Free

ProtonVPN offers secure VPN through an encrypted VPN tunnel, so your passwords and confidential data stay safe, even when you are using public or untrusted Internet connections.


Check Out ProtonVPN
We may earn a commission if you click this link and make a purchase at no additional cost to you.

Keep Kids Safe Online

Kids shouldn’t assume nude photos they send will stay private.

Use OpenDNS to control the sites kids can visit.

To prevent kids from using a bootable operating system (OS) on your computer, set a BIOS password on a Windows machine or a firmware password on a Mac.

Teach kids that they’re not anonymous online, and there are bad people online. Don’t scare them, but help them understand the threat is real.

Set alerts for when a kid tries to access a blocked site or search certain words.

Check browsing history using your router or with ISP.

Regularly discuss online safety with kids as they grow. Praise good behavior. Let them know they can come to you if they get into trouble.

Review teen’s online footprint together; act like a college admissions officer or potential employer.

Takeaways

  • Monitor kids’ social media (with software, or manually).
  • Talk to kids about what’s safe to share.
  • Log traffic.
  • Enable GPS tracking on kids’ phones.

The Internet of Things

Protect yourself from Internet of Things (IoT) devices

  • Read everything you can about a device, especially data-use policies.
  • Opt-out of data collection and/or use offline or airplane mode.
  • Change default passwords immediately.

Secure messaging systems: Signal, Wickr, Tor.

Takeaways

  • Change default modem and router passwords.
  • Use screen lock codes on all mobile devices.
  • Isolate IoT apps from sensitive data.
  • Ensure medical devices are locked to only critical services.
  • Consider a separate home network or VLAN for IoT devices.

Not Just Phoning It In

Enable screen lock. Use a password instead of a PIN, if possible. Set screen to lock after a short amount of time (2 minutes or less).

Disable communication (Wi-Fi, hotspot, Bluetooth, NFC, etc.) and only enable when necessary.

Don’t use your phone on public Wi-Fi without a VPN. Or, use mobile data.

In the US, the government can use your fingerprints to unlock, but they can’t force you to give your password.

To better secure your phone, turn it completely off and remove the battery if possible.

Takeaways

  • Set a good password (7+ characters or numbers, or good pattern).
  • Encrypt phone.
  • Enable phone locator in case the phone is stolen.
  • Limit the number of days of email stored on the phone.
  • Use two-factor authentication (2FA) whenever possible.
  • Disable location services and only enable when necessary.

Cyber Security and Small Business

When selling online (e.g., Craigslist), limit the info you reveal. Consider a burner app (for a temporary phone number) and meet in public. Ensure a friend knows where you are.

Cloud backup

BackBlaze: Affordable Cloud Storage
$60

BackBlaze provides astonishingly easy and low-cost cloud storage for your files. You can automatically back up your Mac or PC files and access them anywhere.

Check Out BackBlaze
We may earn a commission if you click this link and make a purchase at no additional cost to you.

The Deep Dark Net

  • Surface Web: public websites, indexed by search engines.
  • Deep Web: websites not indexed by search engines, but can be visited using a standard browser if you know the address.
  • Darknet: websites that can’t be visited using a standard browser, and typically require a Tor browser to view. It also includes other protocols and environments (IRC, I2P, etc.).

International Cybersecurity

Burner apps for creating anonymous phone numbers: Burner One, Hushed, CoverMe.

If you travel out of the country, consider renting a phone or computer in the country you travel to, to avoid searching for devices when you return home.

Takeaways

  • Encrypt all products and communications.
  • Use separate devices when outside your country.

Summary

  • Password-protect and disable remote management on modem, router, any other Internet-connected devices.
  • Never give private info over email or text. Always call bank, utility, service that’s claiming to request info.
  • When shopping online, consider using guest checkout and one-time credit cards.

Cyber Attack Survival Manual Book Review – Final Thoughts

If you found this summary helpful, then read the book, Cyber Attack Survival Manual: From Identity Theft To The Digital Apocalypse And Everything In Between by Nick Selby and Heather Vescent.

The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse
  • Amazon Kindle Edition
  • Selby, Nick (Author)
  • English (Publication Language)
  • 405 Pages - 10/10/2017 (Publication Date) - Weldon Owen (Publisher)

The Resources page has additional cybersecurity and privacy books.

What You Should Do

Here are several tips I’ve hand-picked from the book.

  1. Use a different strong password for every login (websites, desktop programs, phone apps).
  2. Use a password vault program (password manager). (I like LastPass.)
  3. Use only cards with chips (don’t swipe).
  4. Protect home Wi-Fi with WPA2.
  5. Use OpenDNS to control the sites kids can visit.
  6. Teach kids that they’re not anonymous online, and there are bad people online. Don’t scare them, but help them understand the threat is real.
  7. Regularly discuss online safety with kids as they grow. Praise good behavior. Let them know they can come to you if they get into trouble.
  8. Change default modem and router passwords.
  9. Disable phone communication (Wi-Fi, hotspot, Bluetooth, NFC, etc.) and only enable when necessary.
  10. Encrypt phone.
  11. Enable a phone locator in case your phone is stolen.
  12. Use two-factor authentication (2FA) whenever possible.
  13. Disable location services and only enable when necessary.
  14. Password-protect and disable remote management on modem, router, any other Internet-connected devices.
  15. Never give private info over email or text. Always call bank, utility, service that’s claiming to request info.
ProtonVPN: Secure and Free VPN Service
Free

ProtonVPN offers secure VPN through an encrypted VPN tunnel, so your passwords and confidential data stay safe, even when you are using public or untrusted Internet connections.


Check Out ProtonVPN
We may earn a commission if you click this link and make a purchase at no additional cost to you.
Private Internet Access: Anonymous VPN Service
$39.95

Private Internet Access provides state of the art, multi-layered security with advanced privacy protection using VPN tunneling. It helps block unwanted connections, hide your IP address, and defend yourself from data monitoring and eavesdropping.

Check Out Private Internet Access
We may earn a commission if you click this link and make a purchase at no additional cost to you.
TorGuard: Anonymous VPN
$59.99

TorGuard protects you from hackers, net censorship, identity theft, and ISP's monitoring activities. It provides easy to use services that protect your online identity.

Check Out Torguard
We may earn a commission if you click this link and make a purchase at no additional cost to you.
ExpressVPN: High-Speed and Secure VPN
$99.84

ExpressVPN hides your IP address and encrypts your network data so no one can see what you're doing. You can access any content, no matter your location using ultra-fast VPN servers.

Check Out ExpressVPN
We may earn a commission if you click this link and make a purchase at no additional cost to you.
TunnelBear: Secure VPN Service
Free

TunnelBear encrypts your internet connection to keep your online activity private and anonymous. It's very easy to use for both consumers and teams.

Check Out TunnelBear
We may earn a commission if you click this link and make a purchase at no additional cost to you.
Windscribe: Free VPN and Ad Block
Free

Windscribe helps you browse the web privately as it was meant to be. It encrypts your web activity and blocks ads for a better web browsing experience.

Check Out Windscribe
We may earn a commission if you click this link and make a purchase at no additional cost to you.
SurfShark: Secure Your Digital Life
$71.88

SurfShark enables you to access the Internet anonymously. It prevents malware and phishing attempts, and blocks ads for a better web browsing experience.

Check Out SurfShark
We may earn a commission if you click this link and make a purchase at no additional cost to you.
Our Favorite VPN for Travel
NordVPN: One Click To Online Security

NordVPN provides a secure VPN service for everyone. It keeps your data safe and helps keep your online identity anonymous.

Check Out NordVPN
We may earn a commission if you click this link and make a purchase at no additional cost to you.

Leave a Comment