Today I’d like to share with you my new favorite book about personal cybersecurity, Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals by Bart R. McDonough. I’ll give you my summary of the book, but I highly recommend that you read the book for yourself!
With IDrive, you can backup unlimited PCs, Macs, iPhones, Ipads, and Android devices into a single account securely. Files and folders will be synced in real-time across all the devices.
BackBlaze provides astonishingly easy and low-cost cloud storage for your files. You can automatically back up your Mac or PC files and access them anywhere.
Sync makes it easy to store, share, and access your files from just about anywhere. It also provides privacy protection with end-to-end encryption, ensuring your data are safe and secure in the cloud.
Carbonite helps protect personal and business data from common forms of data loss. It also offers excellent defense against ransomware attack, hardware failure, and even for device loss or theft.
- Cyber Smart Book Review & Summary
- Introduction
- Overview of Cyber Risks
- Attackers
- Attack Methods
- Attack Vectors
- Brilliance in the Basics
- Incident Response
- Protecting Your Identity
- Protecting Your Children
- Protecting Your Money
- Protecting Your Email
- Protecting Your Files
- Protecting Your Website Access and Passwords
- Protecting Your Mobile Devices
- Protecting Your Home Wi-Fi
- Protecting Your IoT Devices
- Protecting Your Information When Traveling
- Cyber Smart Book Review – Final Thoughts
Cyber Smart Book Review & Summary
This is now my top recommendation in personal cybersecurity books! It’s the type of book I would write; it’s exactly the type of content I’m working to share through Defending Digital. It’s bursting with step-by-step advice for everyday individuals to protect their devices, networks, accounts, identities, money, and personal data. The plethora of steps are based on 5 simple “cybersecurity hygiene” habits.
In most personal cybersecurity books you needed to wade through the fluff to find the practical advice. Not so with this one! It’s spelled out with many lists of numbered steps. There are plenty of specific examples to illustrate digital dangers. I like how common myths are dispelled with facts.
Much of the advice is repeated from section to section. This is fine if you treat the book as a reference, but it’s tiring if you read it cover to cover as I did. Some of the stories are slightly longer than necessary to make their point.
Part 1 describes various threats to personal cybersecurity, with a few protection tips sprinkled in. Part 2 goes into more detail, with many specific protection recommendations. The book’s emphasis is more on security than privacy, though there are privacy-related tips.
McDonough is a cybersecurity expert, and he brings in authoritative research to support his advice. He’s the CEO and founder of Agio, a provider of cybersecurity and managed IT, and he’s on the board of several security companies.
McDonough both raises awareness and gives practical advice on prevention and remediation. He’s realistic; he doesn’t resort to doom-and-gloom scare tactics, nor does he have an overly-optimistic, Pollyanna attitude.
In my summary below, I generally only define terms and acronyms once, so if you don’t understand one, look higher in the post, or check the glossary.
Introduction
Online, we all live in a “bad neighborhood” and need to take precautions.
“Brilliance in the Basics” Habits
- Update devices
- Enable two-factor authentication (2FA)
- Use a password manager
- Install and update anti-malware
- Back up data
Overview of Cyber Risks
Before performing a wire transfer, confirm instructions with the other party, in person or by video or phone call. Do a test transfer of $100 before doing the rest.
81% of hacking-related breaches used stolen and/or weak passwords.
Definitions
Breach: incident where sensitive, private, or confidential info is accessed without authorization.
Cyberattack: attack with a primary objective of accessing, modifying, disclosing, selling stolen info. Doesn’t necessarily involve hacking.
Hack: malicious act using manual or automated tech to crack a code or break into a target’s computer systems.
Attackers
90% of hackers are under age 34, 97% are male, 45% have full-time jobs, and hack in spare time, according to HackerOne study.
72% of hackers hack for the money, 71% for fun, 66% for the challenge, 51% to do good.
80% of black-hat hackers are connected to criminal organizations.
Attack Methods
Phishing is the most common way individuals are hacked.
Phone numbers can be spoofed easily, so don’t provide personal info by phone or SMS/text unless you verify the recipient is valid and there’s a true need.
To guard against crypto-jacking, use anti-malware and browser plugin that can block it, monitor CPU levels and computer processes.
FBI says don’t pay ransomware ransoms because bad actors may not decrypt your files, and paying encourages the behavior.
If you receive a call claiming to be tech support, hang up and call support number on the company website, or submit a help desk ticket through the company website.
FBI says if you receive a suspicious call demanding money in a short time for sake of family or friend, hang up or use a different form of communication to check with referenced family or friend.
Protect Yourself from Robocalls
- See if your phone carrier has robocall protection.
- Get a robocall-blocking app such as Nomorobo.
- Don’t answer unknown calls.
Attack Vectors
Financial institutions will never ask for your password or 2FA passcode by email, SMS/text, phone; only on their website.
Disable setting that allows devices to connect to open Wi-Fi.
Brilliance in the Basics
There’s far less malware for Macs than Windows, but there exist adware, spyware, potentially unwanted programs (PUPs) for Macs that Apple’s XProtect doesn’t guard against, but anti-malware will.
Incident Response
Phishing Victim Response
- Disconnect your computer from the Internet.
- Restart in “safe mode” (search “safe mode” and name of your operating system for instructions).
- Back up to secure external drive.
- Check for malware.
- From a known clean device, change the credentials of the account that was targeted.
- Enable fraud alert and credit freeze with credit bureaus (Experian, Equifax, TransUnion, Innovis).
- Report to authorities (IC3, US-CERT) and forward phishing email to [email protected], including full email header. File a complaint at FTCcomplaintAssistant.gov. Report phishing email to [email protected]. If the damage was high enough, file a report with local law enforcement. See IdentityTheft.gov for steps to minimize the risk of ID theft.
Ransomware Response
- Gather evidence (symptoms, etc.). Take screenshots/photos of the ransom note.
- Disconnect the computer from the Internet.
- Restart the computer in safe mode.
- Use anti-malware to scan for ransomware.
- Use Crypto Sheriff to check for solutions.
- Search for additional decryption tools (search “decryption” and name of ransomware).
- Reinstall operating system (OS) to ensure ransomware is completely removed. Search “reinstall” and name of OS for instructions.
- Report ransomware to IC3.
Malware Response
- Disconnect your device from the Internet.
- Restart in “safe mode.”
- Back up to secure external drive.
- Delete temp files (search for instructions).
- Scan for malware using installed anti-malware. Then use a different computer to put Malwarebytes on a USB drive, and use that to install it on an infected computer and scan with it.
- Reboot to normal mode.
- Scan for malware again.
- Install updates to OS and applications.
- Fix browser settings (if necessary).
- Reinstall OS if the computer still seems infected, or you want to be sure to be clean.
- Change credentials for all accounts.
Email Compromise Response
- Reset password to a strong password.
- Enable 2FA.
- Check email settings for any sign of an attacker.
- Check forwarding settings.
- Check the sent email.
- Change credentials for all accounts.
Protecting Your Identity
LifeLock has experienced multiple security issues and lawsuits.
Protect Identity and Credit
- Freeze credit with credit bureaus.
- Put a security freeze on mobile numbers with NCTUE and bank accounts with ChexSystems.
- Opt-out of pre-approved credit offers at OptOutPrescreen.com.
- Shred unnecessary sensitive documents. Store necessary sensitive documents in a locked safe.
- Remove mail from the mailbox ASAP. Dropping outgoing mail off at the post office is safer than using your mailbox.
- Beware phishing. Be careful with links and attachments.
Protecting Your Children
Protect Child’s ID
- See if the child has a credit file. If yes, review it. If not, open it. Do with 4 credit bureaus.
- Freeze child’s credit.
- Only give out the child’s SSN when truly necessary.
- Talk to the child about keeping info private.
- Lockdown child’s FAFSA account.
Protect Child from Smart Toys
- Research toy’s cybersecurity and privacy practices.
- Only connect the toy to a network you own, preferably one separated from your main network.
- Ensure the toy’s connection to the Internet is encrypted, and Bluetooth connections require authentication.
- Apply updates promptly.
- Review and purge recorded video and audio from the toy as necessary.
- Turn off the toy when not used.
- Use strong, unique passwords and 2FA if available.
- Limit info entered into an online account.
- Report anything suspicious to IC3.
Protect Child Online
- Create a separate computer account for each family member, with only as many permissions as necessary.
- Consider parental-control software such as what’s included in iOS, Qustodio, Net Nanny, Circle Home Plus.
Qustodio provides powerful monitoring tools and parental controls for things like screen time, adult content, and games. It gives parents visibility and creates daily opportunities to talk with kids about their online experiences.
Net Nanny protects your child against dangerous content and online threats. You can block apps and websites on your child's device, and get peace of mind with the best parental control software on the market.
Protecting Your Money
- Enable 2FA and create nonsense answers to security questions.
- Use a password manager to create unique, complex passwords.
- Create a verbal password/PIN.
- Use separate email account for finances.
- Use separate, locked-down devices for finances.
- Bookmark financial websites; don’t type their URLs.
- Use only verified financial apps.
- Freeze credit.
- Enable alerts.
- Ensure accounts have 0% fraud liability.
- Watch for card-skimming devices. Cover keyboard as you type PIN into the card reader. Use card readers in busy areas covered by security cameras.
- “Dip” card’s chip; don’t swipe the magnetic stripe. Or use mobile payment such as Apple Pay.
Protecting Your Email
- Enable 2FA.
- Use separate email accounts for separate purposes (banking, shopping, media, social media, etc.).
- Move sensitive info from email to secure file storage.
- Review activity and settings.
- Understand email privacy. Consider a provider of end-to-end encryption such as ProtonMail.
ProtonMail allows you to get a secure email account for free. Get automatic email security, anonymous email, and secure your data and neutrality.
Protecting Your Files
Backup Services
With IDrive, you can backup unlimited PCs, Macs, iPhones, Ipads, and Android devices into a single account securely. Files and folders will be synced in real-time across all the devices.
BackBlaze provides astonishingly easy and low-cost cloud storage for your files. You can automatically back up your Mac or PC files and access them anywhere.
Sync makes it easy to store, share, and access your files from just about anywhere. It also provides privacy protection with end-to-end encryption, ensuring your data are safe and secure in the cloud.
Carbonite helps protect personal and business data from common forms of data loss. It also offers excellent defense against ransomware attack, hardware failure, and even for device loss or theft.
Protecting Your Website Access and Passwords
Password creation formula, for when you can’t have password manager create
- Pick 3 unrelated words.
- Between 2 words, put 2-3 numbers.
- After numbers, put symbol.
- Misspell a word.
- Capitalize a letter in a random location.
Changing passwords periodically doesn’t provide much benefit as long as passwords are strong, complex, random, unique. NIST no longer recommends periodic password changes, and a Carleton University study found the practice had minimal benefit.
Protect Online Accounts
- Enable 2FA whenever possible. Authenticator apps are more secure than SMS/text.
- Use a password manager to create and manage passwords.
- Consider a VPN to shield you from your ISP.
- Before clicking a link, hover over it to see the destination. Expand shortened URLs with CheckShortURL.
- Get alerts when the website you use is breached, from your password manager or Have I Been Pwned?
- When a site you use is breached, change your password ASAP.
- Create nonsense answers to security questions.
- Enable security and activity notifications.
- Ensure the site is encrypted (using HTTPS) before entering sensitive info.
- Install ad-blocking and script-blocking browser extensions.
- Don’t use social logins (Google, Facebook, etc.).
- Access accounts from a secure device.
- Review privacy settings.
Protecting Your Mobile Devices
Protect Against Port-out Scams
- Set passcode/PIN on your mobile account.
- Use the authenticator app, not SMS/text for 2FA.
- Ask phone company to enable port freeze and SIM lock. You can also set a SIM PIN on the phone.
- Use Google Voice for accounts that only support SMS/text 2FA.
Protect Mobile Device
- Use a securely designed device. iOS has secure design, less malware, updates managed directly by Apple. If you choose not to use Apple, get a Google Pixel device because they get more regular updates than other Android devices.
- Don’t jailbreak.
- Enable lock screen. Use code of 6+ digits. On Android, use passcode, not pattern. If you use patterns, use 8+ points in the pattern.
- Encrypt device.
- Apply updates promptly.
- Back up to the cloud.
- Install apps only from the official app store.
- For Android, consider anti-malware (Bitdefender is rated highly). iOS doesn’t need anti-malware.
- Enable “Find my device” and remote wipe options.
Protecting Your Home Wi-Fi
- Use a securely designed, modern router. Buy, don’t rent. Replace router when no firmware has been released in last year.
- Lockdown router’s admin console by setting a strong password.
- Set SSID (network name) to something generic that doesn’t identify you.
- Regularly update router firmware. Enable auto-updates if possible; if not, sign up for email notifications of updates, if possible.
- Use WPA2 with a strong password.
- Lockdown router configuration. Disable insecure options such as WPS, UPnP, Ping, Telnet, SSH, HNAP. Disable remote management. Enable firewall.
- Set up a guest network for visitors and IoT (Internet of Things) devices.
- Consider turning Wi-Fi off when not home.
Protecting Your IoT Devices
Only wear wearables (fitness trackers, smartwatches, etc.) when necessary, and lockdown privacy settings. Researchers have used data from wearables to learn PINs and passwords with 90% accuracy.
Protect IoT Devices
- Buy from reputable companies. Research security history and frequency of updates. Ensure you can change device passwords.
- Review the device’s privacy policy.
- Set strong passwords.
- Install updates promptly. Enable auto-updates if possible; if not, sign up for email notifications of updates, if possible.
- Install only verified apps.
- Lockdown security and privacy settings.
- Secure home Wi-Fi. Consider a separate network for IoT devices.
- Disable features you don’t need.
Protecting Your Information When Traveling
Avoid USB charging stations, which can be hijacked. Use electrical outlets or a USB cable that doesn’t carry data.
Protect Info When Away from Home
- Disable auto-connect to available Wi-Fi.
- Disable Wi-Fi when not needed.
- Verify the network before connecting.
- Use a VPN when using public Wi-Fi, to encrypt and encapsulate emails, sites you visit, credentials, etc. VPN protects more than using HTTPS sites. TunnelBear is a good VPN.
- Use cellular data rather than public Wi-Fi, if possible.
- Carry only necessary payment info and ID documents.
- Don’t post photos of boarding passes, passport, other travel documents.
- Don’t post about your trip. Disable location tracking on social media.
Protect Info When Traveling Out of Country
- See the section immediately above.
- Research country-specific travel advisories.
- Remove sensitive info from devices and voicemail.
- Take a “burner” (temporary) phone, not your phone.
- When having sensitive conversations, turn off the phone and remove the battery if possible.
- Put black tape over camera would not using.
- Use a VPN.
- Use private browsing.
- Upon return home, wipe the burner phone and laptop. Change all passwords.
Cyber Smart Book Review – Final Thoughts
I recommend that you read the book, Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals by Bart R. McDonough.
With IDrive, you can backup unlimited PCs, Macs, iPhones, Ipads, and Android devices into a single account securely. Files and folders will be synced in real-time across all the devices.
BackBlaze provides astonishingly easy and low-cost cloud storage for your files. You can automatically back up your Mac or PC files and access them anywhere.
Sync makes it easy to store, share, and access your files from just about anywhere. It also provides privacy protection with end-to-end encryption, ensuring your data are safe and secure in the cloud.
Carbonite helps protect personal and business data from common forms of data loss. It also offers excellent defense against ransomware attack, hardware failure, and even for device loss or theft.
The Resources page has additional cybersecurity and privacy books.
What You Should Do
I recommend that you read the book. I realize my summary is long, but there’s a lot more in the book! Because I’ve already included so much above, I’m going to limit my parting advice to the 5 “Brilliance in the Basics” habits from the book:
- Update devices.
- Enable two-factor authentication (2FA).
- Use a password manager.
- Install and update anti-malware.
- Back up data.
LastPass helps you remember and manage your secure passwords all in one place. Never forget a password again.
Keeper is a top-rated password manager for protecting you, your family, and your business from password-related data breaches and cybersecurity threats.
1Password remembers all your passwords, so you can easily log in to sites with a single click.
Dashlane fills all your passwords, payments, and personal details wherever you need them, across the web, on any device.
I like how you mentioned that you should use a separate email account for finances to protect them online. My son recently set up a bank account and he was wondering how he can protect his account from potential hackers. I’ll let him know that he should use a different e-mail from his personal one for his new bank account.
Devin, thanks for commenting. I’m glad you’re helping your son protect his bank account! Some additional advice:
A couple other posts that you and he may find helpful: