I recently read the book Online Danger: How to Protect Yourself and Your Loved Ones From the Evil Side of the Internet by Dr. Eric Cole. In addition to the tips it shares, it teaches a security mindset. I’d like to share my Online Danger book review and summary with you. I also encourage you to read the book for yourself!
Online Danger Book Review And Summary
The book contains practical personal cybersecurity advice for the average person. It’s neither overly simplistic nor overly advanced. Dr. Cole deliberately shares only fairly basic tips, skipping those that average users won’t implement because they’re too difficult. Each chapter ends with bullet points containing the chapter’s salient points.
- Amazon Kindle Edition
- Cole, Eric (Author)
- English (Publication Language)
- 183 Pages - 01/12/2018 (Publication Date) - Morgan James Publishing (Publisher)
Dr. Cole explains not only how to protect yourself, but also how to protect your family, and how to help them protect themselves by teaching them a security and privacy mindset.
Dr. Cole summarizes the book by saying, “Remember, everyone on the Internet could be out to get you, use your common sense.” He points out that, as much as possible, you must be responsible for your security and privacy. He sets realistic expectations; rather than telling you that following his advice will make you unhackable, he says,
Success in cybersecurity comes in reducing the frequency of hacks or breaches and minimizing the impact on our lives.
He also says,
‘Prevention is ideal, but detection is a must.’ Truly, you will not be able to stop all attacks, but you should make it your goal to minimize or control the damage.
The book is somewhat repetitive, but that was probably deliberate, to reinforce points. I don’t like that the book uses a ninja theme, telling you to “be a cyber ninja” and frequently using ninja-related terms. Please don’t use “ninja” or related terms unless you’re talking about Japanese covert agents who existed prior to the 18th century.
Dr. Cole is the founder of a cybersecurity consulting firm. He is an actively involved SANS Fellow, and was CTO of McAfee. He’s the parent of 3 kids, so he has experience helping kids stay safe online.
Here are my notes from the book.
The New World Order
4 basic cybersecurity principles (security 101)
- Always run the latest version of any software you install.
- Don’t put off installing patches from software vendors.
- Uninstall any software you don’t use. Think of each program like a window in a house. The more windows, the more opportunities for someone to break in.
- Never use an administrator account for daily activity; log in as a normal user with limited access. This limits the damage in case of compromise.
Use one computer/device only for all sensitive or personal info (taxes, banking, passwords, etc.). Use a different computer/device for everything else, and never for sensitive or personal info.
The Realities of Cyberspace
Before giving away or recycling electronics, remove their hard drives, or securely wipe them.
Secrets and Lies
To defend against spoofing and phishing, verify the sender’s identity through a different communication medium. For example, verify that someone sent an email by calling or texting them.
Don’t answer quizzes and surveys, which often ask for personally identifiable info (PII).
Don’t share your location online, through posts or checking in. Doing so makes your home vulnerable to thieves, and shares details about your daily routine.
Use anti-malware software, host-based intrusion prevention (HIPS), application whitelisting (list of approved software), full-disk encryption (FDE).
Losers, Slime Balls, Forlorn Lovers, and Predators
Ask callers to verify their identity by providing details about the company they claim to call from. If they can’t, or if you have any doubt, hang up and call the company directly.
Use file-sharing services such as Dropbox instead of email attachments.
Don’t connect your computer directly to your modem; put a router in between, because it contains a firewall.
Back up any valuable data. Always assume your system could be made unusable at any time.
You Are the Target
Any time you walk away from your computer or device, lock the screen. Any time you’ll be away from it for an extended period, turn it off.
Never post your address, current location, school you or your kids attend.
Before accepting a questionable friend on social media, verify their identity through friends or phone calls.
Don’t use the “remember me” feature on websites, because they often lack security.
Don’t save credit card numbers online.
Use separate credit cards for online purchases. That makes it easier to pinpoint the source of fraudulent charges. Set low limits on those cards.
Thoroughly review your free credit reports (AnnualCreditReport.com), and consider buying additional ones to check more frequently.
IdentityTheft.gov contains resources for managing identity theft.
Enable airplane mode on your phone when you don’t need it to communicate, to increase protection.
From a functionality perspective, you want data in many places. From a security and personal protection standpoint, you want data in a minimal number of places. Achieve balance with these conflicting strategies by focusing on the access and storage of the information.
Smile, You’re Being Recorded! Permanently
Limit which apps can track your location.
Treat your email as a public record, because it could be compromised. Also, keep in mind that email constitutes a legal record and can be admissible in legal actions.
Secure delete programs aren’t foolproof; destroying a hard drive is the only foolproof method.
Before you store sensitive data online, encrypt it on your computer.
“The only foolproof way to protect yourself against being recorded is to go camera-less or microphone-less. … try to buy devices without any type of recording features.” If you can’t, then cover, block, or disable them.
Childproofing Cyberspace (for Kids and Adults!)
Follow your children online [on social media], but do not interact with them, at least not in front of their friends. … Do let your children know they are being watched, and quickly address any concerning behavior.
Parents should measure the trust and independence they want for their children against safety and caution. Rather than feeling like you are invading their privacy, commit to the idea that you are protecting them.
Don’t give kids admin access on any device.
Periodically, and unannounced, use your kids’ devices. When you do, check browsing history. If your child has deleted history, that’s a sign of trouble.
Set up parental controls on any device you give to kids. Disable location tracking (although you may want to use a location tracking app to track them). Require passwords before in-app purchases. Limit or disable data usage. Restrict incoming and outgoing calls to approved numbers.
Only allow kids’ devices to be used and charged where and when adults can supervise.
When children become old enough, remove parental controls, but still monitor behavior.
Approach children as their ally; you’re not trying to get them in trouble, but to save them from trouble.
Qustodio provides powerful monitoring tools and parental controls for things like screen time, adult content, and games. It gives parents visibility and creates daily opportunities to talk with kids about their online experiences.
Is It Time to Become Amish?
Just as driving less will decrease your chances of getting in an accident, even if you don’t completely stop driving, so decreasing the data you store and your Internet usage will decrease your chances of digital injury, even if you don’t completely stop using the Internet.
Depending on what you do online, consider cyber insurance for yourself or your family.
Online Danger Book Review – Final Thoughts
I recommend that you read the book, Online Danger: How to Protect Yourself and Your Loved Ones From the Evil Side of the Internet by Dr. Eric Cole. The Resources page has additional cybersecurity and privacy books.
- Amazon Kindle Edition
- Cole, Eric (Author)
- English (Publication Language)
- 183 Pages - 01/12/2018 (Publication Date) - Morgan James Publishing (Publisher)
What You Should Do
Read the book. Yes, I’ve summarized it here, but that’s not a substitute for reading the book. The book provides not only tips, but also teaches a security mindset. Here are a few tips I’ve hand-picked from the book:
- Uninstall any software you don’t use. Think of each program like a window in a house. The more windows, the more opportunities for someone to break in.
- Before giving away or recycling electronics, remove their hard drives, or securely wipe them.
- To defend against spoofing and phishing, verify the sender’s identity through a different communication medium. For example, verify that someone sent an email by calling or texting them.
- Don’t answer quizzes and surveys, which often ask for personally identifiable info (PII).
- Don’t share your location online, through posts or checking in. Doing so makes your home vulnerable to thieves, and shares details about your daily routine.
- Use file-sharing services such as Dropbox instead of email attachments.
- Never post your address, current location, school you or your kids attend.
- Before accepting a questionable friend on social media, verify their identity through friends or phone calls.
- Don’t give kids admin access on any device.
BitDefender Internet Security offers the best security against all Internet threats. Includes a privacy firewall to block intrusions and filter traffic, and secure VPN for complete online privacy.
Norton Security offers multiple layers of protection for your Cyber Safety. Protect all your devices against viruses and malware.
F-Secure helps protect your devices against online threats. It also ensures that your identity is protected while you browse the web.
ESET provides advanced security for all your Windows, Mac, Android, and Linux devices. It blocks and eliminates even the most advanced threats.
Avira Pro protects your devices from malware, spyware, ransomware, and adware. It lets you bank, shop, pay, and email with complete confidence.
Avast Free is packed with the largest threat-detection network, machine-learning virus protection, and home network security that will not slow down your PC.
Avast Premium is more than just an antivirus. It offers complete protection against cybersecurity and privacy threats.
Kaspersky guards your devices against viruses, secures and stores your passwords and private documents, and encrypts the data you send and receive online with VPN.
McAfee provides virus protection against the latest malware, spyware, and ransomware attacks. It also has a password manager and a VPN for a safe web browsing experience.