Catalog

Record Details

Catalog Search



No safe harbor : the inside truth about cybercrime - and how to protect your business  Cover Image Book Book

No safe harbor : the inside truth about cybercrime - and how to protect your business / Mark Sangster.

Sangster, Mark, (author.).

Summary:

"Stories of massive data breaches litter the 24-hour newsday headlines. Hackers and cybercrime syndicates are hitting a who's who of banks, retailers, law firms, and healthcare organizations: companies with sophisticated security systems designed to stop crime before it starts. They're also hitting companies that thought they were too small to matter. So how do cybercriminals continue to breach the defenses of the big companies--and why do they go after the small ones? And, most importantly, how can companies of all sizes protect themselves? Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals. Within a security context, deep social engineering is the newest and biggest means of breaching our systems. Sangster shows readers that cybersecurity is not an IT problem to solve--it is a business risk to manage. Organizations need to shift the security discussion away from technology gates alone toward a focus on leadership, team behaviors, and mutual support. Sangster punctuates his eye-opening narratives with sets of questions businesspeople at all levels need to ask themselves, facts they need to know, and principles they need to follow to keep their companies secure."-- Provided by publisher.

Record details

  • ISBN: 9781989603420 (hardcover)
  • Physical Description: 176 pages ; 23 cm
  • Publisher: Vancouver, British Columbia : Page Two Books, [2020]

Content descriptions

Bibliography, etc. Note:
Includes bibliographic references and index.
Subject: Business enterprises > Computer networks > Security measures.
Computer security.
Computer crimes.

Available copies

  • 1 of 1 copy available at Tsuga Consortium.

Holds

  • 0 current holds with 1 total copy.
Show Only Available Copies
Location Call Number / Copy Notes Barcode Shelving Location Status Due Date
Cookstown Branch 658.478 San 31681010219079 NONFIC Available -

LDR 02546cam a2200337 i 4500
001356331
003TSUGA
00520201027121444.0
008200203s2020 bcc b 001 0 eng
015 . ‡a20200312855 ‡2can
020 . ‡a9781989603420 (hardcover) ‡c$29.95
035 . ‡a(CaOWLBI)pr05719863
035 . ‡apr05719863
040 . ‡aCaOWLBI ‡beng ‡cCaOWLBI ‡erda ‡dCaOWLBI
055 0. ‡aHD30.38 ‡b.S36 2020
090 . ‡a658.478 San
1001 . ‡aSangster, Mark, ‡eauthor.
24510. ‡aNo safe harbor : ‡bthe inside truth about cybercrime - and how to protect your business / ‡cMark Sangster.
2463 . ‡aNo sage harbour
264 1. ‡aVancouver, British Columbia : ‡bPage Two Books, ‡c[2020]
264 4. ‡c©2020
300 . ‡a176 pages ; ‡c23 cm
336 . ‡atext ‡btxt ‡2rdacontent
337 . ‡aunmediated ‡bn ‡2rdamedia
338 . ‡avolume ‡bnc ‡2rdacarrier
504 . ‡aIncludes bibliographic references and index.
520 . ‡a"Stories of massive data breaches litter the 24-hour newsday headlines. Hackers and cybercrime syndicates are hitting a who's who of banks, retailers, law firms, and healthcare organizations: companies with sophisticated security systems designed to stop crime before it starts. They're also hitting companies that thought they were too small to matter. So how do cybercriminals continue to breach the defenses of the big companies--and why do they go after the small ones? And, most importantly, how can companies of all sizes protect themselves? Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals. Within a security context, deep social engineering is the newest and biggest means of breaching our systems. Sangster shows readers that cybersecurity is not an IT problem to solve--it is a business risk to manage. Organizations need to shift the security discussion away from technology gates alone toward a focus on leadership, team behaviors, and mutual support. Sangster punctuates his eye-opening narratives with sets of questions businesspeople at all levels need to ask themselves, facts they need to know, and principles they need to follow to keep their companies secure."-- ‡cProvided by publisher.
591 . ‡bCanadian
650 0. ‡aBusiness enterprises ‡xComputer networks ‡xSecurity measures.
650 0. ‡aComputer security.
650 0. ‡aComputer crimes.
852 . ‡aINNISFIL ‡bCOOKSTOWN ‡cNONFIC ‡zIn process ‡gbook ‡h658.478 San ‡p31681010219079
905 . ‡utechserv
901 . ‡a356331 ‡b ‡c356331 ‡tbiblio ‡soclc

Additional Resources