SURVIVING THE ZOMBIE APOCALYPSE: SAFER COMPUTING TIPS FOR SMALL BUSINESS

SURVIVING THE ZOMBIE APOCALYPSE: SAFER COMPUTING TIPS FOR SMALL BUSINESS MANAGERS AND EVERYDAY PEOPLE

Author: Max Nomad

While everybody boasts about having the best web technician the world has ever seen and absolutely no worries you might want to give this a whirl and see what you can do for yourself.

This is easy to read and gives you a great outline or a refresher course of what is happening in Zombie land!

Everybody that is anybody gets hacked and even Kaspersky Lab last month. Shocking right, no some people are just getting really good at what they do and financing these people to get it done!
zombie
This is a good read just ask Baron Samedi!

SURVIVING THE ZOMBIE APOCALYPSE: SAFER COMPUTING TIPS FOR SMALL BUSINESS MANAGERS AND EVERYDAY PEOPLE is a tech survival guide for anyone whose business and personal life is connected to the Internet. This friendly, novice-oriented reference uses the frightening — and often campy — Zombie Apocalypse as an allegory for the dangers of cyberspace.

Written for PC and Mac users, SURVIVING THE ZOMBIE APOCALYPSE is an armchair safari into the world of cybercrime. Readers will learn how to protect themselves through cautionary tales and insider explanations that take the mystery out of how these things work: how computer viruses and malware are part of a multi-billion dollar industry, how stolen credit cards pop up thousands of miles away without leaving their wallets, and how easily our computers can be used to commit crimes without our knowledge. Business managers will enjoy real-world strategies for preventing data theft and other digital disasters, along with cyber criminal secrets such as how even the best network security can be defeated with a phone call. In an era where hackers regularly prove that even Fortune 500 companies are not safe from crippling cyber attacks, this book is a must for any home or small office.

What readers are saying about this book: “Powerful, practical advice for any novice protecting their home and office from cybercrime.” – C.E. Pace, Department of Defense Computer Analyst and Booz Allen Hamilton IT Specialist (Ret.).

“I’m amazed at how much I’ve learned so far.” – William Lebo, Architect. A must read and you start increasing your knowledge level in the first chapter and it’s a fun read!” – Charlene Christopher, Special Education teacher (Ret.)

“Comparing the battle in the Cybersecurity realm to a ‘real life’ zombie apocalypse was a fresh approach…accurate and informative enough that a novice would be able to understand. The anecdotes are absolutely fascinating.” – Dave Helfen, Cybersecurity Director, VISA, Inc.

Buy now on Amazon!

Max Nomad is an IT Consultant, Graphic Designer, creative entrepreneur and computer security researcher with over 20 years of experience using Internet technology to assist (and protect) small businesses. Having worked with everything from stock brokerage firms to car dealership chains to ostrich farmers, his diverse client history has given him experience with a variety of large and small business needs. He also writes candid and informative essays focusing on publishing, graphic design and the underground side of cyber crime. He lives in Virginia Beach, Virginia.

Get these security tips and more:

Max Nomad, IT computer consultant and author of the book Surviving The Zombie Apocalypse: Safer Computing Tips for Small Business Managers and Everyday People offers up specific advice:

1) Perform a deep scan of your home computer(s) using multiple antivirus and malware removal programs. Massive data breaches mean that numerous computers were affected, including privately-owned machines. Take steps to make sure yours is clean before proceeding with step #2.

2) Change the password(s) to every account on your home computer.

3) Get a Password Locker app and use it to generate and store all your new passwords.

4) Go through and change the passwords to every online account. Online banking, online payment sites, etc. I would also recommend changing all work passwords but their IT departments are going to make that happen anyway.

5) Enable two-factor authentication everywhere possible, starting with anything related to banking and credit cards.

6) Make sure your emails are not being tracked. Tracking uses one or more images in an email to geo-locate where the message is being viewed. Disabling images in your message previews prevents this kind of tracking. Any messages you don’t trust, delete them instead of allowing them to download and display images that are part of the message.

7) If you don’t have a public key, go to https://gnupg.org, download the software and create one now. Aside from being able to send and receive securely encrypted emails, these can be used to digitally sign your public messages to verify that these posts came from you.

8) Be vigilant, both with your online communications as well as phones.

Buy now on Amazon!

Reviewed by R.G. Richardson