The technology in the world we live in is amazing. The phenomenal pace at which the online world has progressed this century has reshaped our lives. Think about all the things you can do online now! You can apply to college, get a job, and buy almost anything you want right from a home computer or a mobile device anywhere in the world. You can communicate with your friends and family and even thousands of strangers instantly through social media. Young people growing up now can’t even remember a world where this technology and connectedness didn’t exist.
These wonderful abilities to transact and to share online aren’t without their pitfalls. Criminals follow opportunities, and these technologies have created new ways for them to commit crimes. For example, I once had packages stolen from my porch. Luckily, I was able to use footage from my surveillance cameras to help the police track down the thieves. These cameras help me know who is at my door and when packages have been delivered. Unfortunately, they can also be hacked to spy on me. These days, I worry more about my cameras being hacked than my packages being stolen.
My family keeps cherished home photos and videos, key financial documentation, and other important files on a network-attached storage device (NAS). Our NAS provides reliable storage, but it’s vulnerable to hackers. All major NAS brands have been the target of multiple ransomware attacks, including mine.
These types of attacks have just added to the types of personal cybersecurity issues we already have to be aware of. Thieves still pilfer mail in hopes to find something that can help steal your identity. Scammers still con people into giving away personal details and credit card information over the phone and through email.
You can do a great job of securing your home network and not falling prey to scammers, and still be a cybersecurity victim. The problem is that you don’t have control over the way others protect your private data. Large companies like Home Depot, Facebook, and Marriott have all leaked private data to hackers.
I’ve painted a dire picture, but you can protect yourself. You can stop hackers from breaking into your home network. You can learn practices to prevent your accounts from being compromised. You can take proactive steps to protect your identity, even if a company leaks your private data. Good personal cybersecurity practices will only grow in importance as technology advances. This book gives you all the tools you need to protect yourself.