Summary of “No One Can Hack My Mind”

Looking for the report?
We have the summary! Get the key insights in just 5 minutes.

“No One Can Hack My Mind” summary
Start getting smarter:
or see our plans

Rating

7 Overall

9 Applicability

7 Innovation

6 Style


Recommendation

Much of the advice people receive on how to stay safe online is cumbersome to follow. How then can people protect themselves from cybercrimes? Google employees Iulia Ion, Rob Reeder and Sunny Consolvo compare the online security practices of nonexperts with those of security experts. They identify issues users face in applying the security measures popular among experts and make suggestions for how to overcome these limitations. getAbstract recommends the authors’ findings to browser developers, software developers and users of technology in general.

In this summary, you will learn

  • How the online security practices and attitudes of tech-savvy experts differ from those of non-tech-savvy users,
  • What measures would help nonexpert users be safe online and
  • Which areas of security advice need improvement.
 

About the Authors

Iulia Ion, Rob Reeder and Sunny Consolva work at Google.

 

Summary

In response to cybercrimes like stealing credit-card data and leaking nude celebrity pictures, many articles and blogs have published recommendations on how to stay safe online. Advice includes selecting strong passwords, choosing solid security questions and not using cloud backup services for photos. However, users will only implement tips that are effective and easy to implement. Experts and nonexpert users differ in their approaches to protecting their security online in several areas:


More on this topic

Customers who read this summary also read

How To Be Calm Under Pressure
How To Be Calm Under Pressure
8
How to Encrypt Your Entire Life in Less than an Hour
How to Encrypt Your Entire Life in Less than an Hour
8
Virtual Billions
Virtual Billions
8
The Malicious Use of Artificial Intelligence
The Malicious Use of Artificial Intelligence
8
The Story of Tencent 1998-2016
The Story of Tencent 1998-2016
8
The Hacked World Order
The Hacked World Order
9

Related Channels

Comment on this summary