Summary of The Cybersecurity Playbook

Looking for the book?
We have the summary! Get the key insights in just 10 minutes.

The Cybersecurity Playbook book summary
Start getting smarter:
or see our plans

Rating

8

Qualities

  • Applicable
  • For Beginners
  • Engaging

Recommendation

Having lived through disastrous hacks and breaches at McAfee, one of the world’s foremost security software firms, author Allison Cerra proves an effective evangelizer for the everyday importance of corporate cybersecurity. Cerra offers detailed advice for each key player in the constant battle against hackers and cybercriminals, none more important than employees themselves. Her practical checklists for lead security officers, boards, the C-suite and HR and marketing professionals make this brief, accessible and engaging guide useful to building cybersecurity into the corporate culture.

About the Author

Allison Cerra leads McAfee’s marketing and communications teams as SVP and chief marketing officer. In this role, she has seen firsthand the reputational and financial risks wrought by lax cybersecurity measures.

 

Summary

Much of corporate cybersecurity depends on the good habits of employees.

One in five security breaches involves a mistake by a negligent employee. Mundane but important practices by employees in the firm represent one of the most vital defenses to cybercrime. These include creating strong passwords, changing them often, and not reusing them. Employees should familiarize themselves with common hacker tactics, including phishing emails. They should check with IT security before using cloud services and tools, use encrypted thumb drives, report suspicious emails and activity, never leave laptops and other devices with sensitive information unattended, and simply realize that hacker prevention doesn’t just fall to the cybersecurity team – everyone must contribute.

In most organizations, phishing emails succeed in fooling about 4% of employees and/or executives. Phishing emails – often in the guise of a message from a leader or colleague – invite the recipient to click on a link or download a file. When they do, they may compromise their credentials, introduce a virus or give a hacker entry to the firm’s networks. Employees need awareness training...


More on this topic

Customers who read this summary also read

The AI Organization
8
Data Feminism
8
Charlie Fink’s Metaverse
8
Too Smart
10
Human Compatible
8
The Globotics Upheaval
9

Related Channels

Comment on this summary