Enjoy fast, FREE delivery, exclusive deals and award-winning movies & TV shows with Prime
Try Prime
and start saving today with Fast, FREE Delivery
Amazon Prime includes:
Fast, FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with Fast, FREE Delivery" below the Add to Cart button.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited Free Two-Day Delivery
- Instant streaming of thousands of movies and TV episodes with Prime Video
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
- Unlimited photo storage with anywhere access
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.
Buy new:
$21.99$21.99
FREE delivery: Friday, July 28 on orders over $25.00 shipped by Amazon.
Ships from: Amazon Sold by: KnowBe4, LLC
Buy used: $17.95
Other Sellers on Amazon
+ $4.25 shipping
96% positive over last 12 months
& FREE Shipping
92% positive over last 12 months
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required. Learn more
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Cyberheist: The biggest financial threat facing American businesses since the meltdown of 2008 Paperback – April 20, 2011
| Price | New from | Used from |
- Kindle
$9.99 Read with Our Free App - Paperback
$21.9910 Used from $1.99 4 New from $15.00
Purchase options and add-ons
This book is meant to educate you about the dangers of conducting business online. In particular, it covers phishing, a particular type of social engineering attack delivered by email or over the Internet.
Our goal is to help you recognize the increasing danger that individuals and organizations face when they use the Internet, especially when conducting financial activity, and take proactive measures to protect your organization. These risks include theft of sensitive information, theft of goods and services, loss of intellectual property, and exposure to fraudulent online money transfers that empty your bank accounts: a cyberheist.
Don't become a statistic. Read this book and apply the strategies and techniques described within to protect your organization from a potentially devastating cyberheist.
- Print length240 pages
- LanguageEnglish
- PublisherKnowBe4
- Publication dateApril 20, 2011
- ISBN-100983400008
- ISBN-13978-0983400004
Editorial Reviews
About the Author
This is Stu s fourth book. He has co-authored three books about Windows system administration, the first being Windows NT Power Toolkit. Released in October 1999, this book reached #4 on Amazon.com s USA bestseller list the first week of its release and #1 in the UK. In 2003, a new book about Windows XP was published. The second and third books also reached Amazon s Top 10 List.
Since 1996, Stu has been the Editor-in-Chief of WServerNews, an email newsletter that goes to 100,000 IT system administrators and helps them to keep their systems secure, and up and running. Stu is now serving as publisher and editor of GFI Media Services, a division of GFI that produces four major online newsletters, including WServerNews, WXPnews, Win7News, and GFISecurityNews. These newsletters are tailored to deliver up-to-date technology information to both consumers and enterprises.
After having been on the software side of security, and still seeing workstations getting infected by malware, Stu realized that the human element of security was being neglected. He decided to start a new company called KnowBe4 that helps organizations train their employees to stay secure on the Internet. He lives in the Tampa Bay, Florida, area with his wife Rebecca and their three cats.
Product details
- Publisher : KnowBe4 (April 20, 2011)
- Language : English
- Paperback : 240 pages
- ISBN-10 : 0983400008
- ISBN-13 : 978-0983400004
- Item Weight : 1.05 pounds
- Best Sellers Rank: #3,990,242 in Books (See Top 100 in Books)
- Customer Reviews:
Important information
To report an issue with this product, click here.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
The book works for two reasons. First, he knows the topic. Stu Sjouwerman (pronounced "shower-man") has been in the Information Technology (IT) field for more than thirty years and nearly ten in IT Security. In fact, his company teaches the topic and published the book. Second, he does what too few technology writers do: he speaks (writes) in common parlance while taking the reader through what can be arcane technology and some misunderstood and unknown terms. Let's face it, how many really know what vishing, smishing, phreaking, and typosquatting mean? Well, now I do and he handled it all without putting me to sleep.
Cyberheist is well-organized in 19 chapters in 3 parts that explain cybercrime attacks and techniques, descriptions of actual crimes, and how to counter it all. The last chapter is a brief call to offer the services of his company. Being that he made his affiliation clear at the start and that his entreaty is tastefully brief, this is okay with me. He sweetened the pot with a free download called ThreatApp that sends an alert to your smartphone regarding a threat that's hot that day. Also included at the end is a list of acronyms, a glossary of terms, a list of cybercrime- and cybersecurity-related sources, and a thorough list of reference sources.
Ultimately, Cyberheist makes it clear that it is the human element that is so often the weakest link in the chain of cybersecurity. By understanding those risks and how to handle them, end-users and IT professionals alike can take steps to dramatically reduce the risk of online threats making it more than a good read, it should be required reading. From computer-based deception to mortgage (foreclosure) fraud...reading Cyberheist will go a long way to protecting you from theft of your personal funds, business funds, even the loss of your house itself. If you fall victim to a cyberheist after reading Sjouwerman's book, shame on you.
Once you know how these criminals operate, you can avoid falling into their traps.
Anyone who uses a computer connected to the internet needs to know this information to protect themselves.
It is no myth that there is plenty of money and other digital assets on networks worldwide. Those that want to ensure the security of those assets need to safeguard them.
In Cyberheist: The biggest financial threat facing American businesses since the meltdown of 2008, author Stu Sjouwerman details the current state of cybercrime, and presents numerous ways firms can ensure the safety of digital assets in their possession.
The book is written specifically for smaller to medium size businesses that often lack the staff and budget necessary to ensure effective information security.
At the end-user level, the book spends some time dealing with the threat of social engineering, specifically around phishing and spear-phishing.
In chapter 5, the author writes of vishing, which is a method of social engineering using telephone systems to obtain access to confidential personal and business information. He notes several factors that contribute to the success of vishing, including the inherent trust places in telephone systems, a reachable phone-using population, general acceptance of automated phone message and more.
Chapter 8 is especially interesting which details credit card and epayment scams. The book notes that online merchant fraud is a multi-billion dollar business and provides an overview of the problem, and ways to avoid such scams.
The best part of the book comes in part 3 which are 5 chapters on countering cybercrime. Topics such as the fundamentals of safe computing, policies, technologies, architecture and secure banking are dealt with.
At under 200 pages, Cyberheist: The biggest financial threat facing American businesses since the meltdown of 2008 is not the definitive text or the most comprehensive one on the topic. But for those looking for a brief and easy to read overview of the topic, with a lot of real-world advice, Cyberheist: The biggest financial threat facing American businesses since the meltdown of 2008 makes for a good read.

