Scams, Hacking, and Cybersecurity

The Ultimate Guide to Online Safety and Privacy

Non-Fiction - True Crime
219 Pages
Reviewed on 02/04/2025
Buy on Amazon

This author participates in the Readers' Favorite Free Book Program, which is open to all readers and is completely free. The author will provide you with a free copy of their book in exchange for an honest review. You and the author will discuss what sites you will post your review to and what kind of copy of the book you would like to receive (eBook, PDF, Word, paperback, etc.). To begin, click the purple email icon to send this author a private email.

This author participates in the Readers' Favorite Book Review Exchange Program, which is open to all authors and is completely free. Simply put, you agree to provide an honest review an author's book in exchange for the author doing the same for you. What sites your reviews are posted on (B&N, Amazon, etc.) and whether you send digital (eBook, PDF, Word, etc.) or hard copies of your books to each other for review is up to you. To begin, click the purple email icon to send this author a private email, and be sure to describe your book or include a link to your Readers' Favorite review page or Amazon page.

This author participates in the Readers' Favorite Book Donation Program, which was created to help nonprofit and charitable organizations (schools, libraries, convalescent homes, soldier donation programs, etc.) by providing them with free books and to help authors garner more exposure for their work. This author is willing to donate free copies of their book in exchange for reviews (if circumstances allow) and the knowledge that their book is being read and enjoyed. To begin, click the purple email icon to send this author a private email. Be sure to tell the author who you are, what organization you are with, how many books you need, how they will be used, and the number of reviews, if any, you would be able to provide.

    Book Review

Reviewed by Leonard Smuts for Readers' Favorite

The digital age has proved to be a mixed blessing. It has opened the doors to gaining, processing, and storing information, as well as allowing us to use devices like computers, tablets, and smartphones to communicate over vast distances through the internet. This has come at the cost of complexity and a loss of privacy. Worse still, criminals and miscreants can destroy our data files, defraud us, steal our identities, hold us to ransom, or bully us and our children. These are just some of the threats. Action to protect ourselves and our data is required, and May Brooks-Kempler provides the necessary resources in Scams, Hacking, and Cybersecurity. The author clarifies the difference between information security and cyber security, before listing common threats and advising readers on how to protect their data and privacy. Data protection involves Confidentiality, Integrity, and Availability (CIA). Although we may not know it, much of our personal information is already in the public domain, or at least known to our service providers such as banks, credit card companies, online stores, and social media. Just so you know – the solution is to be informed, alert, and discreet in our online dealings. Awareness is the key. Think before you click!

May Brooks-Kempler is a seasoned cybersecurity expert and shares her wealth of knowledge in Scams, Hacking, and Cybersecurity - a comprehensive guide that covers all aspects of data security, privacy, and cybercrime. It is a timely reminder that the threats outlined should not be taken lightly. Examples of scams and phishing communications are included, along with a list of telltale signs that all is not well and the precautions to be applied. Discretion is advised, particularly when posting pictures or travel plans, while personal or intimate material should never be shared. The importance of backing up data is stressed, and advice is provided on safe storage and protection from online dangers. Issues such as social engineering and cyber warfare are aired. Children and the unique risks they face receive appropriate attention. The book is concise and written in a style that is as appealing as it is informative. At times, information is presented in picture format. The section on passwords is particularly well presented. An extensive glossary is provided, along with references and a list of helpful websites that can provide more detailed advice. The book provides tools that are as useful to individuals as they are to commercial enterprises and is highly recommended. This is an excellent and informative work!