This book is intended for the average consumer who might have little or no technical knowledge. It is written in plain English, with as little tech jargon as possible, and intended to be consumed and easily digested in only a few hours.
Targeted at individuals and families with online accounts and personal data (digital photos, home videos, documents, spreadsheets, etc.), Understanding Personal Data Security helps you easily and cost effectively protect your data from technical problems like hard drive crashes and malicious intruders such as hackers who are trying to access your online accounts. The high sentimental value of this data and the fact that its irreplaceable are strong driving forces, motivating many savvy and forward-thinking consumers to invest some time, money, and effort to secure their priceless data from disaster.
Topics covered include backup types and schedules (including offsite and cloud backup), data redundancy and mirroring, the 3-2-1 Backup Rule, RAID and RAID 1, passwords and passphrases, what qualifies as a strong password, password vaults and generators, password strength testing, viruses, anti-virus software, malware and adware, and network storage devices.
Targeted at individuals and families with online accounts and personal data (digital photos, home videos, documents, spreadsheets, etc.), Understanding Personal Data Security helps you easily and cost effectively protect your data from technical problems like hard drive crashes and malicious intruders such as hackers who are trying to access your online accounts. The high sentimental value of this data and the fact that its irreplaceable are strong driving forces, motivating many savvy and forward-thinking consumers to invest some time, money, and effort to secure their priceless data from disaster.
Topics covered include backup types and schedules (including offsite and cloud backup), data redundancy and mirroring, the 3-2-1 Backup Rule, RAID and RAID 1, passwords and passphrases, what qualifies as a strong password, password vaults and generators, password strength testing, viruses, anti-virus software, malware and adware, and network storage devices.