Cybercrime through Social Engineering – The New Global Crisis

Informative and useful…practical information on avoiding and recovering from socially engineered cyberattacks

a practical guide to responding confidently if (when?) we are victimized

- Dr Robert T. Cadigan -

…a great tool for a wide array of readers ranging from non technical employees, to all levels of management to those with technical skills…

I have just made this “required reading” for our workplace.

- Sid D. -

A Cutting-Edge Text to Defend Against Cybercriminals

It’s a must-read to defend yourself and your business against today’s cybercriminals.

- Amazon Customer -

Well organized and well presented in a fashion that the average person can understand

- Richard Moore -

A knowledgeable understanding of cybersecurity whether you are an individual or professional

- Sheila Hoyle -

This book is a vital tool for the Public to self educate themselves. Everyone should read it!

- Judy -

This book was written for the four billion users of technology to provide a more secure passage as they navigate through cyberspace.  It is not highly technical, and is designed to raise awareness of the many factors that facilitate cybercrimes.  This anecdotal journey, provided by real people, organizations, and governments helps readers to better comprehend the illicit massive wealth transfer, ideological differences, and state-crafted cyber-warfare that continues to increase on an exponential basis – irrespective of efforts to thwart cybercriminals.

The author, whose introduction to bits and bytes (0’s & 1’s) as a programmer, envisioned only good when working for several decades in the computer industry.

He has been called a technological optimist.  Social engineering is not a new concept – it is a part of human nature used to convince others to accommodate our wishes and desires, often with no intent to cause harm.  With cybercriminals, this is not the case!  Using social engineering, cybercriminals have morphed technology into a weapon – a means to do “right well” for themselves by inflicting harm on others.  For those accessing cyberspace, Christopher offers guidance to develop an awareness of cybercriminal activity and the risks of being socially engineered when accessing electronic communication.  Human nature and human curiosity are characteristics that evoke certain emotions social engineers prey upon – fear, greed, obedience, urgency, guilt, and helpfulness.

The author’s new theory – RESCAT (Required Elements for a Social Engineered Cyber Attack Theory) – explores the decision processes users of technology undertake when these emotions are manipulated by a malicious cyberattack.  Their reactions and decisions will determine if they will be victimized.  The author tells it like it really is – the Pros and Cons of passwords, Cloud service providers, multi-factor authentication, password managers, cryptocurrencies, types of ransomware, phishing and spear phishing, and much more.  He questions the integrity of many apps being used, and how users are being placed at great risk.

He also questions whether adoption of technology during early stages in our lives could be interfering with the development of our cognitive skills, and explains why encouraging children in their earliest years to grasp the world of technology may be counter-productive to how their brains develop.  Christopher also offers important insight into the question “what changes need to be made to ensure that people of all generations can gain a better comprehension of how to be less vulnerable to cyberattacks, and becoming a cybervictim”?

This book is also about what happens when safeguards don’t keep us cyber-safe, and what actions individuals, corporations, and governments need to take to protect users of technology from the predatory practices of cybercriminals.