• Cyber Crisis

  • Protecting Your Business from Real Threats in the Virtual World
  • By: Eric Cole
  • Narrated by: Michael Butler Murray
  • Length: 6 hrs and 28 mins
  • 4.7 out of 5 stars (44 ratings)

1 title per month from Audible’s entire catalog of best sellers, and new releases.
Access a growing selection of included Audible Originals, audiobooks and podcasts.
You will get an email reminder before your trial ends.
Your Premium Plus plan is $14.95 a month after 30 day trial. Cancel anytime.
Cyber Crisis  By  cover art

Cyber Crisis

By: Eric Cole
Narrated by: Michael Butler Murray
Try for $0.00

$14.95/month after 30 days. Cancel anytime.

Buy for $17.49

Buy for $17.49

Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.

Publisher's Summary

Based on news reports, you might think there's a major cybersecurity threat every four to five months. In reality, there's a cybersecurity attack happening every minute of every day.

Today, we live our lives - and conduct our business - online. Our data is in the cloud and in our pockets on our smartphones, shuttled over public Wi-Fi and company networks. To keep it safe, we rely on passwords and encryption and private servers, IT departments, and best practices. But as you read this, there is a 70 percent chance that your data is compromised...you just don't know it yet.

In Cyber Crisis, Eric Cole gives listeners a clear-eyed picture of the information war raging in cyberspace. Drawing on 30 years of experience, Cole offers practical, actionable advice that even those with little technical background can implement, including steps to take on a daily, weekly, and monthly basis to protect their businesses and themselves.

No matter who you are or where you work, cybersecurity should be a top priority. The information infrastructure we rely on in every sector of our lives is both critical and vulnerable, and sooner or later, you or your company will be a target.

©2021 Secure Anchor Consulting, LLC (P)2021 Tantor

What listeners say about Cyber Crisis

Average Customer Ratings
Overall
  • 4.5 out of 5 stars
  • 5 Stars
    34
  • 4 Stars
    8
  • 3 Stars
    1
  • 2 Stars
    1
  • 1 Stars
    0
Performance
  • 5 out of 5 stars
  • 5 Stars
    31
  • 4 Stars
    5
  • 3 Stars
    1
  • 2 Stars
    0
  • 1 Stars
    0
Story
  • 4.5 out of 5 stars
  • 5 Stars
    28
  • 4 Stars
    6
  • 3 Stars
    2
  • 2 Stars
    1
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    3 out of 5 stars
  • Performance
    4 out of 5 stars
  • Story
    3 out of 5 stars

Not garbage but also not great

This book is a good starting point but the philosophies for security are a bit dated for it to have been written in 2021. There is no mention of Zero Trust principles. Least privilege was only suggested for third party accounts on your network.

The security model that is discussed is very old school network-centric. It focuses on firewalls and segmentation as the perimeter deference instead of the more modern approach of identity being the deciding perimeter. Network segmentation and firewalling is still very important in the layered approach but is no longer good enough to be the deciding factor of what is trusted and what is not. This book does not seem to acknowledge that.

If you do buy and read this book, please keep in mind that there is a new modern way to secure your assets and you should look deeply into the Zero Trust methodology where every resource request begins with a trust level of zero and increases by verifying explicitly that the request is coming from a verified account, a device that is secure, a location that is approved, and without a heuristics score that puts it all into question. We no longer trust the fact that they are on the corp network or using a company laptop or have the right password as sole trust factors. Assume that your most trusted network segments are already breached with no ability to clean them, and act accordingly.

This book also fails to talk about the modern move to passwordless authentication. There is a slight mention of tokens and multifactor but not in the context of eliminating the password from the mix all together; which is what modern enterprises are striving for. The only people who love passwords are the hackers (and apparently Eric Cole).

I don't want to discourage you from reading this book but I do want to encourage you to not make this the last book you read on this subject.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Great insightful resource

Concise and straight to the point, great examples and suggestions to secure an environment from a high level. Check this out, you won't regret it.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Great info!

I have always admired Dr. Cole and he did not disappoint me with this book.
Great read for all levels

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Extremely Informative and Insightful

I’ve been working in IT for over 25 years specifically in the Application Integration space and this book has increased my awareness to the cyber security challenges we are facing globally. I highly recommend!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Lots of good true stories

Dr. Cole uses many facts and true stories to help the reader understand the risk and he also provides practical examples of how to treat such risk. I thought about four star because I think that the book sometimes uses a bint of FUD but being in the space I cannot negate the facts.

Great book for your executive leadership team.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for Nadeem Bedar
  • Nadeem Bedar
  • 08-15-22

Useful inside of cyber security

This book gives very clear understanding of the cyberspace around you and the risks associated with it and how to deal with it.

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars
Profile Image for aaran
  • aaran
  • 07-09-21

Most read

Short and to the point. Great insight. You may think you know everything in this book, but until you read it, you don’t.