Skip to main content

Conclusion

Where Do We Go from Here?

  • Chapter
  • First Online:
10 Don’ts on Your Digital Devices

Abstract

Our professional intersection with—and investment in—the material we try to condense and describe in this book goes much deeper than our somewhat removed role as authors. We do hope that here we’ve been able to offer an easily digestible, essentially linear (entertaining?) framework for both understanding and, even more important, contending with emergent and constantly evolving threats to end users’ data security. Broad consumption of even some of the cautions we offer, by sophisticated non-techies trying to function in an environment where the rules of play—and even the game itself—are constantly in flux, has potential to stem some of the truly mind-boggling data and security losses we’ve all read about and unfortunately even experienced first-hand.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 24.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 34.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    ZD Net, Charlie Osborne, “FBI Investigates Hack of JPMorgan, Other US Banks,” www.zdnet.com/fbi-investigates-hack-of-jpmorgan-other-us-banks-7000033080/, August 28, 2014.

  2. 2.

    Techworld, Roger A. Grimes, “11 Sure Signs You’ve Been Hacked,” http://news.techworld.com/security/3500234/11-sure-signs-youve-been-hacked, February 3, 2014.

  3. 3.

    Wired, Andy Greenberg, “ These 3-D Printed Skeleton Keys Can Pick High-Security Locks in Seconds,” www.wired.com/2014/08/3d-printed-bump-keys/?mbid=social_fb, August 26, 2014

  4. 4.

    PCWorld, Ian Paul, “Yahoo Mail to Support End-to-End PGP Encryption by 2015,” www.pcworld.com/article/2462852/yahoo-mail-to-support-end-to-end-pgp-encryption-by-2015.html, August 8, 2014

  5. 5.

    Ars Technica, Jon Brodkin, “Dropbox Matches Google and Microsoft Pricing for a Terabyte,” http://arstechnica.com/information-technology/2014/08/dropbox-matches-google-and-microsoft-pricing-for-a-terabyte/, August 27, 2014.

  6. 6.

    Wired, Andy Greenberg, “This Android Shield Could Encrypt Apps So Invisibly You Forget It’s There,” www.wired.com/2014/08/m-aegis-android-encryption/?mbid=social_fb, August 19, 2014.

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Daniel G. Bachrach

About this chapter

Cite this chapter

Bachrach, D.G., Rzeszut, E.J. (2014). Conclusion. In: 10 Don’ts on Your Digital Devices. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-0367-5_11

Download citation

Publish with us

Policies and ethics