Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
In her second adventure in Cyberland with her friend Webby, Nettie is shocked to discover Charlie the dog pretending to be her after she had left her tablet device unlocked.Young children may not be able to read words or design passwords, but they can begin to understand the importance of keeping things safe. Parents and carers will also be opening a discussion about privacy which is important to small children outside of their use of computers and devices. Using the story of Nettie and Webby, adults can continue their introduction to cybersecurity that they began in the first books. For young children it is not only about getting them to behave securely online, it is also about establishing a way children and adults can talk about cyber security as they grow. In this book the start the conversation is around the importance of locking screens on devices, but where it goes from there is up to you. Academic research has shown the importance of planting the seeds of understanding of password safety with children as soon as possible so they develop good safe cyber habits.Further discussion at the end of the book points towards a basic understanding about designing secure password security and the importance of keeping passwords private.''Perfect for starting conversations around online safety'' Heather Toomey, Cyber Lead, Derbyshire''s Education Data Hub''Very child friendly and engaging'' Teju Herath, Associate Processor in Information Systems, Brock University
Using the story of Nettie and Webby, adults can introduce cybersecurity to young children and start the conversation about going online safely.This book takes Nettie on her first adventure in Cyberland with her new friend Webby, where she finds not everything is cute and fluffy. Relevant links are included at the end of the book to help parents and carers further their understanding of risk and protection on the Internet.''Delightful'' Professor Karen Renaud, Abertay University''Essential and engaging'' Richard Hollis, Director, Risk Factory''A pleasure to introduce Nettie and Webby to my own children'' Becky Pinkard, CISO, Aldermore Bank PLC''A first class book'' John McNally MP
Identifying security gaps in an organisation's information systems is a first and vital step in protecting data and information. This is what makes the role of an information security (or assurance) auditor so important. However, this is a role that is often maligned as a 'check list monkey' who adds nothing to the business. This practical book confronts this stereotype and gives an excellent introduction to the role, covering areas such as purpose, required skills, responsibilities, interface and career progression as well as tools, standards and frameworks related to the role. Based on the author's extensive experience, it gives practical guidance to those new to the role or interested in developing a better understanding of what it entails.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.