Cyberheist – The Book

If you only rely on security software then you have a false sense of security

Want to read this bestseller? Get your copy of the new book Cyberheist and learn how to not be the next victim! Cyberheist was written for the owners and management of Small and Medium Enterprise, which includes non-profits, local and state government, churches, and any other organization with more than a few thousand dollars in their operating account in the bank.

Phishing Security Test

Why? Eastern European organized cybercrime has evolved, and moved beyond simple identity theft. Attacks are rapidly getting more sophisticated. They are now going after your employees. They bypass your antivirus security software and ‘social engineer’ your employees to click on something. From that point forward they hack into your network and put keyloggers on accounting systems. You can guess the rest. A few days later the organization’s bank accounts are empty. Another cyberheist victim. It’s happening right now, as you read this.

“The book is well crafted and an intoxicating read – I couldn’t put it down.”- Paul Wright


If you only rely on security software to protect your organization, you have a false sense of security.  The human element of security is being neglected. An astounding 80% of organizations do not have a formal security awareness program in place. And that resulted in hundreds of organizations being the victim of a cyberheist. Yes, you need antivirus software (better called anti-malware at this point) But you also need to train all employees. Internet Security Awareness Training (ISAT) is no luxury anymore, it is a must.

It all starts with owners and management understanding the problem, and realizing that this is an urgent matter that needs to be addressed. What most people do not know is that as opposed to personal accounts, corporate bank accounts are not insured against cyberfraud.  When your operating accounts gets robbed, many banks refuse to take responsibility, and often sue the customer as a preemptive measure. The good thing is that about 30 minutes of specific employee Internet Security Awareness Training will help mitigate the cyberheist threat to a very large degree.


Table of Content of Cyberheist:

Part 1: The Business of Cybercrime
Chapter 1: What drives cybercrime?
Chapter 2: How and why scams survive, thrive, and succeed
Chapter 3: Types and methods of attack
Chapter 4: Phishing explored and explained
Chapter 5: Variants on the phishing theme [SMiShing, Vishing,…)
Chapter 6: Understanding Cybercrime Losses and Exposures
Chapter 7: How scams target victims: Spear-Phishing, Whaling, and more
Chapter 8: Scary reports and statistics on Cybercrime

Part 2: Business Use Cases: Anatomy of Various Cyberheists
Chapter 9: Bank scams
Chapter 10: Credit Card and ePayment scams
Chapter 11: Mortgage rescue scams
Chapter 12: Automated Clearinghouse Scams
Chapter 13: Retailer scams
Chapter 14: Bank Token Vulnerabilities
Chapter 15: Social Networking Scams

Part 3: Countering Cybercrime
Chapter 16: Fundamentals of Safe Computing
Chapter 17: Synching Up Security Policy, User Training, and Premises Monitoring
Chapter 18: Protect Your People and Assets with Security Technology
Chapter 19: Foster Internet Security Awareness


This book explains the concepts in understandable language, and provides the data that allows for setting new Security Policy and make sure that Policy gets applied in a sane and secure way that does not cause your organization’s productivity to suffer.