A Review of 'Security in the Digital World' by Graham Day

A Review by John Cosstick

I came across this book while researching about digital security on the internet. As soon as I began reading it, I knew I’d be rating it five stars! The reason behind such a stellar rating is the book discusses digital security from different perspectives. 

A Review of 'Security in the Digital World' by Graham Day

It focuses on each point of view, so that every reader gets something out of it. For instance, it mentions details that would be useful for a home user. Many home users use a local area network (LAN) that connects them to other family members, as well. That is why it is imperative that they read this book:

If that isn’t you, then the discussion meant for parents might catch your eye. If that isn’t your cup of tea either, then you will still benefit greatly as a consumer! Whether you only use digital technology at work, home, or in both places, you will want to know what Graham Day has to say. 

This book is essential for freelancers who operate their independent businesses via LAN from home. Their continued cybersecurity depends on it! 

One of the many reasons why Graham’s Kindle eBook matters today has to do with how technological advancements have changed the workplace. Gone are the days when if you wanted to earn a dependable income, you had to clock in a specific amount of hours at work. 

Today, more than 55 million workers in the United States alone have turned to freelancing. The number might shock you – after all, it means about 40% of the workforce are freelancers. However, that isn’t the end of it by any means! 

This shift has caused ripples across the globe and continues to change the society. You can observe the transformation and its impact here from this infographic on Statica.com called Who’s freelancing in America

Infographic: Who's Freelancing in America? | Statista
You will find more infographics at Statista

Unsurprisingly, technological experts and world leaders do not remain unfamiliar with the changing trends. Take a look at The New Economy Forum: The Future of Work here

Conducted under the direction of Christine LagardeThe Managing Director of IMF, the forum was also attended by Sara Horowitz, the ex-CEO of the Freelancer’s Union

What this goes to show is that we need to become a part of the rapidly changing professional landscape. Day’s book will be of immense help to freelancers who are looking to do just that!

For most, freelancers, cybersecurity is an in-house affair. Since they do business on the internet on a daily basis, it is an operational risk that they must take. They stand risking their systems getting hacked for fun, ransom, or even so the hacker can leave a malware virus

A hacker can leave a malware virus

The resulting loss of income due to data they have lost or malfunctioning computers is a certainty. That is why they need Day’s book. It could change everything! 

Day starts the book by dedicating a chapter to knowledge about the internet. Don’t skip it because even pro internet users can glean useful information from it.

Going from there, the second chapter defined the different threats, such as cyberbullying, grooming, and sextortion, an internet user might be exposing themselves to while on the web. 

Even as a parent or a family member, this information can be useful because the threats don’t just limit themselves to businesses! Cyberbullying can tear families apart, which is what the author is trying to show us. The author also brings to light possible motives behind such crimes. 

However, Day understands that to his readers, the whys of cybercrime don’t matter as much as the how-to's do! As the motives of the criminals become clearer to us, the author unveils the various ways through which they are enacted. 

Most systems are vulnerable to social engineering, sexting, phishing, scareware etc. The list seems to go on and on, each type is discussed in the book. Along with the features of each crime, Day also includes how readers can protect themselves from them

The subsequent chapters contain in-depth knowledge for home office users of Mac OS and Windows. The author has factored in the multiple screens, such as smartphones and laptops, which we all use so commonly. 

Women using a laptop on the bed

According to Day, the switching of screens makes it easier for innocent family members to become victims of cyberbullying and trolling. Different tools that can keep that from happening are discussed, as well. 

The next batch of chapters focus on digital consumers and the many ways they endanger themselves economically. Online shopping, pin cards, ATMs, chip cards are some examples. While they make our lives easier, they also raise the likelihood of our being victimized. 

Since we access them via internet from virtually anywhere there is internet access, the dangers keep increasing too! Moreover, the Internet of Things has integrated itself to devices even as simplistic as baby monitors. It has made the average household even less secure! 

The eleventh chapter deals with security issues of the social networks. If you spend some time perusing it, you will leave with a better understanding of how they operate and the dangers lurking there! Day discusses major social websites in the chapter. 

Social Media Icons for Cyber Security

In the next chapter, the author focuses on parental security for increased family awareness. Readers who are also parents will learn more about the hazards their kids could be exposed to while on the internet. 

The last two chapters deal with resilience and risk assessment, respectively. We learn that it is better to assess the risk to our data beforehand and have backups than to regret later after losing it!

We also learn ways of bouncing back from our bad experiences. The book also includes a Cyber Security Risk Assessment chart. 

Reading Security in the Digital World has helped me become a smarter internet user. I hope it makes the web a safer place for you and your family too! 

IT Governance Limited Disclosure: Identity-Theft-Scout.com is participating in the IT Governance Limited Affiliate  Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to their affiliate platform.

What Can You Write About?

We are looking for content related to cybercrimes and identity theft. There are tens of possible topics you can pick on these subjects. Moreover, we appreciate innovative issues, critical opinions, and solution-based articles on an area related to our main topics.

In addition to the topics below, if you have anything else related to our line of interest, please let us know, and we will be glad to share with our readers.

Possible Broad Areas

  • Malware
  • Laptop hacking
  • Cyberbullying
  • Internet security
  • Identity
  • Phishing
  • Data security
  • Bring Your Own Device
  • Data protection regulations
  • Data recovery
  • Data loss or DDOS mitigation
  • Identity theft recovery … and many more.

Guidelines for Content Contribution

Feel free to send us your submissions or topic ideas through our email address. We strive to respond to every request as fast as we can.

Before working on a topic, please take a look at our guidelines we would like all writers to follow. Please feel free to drop us a line if you do not understand any of the guidelines below or have a suggestion.

  • All articles should be at least a 1000 words long. We believe that long articles expound on the topics at hand better than short ones
  • Articles should be written in English. And must be written following the steps mentioned here.
  • All articles should be original and not copied from the internet even if it is your website. They must pass the Copyscape check before we can publish them.
  • The Articles should have useful and quality content, well written and easy to understand
  • Headlines written following the guidelines mentioned here.
  • The articles should be in an editable format such as .odt, docx or .txt format. Please double space your lines for the ease of reading through
  • No offensive or adult language should be employed
  • Please, check the article using a spell checker tool (like as Grammarly) before sending the copy to us.
  • Please provide a high resolution image for each 250 words (Though, we reserve the right of using the images provided by you). At least 3 images is required for a 1000 words article. The images must be from the free sources (like as Pixabay, Unsplash.com, or Pexels.com). The exact image source link must be provided under each images. 

What Will You Get In Return?

  • We give full credits for your published work
  • If we publish your article, we will give credits to you. Besides, we will write a short bio of you below the article and link to your blog social media pages or website.

We Pay Writers For Exceptional Contributions!

Where a contribution meets our guidelines and is an exceptional idea to help our readers and community we will pay up to AUD50 for the contribution.

Our editorial committee will be the sole judge of what is an exceptional idea. If you have an idea that you wish to pitch to us please use the contact email mentioned in this article. 

For the new freelance writers, it is a great chance to earn money online by writing for our website.

This is to encourage you in freelance writing, blogging, and making money online.

How Do You Submit Your Articles?

Take a look at our published work to help generate unique ideas.

Please check and double check that you’ve fulfilled all the criteria.

Then, send the article to us at john[at]identity-theft-scout.com 

We get several submissions every day. Therefore it may take time for us to go through each submission. Please bear with us. We promise to respond to each request within a few days

We look forward to publishing your next article.

Happy writing!!

Amazon Disclosure: We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites. 

New! Comments

Have your say about what you just read! Leave me a comment in the box below.