6What This Book Will Give You
47Errors to Avoid
7CHAPTER 1 What Cybersecurity Actually Is
48Questions for Your IT Provider
8Size Doesn't Make You Invisible
49CHAPTER 9 Networks & Cloud Basics
9layer.
50The Internet of Things Blind Spot
10The Buck Stops with You
51improbable but
11Why Utah, Specifically
52Understanding Cloud Shared Responsibility
12CHAPTER 2 What It Costs When Things Go Wrong
53Remote Work Along the Wasatch Front
13Breaking Down the Real Damage
54Questions for Your IT Provider
14CHAPTER 3 The Playbook They Use Against You
55CHAPTER 10 Vendor & Third-Party Risk
15The Utah Threat Landscape
56The Trust Factor in Utah Business
16Phishing and Social Engineering
57Four Habits for Managing Vendor Risk
17Insider Threats
58Shadow IT and Ungoverned Applications
18How Credential Theft Plays Out in Practice
59CHAPTER 11 Incident Response & Business Continuity
19Supply Chain Compromise
60Two Distinct Plans for Two Distinct Problems
20Malware and Ransomware
61Build Your Contact List
21Service Disruption Attacks
62The Reality of the First Sixty Minutes
22CHAPTER 4 Follow a Framework (cid:1) Your Security Blueprint
63Own the Narrative
23NIST Cybersecurity Framework 2.0
64CHAPTER 12 Compliance & Governance (cid:1) The Ethics of Doing It Right
24Why Structure Beats Reaction
65(cid:2)Nope.(cid:2)
25CHAPTER 5 People & Identity (cid:1) Starting with You
66Defining the Terms
26The Pattern I See Most Often
67Building Your Evidence Trail
27Four Habits That Deliver Maximum Impact
68Practical Evidence Examples
28FROM THE FIELD
69CHAPTER 13 A Note to Utah's Business Owners
29What Effective Training Actually Looks Like
70Where to Start (cid:1) Your First 30 Days
30Questions to Put to Your IT Provider
71A Personal Offer
31CHAPTER 6 Devices & Endpoint Security
72CHAPTER 14 Jargon Decoder
32Four Habits That Prevent Most Problems
7330 Terms Every Business Owner Should Know
33the power
74Utah Cybersecurity Resources
34Why Legacy Antivirus Falls Short
75Appendix A: Incident Response Contact Sheet
35Common Pitfalls
76FIRST 30 MINUTES CHECKLIST
36Questions for Your IT Provider
77PERSONAL DEVICES (if BYOD applies)
37CHAPTER 7 Email, Web, & Collaboration Security
78Appendix D: Employee Offboarding Security Checklist
38Four Protective Habits
79DEVICE RECOVERY
39FROM THE FIELD
80VERIFICATION
40The Human Cost of a BEC Attack
81Appendix E: Vendor Risk Assessment Questionnaire
41Common Errors
82About the Author