Courtesy of: http://anjet.net
Question: How many times have we stumbled off to an early morning business trip – only to realize we are completely unorganized? Oftentimes, we take a fairly simple process and complicate it by committing the kinds of oversights that we would never tolerate in the office. Below are a few examples that might sound familiar to us all:
- The 5-minute shave, shower and shuffle
- The 4-minute pack ‘n’ push-off
- The 3-minute coffee – oatmeal – dash (of course, with chin crumbs in tow)
And we aren’t talking about an emergency business trip booked at 2-3 a.m. the morning of, but rather one typically planned 2-3 weeks ahead!
So, where does that leave us? For starters, let’s make this easier by taking a page out of the old book of common sense:
(Please click our FB link to see this book jacket and others in our review pages)
What I liked about this book
I thought the book did an incredible job enlightening us about how easily our “inter-connected cyber world” can turn from convenience and ease to inconvenience and horror. One of the prominent themes was “anything we can do, they can do back to us.” It’s a defining indication of how far we’ve come in technology – but also, the price we should expect to pay for our gains.
What was most challenging about this book
The most challenging issue is understanding that many of our “complaints” about international spying, hacking, etc. online is often a practice that originated domestically. It will be more difficult, after digesting the contents of this book, to simply point the finger at the rest of the cyber world for some of the ideas we may have started right here at home. Whether this is good or bad is to be determined, but the facts are laid out in this book and are arguable.
Why and to whom would I recommend this book
I would definitely recommend this book to anyone who has an online business (or plans to create one), or simply has a genuine interest in cyber security as either a hobby or potential profession. I also think it is a great read for anyone who is interested in learning HOW we have gotten to the “point of no return” in our knowledge of the cyber world and all of the amazing details involved.