{"id":11056,"date":"2025-01-22T13:38:43","date_gmt":"2025-01-22T19:38:43","guid":{"rendered":"https:\/\/stuff.io\/book\/the-cyber-security-handbook\/"},"modified":"2025-10-17T11:13:12","modified_gmt":"2025-10-17T16:13:12","slug":"the-cyber-security-handbook","status":"publish","type":"book-dea","link":"https:\/\/stuff.io\/es\/book\/the-cyber-security-handbook\/","title":{"rendered":"Manual de ciberseguridad"},"content":{"rendered":"<p>In the world as we know it, you can be attacked both physically and virtually. For today\u2019s organisations, which rely so heavily on technology \u2013 particularly the Internet \u2013 to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation.<\/p>\n\n\n\n<p>Because virtually every organisation holds valuable information, often in huge quantities (even if you are a small business), everyone is a target. It should therefore not come as a surprise that 46% of UK businesses alone experienced at least one cyber attack or breach during 2019, which increased to as much as 75% for large businesses. More often than not, organisations cannot do business if they lose access to that information \u2013 making it one of their most important assets.<\/p>\n\n\n\n<p>Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts:<\/p>\n\n\n\n<p><strong>Part 1: Introduction<\/strong><br>The world of cyber security and the approach taken in this book.<\/p>\n\n\n\n<p><strong>Part 2: Threats and vulnerabilities<\/strong><br>A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences.<\/p>\n\n\n\n<p><strong>Part 3:<\/strong>&nbsp;<strong>The CRF processes<\/strong><br>Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each.<\/p>\n\n\n\n<p><strong>Part 4:<\/strong>&nbsp;<strong>Eight steps to implementing cyber security<\/strong><br>Our eight-step approach to implementing the cyber security processes you need and maintaining them.<\/p>\n\n\n\n<p><strong>Part 5: Reference frameworks<\/strong><br>An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available.<\/p>\n\n\n\n<p><strong>Part 6: Conclusion and appendices.<\/strong>&nbsp;The appendices include a glossary of all the acronyms and abbreviations used in this book.<\/p>\n\n\n\n<p>Cyber security does not have to cost vast amounts of money or take years to implement, particularly if you take a strategic approach. It is a worthwhile investment: no matter the size of your organisation, improving cyber security helps protect your data and that of your clients, improving business relations and opening up new business opportunities.<\/p>\n\n\n\n<p>Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today\u2019s information age; it is an essential component of business success.<\/p>\n\n\n\n<p><\/p>","protected":false},"featured_media":11060,"template":"","format":[59],"meta":{"_acf_changed":false},"book-author":[223],"blockchain":[4],"book-genre":[],"narrator":[],"book-publisher":[224],"series":[154],"class_list":["post-11056","book-dea","type-book-dea","status-publish","has-post-thumbnail","hentry","book-author-alan-calder","blockchain-cardano","format-ebook","book-publisher-it-governance-publishing","series-living-author-2-0"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Cyber Security Handbook - Stuff.io<\/title>\n<meta name=\"description\" content=\"The Cyber Security Handbook is a guide for implementing cyber security measures based on the IT Governance Cyber Resilience Framework.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/stuff.io\/es\/book\/the-cyber-security-handbook\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Stuff.io - The Cyber Security Handbook\" \/>\n<meta property=\"og:description\" content=\"The Cyber Security Handbook is a guide for implementing cyber security measures based on the IT Governance Cyber Resilience Framework.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/stuff.io\/es\/book\/the-cyber-security-handbook\/\" \/>\n<meta property=\"og:site_name\" content=\"Stuff.io\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-17T16:13:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/cyber_security_share_720.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Stuff.io - The Cyber Security Handbook\" \/>\n<meta name=\"twitter:description\" content=\"The Cyber Security Handbook is a guide for implementing cyber security measures based on the IT Governance Cyber Resilience Framework.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/cyber_security_share_720-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/stuff.io\/book\/the-cyber-security-handbook\/\",\"url\":\"https:\/\/stuff.io\/book\/the-cyber-security-handbook\/\",\"name\":\"The Cyber Security Handbook - Stuff.io\",\"isPartOf\":{\"@id\":\"https:\/\/stuff.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/stuff.io\/book\/the-cyber-security-handbook\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/stuff.io\/book\/the-cyber-security-handbook\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/The-Cyber-Bank-Vault-2.jpg\",\"datePublished\":\"2025-01-22T19:38:43+00:00\",\"dateModified\":\"2025-10-17T16:13:12+00:00\",\"description\":\"The Cyber Security Handbook is a guide for implementing cyber security measures based on the IT Governance Cyber Resilience Framework.\",\"breadcrumb\":{\"@id\":\"https:\/\/stuff.io\/book\/the-cyber-security-handbook\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/stuff.io\/book\/the-cyber-security-handbook\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/stuff.io\/book\/the-cyber-security-handbook\/#primaryimage\",\"url\":\"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/The-Cyber-Bank-Vault-2.jpg\",\"contentUrl\":\"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/The-Cyber-Bank-Vault-2.jpg\",\"width\":512,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/stuff.io\/book\/the-cyber-security-handbook\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/stuff.io\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Cyber Security Handbook\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/stuff.io\/#website\",\"url\":\"https:\/\/stuff.io\/\",\"name\":\"Stuff.io\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/stuff.io\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Cyber Security Handbook - Stuff.io","description":"The Cyber Security Handbook is a guide for implementing cyber security measures based on the IT Governance Cyber Resilience Framework.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/stuff.io\/es\/book\/the-cyber-security-handbook\/","og_locale":"es_MX","og_type":"article","og_title":"Stuff.io - The Cyber Security Handbook","og_description":"The Cyber Security Handbook is a guide for implementing cyber security measures based on the IT Governance Cyber Resilience Framework.","og_url":"https:\/\/stuff.io\/es\/book\/the-cyber-security-handbook\/","og_site_name":"Stuff.io","article_modified_time":"2025-10-17T16:13:12+00:00","og_image":[{"url":"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/cyber_security_share_720.jpg"}],"twitter_card":"summary_large_image","twitter_title":"Stuff.io - The Cyber Security Handbook","twitter_description":"The Cyber Security Handbook is a guide for implementing cyber security measures based on the IT Governance Cyber Resilience Framework.","twitter_image":"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/cyber_security_share_720-1.jpg","twitter_misc":{"Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/stuff.io\/book\/the-cyber-security-handbook\/","url":"https:\/\/stuff.io\/book\/the-cyber-security-handbook\/","name":"The Cyber Security Handbook - Stuff.io","isPartOf":{"@id":"https:\/\/stuff.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/stuff.io\/book\/the-cyber-security-handbook\/#primaryimage"},"image":{"@id":"https:\/\/stuff.io\/book\/the-cyber-security-handbook\/#primaryimage"},"thumbnailUrl":"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/The-Cyber-Bank-Vault-2.jpg","datePublished":"2025-01-22T19:38:43+00:00","dateModified":"2025-10-17T16:13:12+00:00","description":"The Cyber Security Handbook is a guide for implementing cyber security measures based on the IT Governance Cyber Resilience Framework.","breadcrumb":{"@id":"https:\/\/stuff.io\/book\/the-cyber-security-handbook\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/stuff.io\/book\/the-cyber-security-handbook\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/stuff.io\/book\/the-cyber-security-handbook\/#primaryimage","url":"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/The-Cyber-Bank-Vault-2.jpg","contentUrl":"https:\/\/stuff.io\/wp-content\/uploads\/2025\/01\/The-Cyber-Bank-Vault-2.jpg","width":512,"height":512},{"@type":"BreadcrumbList","@id":"https:\/\/stuff.io\/book\/the-cyber-security-handbook\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/stuff.io\/"},{"@type":"ListItem","position":2,"name":"The Cyber Security Handbook"}]},{"@type":"WebSite","@id":"https:\/\/stuff.io\/#website","url":"https:\/\/stuff.io\/","name":"Stuff.io","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/stuff.io\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"}]}},"_links":{"self":[{"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/book-dea\/11056","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/book-dea"}],"about":[{"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/types\/book-dea"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/media\/11060"}],"wp:attachment":[{"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/media?parent=11056"}],"wp:term":[{"taxonomy":"book-author","embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/book-author?post=11056"},{"taxonomy":"blockchain","embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/blockchain?post=11056"},{"taxonomy":"format","embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/format?post=11056"},{"taxonomy":"book-genre","embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/book-genre?post=11056"},{"taxonomy":"narrator","embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/narrator?post=11056"},{"taxonomy":"book-publisher","embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/book-publisher?post=11056"},{"taxonomy":"series","embeddable":true,"href":"https:\/\/stuff.io\/es\/wp-json\/wp\/v2\/series?post=11056"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}