article thumbnail

AUTHOR Q&A: New book, ‘Hackable,’ suggests app security is the key to securing business networks

The Last Watchdog

The cybersecurity operational risks businesses face today are daunting, to say the least. Ted Harrington’s new book Hackable: How To Do Application Security Right argues for making application security a focal point, while laying out a practical framework that covers many of the fundamental bases. But where to start?

Risk 154
article thumbnail

GUEST ESSAY: 5 steps for raising cyber smart children — who know how to guard their privacy

The Last Watchdog

Once children have identified the rewards of being part of the online world and the risks they want to avoid, they can come up with ways to help protect and care for themselves. Can they create strong passwords? I’ve also been brought in to host virtual reading events with the book for corporate and nonprofit efforts.

Scams 203
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2022 World Password Day: Educate Your Users About Good Password Hygiene

SecureWorld News

With credential phishing and stuffing attacks on the rise—and the fact that countless passwords have already been exposed through data breaches—the need for users to step up password management practices at work and home has never been more urgent. Improving password best practices matters.

article thumbnail

Relax. Internet password books are OK

Malwarebytes

Passwords are a hot topic on social media at the moment, due to the re-emergence of a discussion about good password management practices. There’s a wealth of password management options available, some more desirable than others. The primary recommendation online is usually a software-based management tool.

Passwords 126
article thumbnail

World Password Day: Brushing up on the basics

Malwarebytes

Worse still is people using their pet’s name, or their maiden name, or some other relatively easy to obtain piece of information as their password, or their password reset question. Shoring up your passwords. Try a password manager. How many of the online accounts you use share the same password?

article thumbnail

5 Signs a Cyberattack Is Under Way and 5 Things You Need to Do Before It Happens

Adam Levin

There is little you can do in the event we experience widespread DDoS attacks, but one tip is to buy a good book series or a few board games since it might take a while to get the internet working again. Here are five things you should do today to decrease the risk of a cyberattack affecting your life or your company directly.

Passwords 245
article thumbnail

3 Top Things to Know About Social Engineering

SecureWorld News

On a recent SecureWorld Sessions podcast episode, Social Engineering: Hacking Humans , host Bruce Sussman spoke with Christopher Hadnagy, an entrepreneur and author of five books about social engineering and hacking the human. So how do we reduce the risk of being socially engineered and help protect our employees? So here's the fix.