Security Experts Versus the Layperson

Security Experts Versus the Layperson

If you are like most technology professionals family and friends come to you for advice on anything tangentially related to technology. On Thursday, Google published a blog post citing research that compared the online security practices of security professionals to those of a layperson. The infographic below summarizes the results. The top five security practices used by security experts:

  1. Install Software Updates
  2. Use Unique Passwords
  3. Use Two-Factor Authentication
  4. Use Strong Passwords
  5. Use A Password Manager

If we could add one more - don’t install or uninstall software with a poor security track record. That’s right, I’m looking at you Adobe and Oracle. Recently there have been calls to kill the Adobe flash player. In truth, most security professionals I know have stopped using Adobe Flash, client-side Java, and Acrobat years ago with almost no impact.

What about enterprise applicability?Every single security person I talked to nodded and smiled about how close to home the study hit and, when asked, almost without exception they all admitted there personal security hygiene far exceeded their organization's practices. How many security organizations have policies enforcing unique passwords for enterprise applications? By a show of hands, how many have site licenses for password managers?  While federated identity solutions may enforce two out of the top three best practices, it’s rare to see full coverage of every application.

The takeaway - let’s practice what we preach and get all five of the "security expert" best practices codified in organizational policy. 

Oh, and Flash must die!

 

Greg Kiker

GRC Consultant at Saiyan Cybersecurity

10y

Java?

Like
Reply

It's also pretty sad when one of the biggest security tools uses flash for their UI :(

To view or add a comment, sign in

More articles by Josh Lemos

  • Given Enough AIs, All Bugs Are Shallow

    We're in the best era ever for finding security vulnerabilities quickly and at scale. Linus' Law, Eric Raymond's famous…

    9 Comments
  • Agents of Order - Agentic Defense

    The AI landscape continues to transform at a blistering pace. Over the past year, I often hypothesized the asymmetric…

    14 Comments
  • AuthZ Agent of Chaos: MCP

    There’s a lot of excitement around agentic AI open protocols such as Model Context Protocol (MCP) and Agent2Agent…

    5 Comments
  • AuthZ Agents of Chaos

    The emergence of agentic AI represents a significant inflection point in computing that requires strategic…

    8 Comments
  • Authorization - The Forgotten Second A

    It seems that everyone in InfoSec is focused on solving three problems: identity, identity, and identity. Its the Who…

    3 Comments
  • Death of Traditional Penetration Testing

    Yes, another $something is dead article. What I mean is the traditional one-size-fits-all cookie-cutter engagement of…

    20 Comments
  • Honeypots - Bringing Stealthy Back

    Deception and passive monitoring have a long history What is new is old: Cuckoo's Egg 2.0 (if you don't know what I'm…

    3 Comments
  • Security Program Spring Cleaning - Part 3 of 3

    Now we’ve dusted the bunnies under the furniture, steam cleaned the carpets, and nearly fell asleep reviewing…

    1 Comment
  • Security Program Spring Cleaning - Part 2 of 3

    Last week I kicked off a series of “Spring Cleaning” security tips to freshen up those dusty networks; we moved the…

  • Security Program Spring Cleaning - Part 1 of 3

    The weather is warming and as we reach mid-Spring in North America, it is time when one must ask - is my security…

    3 Comments

Explore content categories