
In the latest edition of the “Smashing Security” podcast, hosted by cybersecurity veterans Graham Cluley and Carole Theriault, Carole has suffered an injury, we journey back in time to one of our earliest episodes to discuss the perils of passwords, and Rachael Stockton from LastPass drops by for a chat.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
My name is Graham Cluley.
It's serious because I, you know what you can't do when you have tendonitis? Okay, so I'm right.
So every time you leave the room, right, I would go and fix it by shoving my right hand into the sofa crack to get this sofa cover tight again.
And in doing that, I have basically hurt my hand. Not my wrist, not my wrist, the A1 sheath of the tendon. Yeah, I've been doing a lot of Googling research. So anyway, we'll be fine.
It may take a few weeks.
So we've done something a little bit different this week, haven't we, Graham?
Those of you who were listening two and a half years ago may remember that there was a third co-host, wasn't there? The wonderful Vanja Švajcer.
Now, it was only our seventh ever episode.
I hide behind the sofa and cover my head with 18 pillows and just want to die. So I can't go listen to it. So I just hope all the information is accurate still.
We'll come back with Pick of the Week next week, but you said you got something a little bit extra as well?
So what we talked about were the challenges that IT people face. There's obviously all the ones we know about, but there's some secret ones as well, ones that no one talks about.
So we try and dive into that. And we also talk about what things IT guys can do to get better buy-in from their bosses.
And also, we talk about how people can actually help IT as well. And it's a very cute conversation. She's so much fun.
So, we had a great chat, and you weren't there, which was fantastic.
Whatever your industry, Detectify can help you stay on top of security and build safer web apps.
Just enter the name of your website and Detectify will run over 1,500 security tests against it, identifying real problems with a list of constantly updated vulnerabilities submitted by a global network of over 150 hand-picked ethical hackers.
The service can even help you discover web assets like unknown subdomains and determine if they're vulnerable to hostile subdomain takeover. So what are you waiting for?
Go hack yourself. Take a 14-day free trial at www.smashingsecurity.com/detectify. Detect with an -ify on the end. And thanks to them for supporting the show.
Now, by combining these two services, our friends at LastPass may have just revolutionized security at the enterprise level. Learn more at lastpass.com/smashing.
Hello everybody and welcome to Smashing Security, a very special episode of Smashing Security.
It's our splinter episode where we are talking today about tips on how you can better protect yourself online.
And one of the things which I think we should chat about, because people are always asking me what they could be better doing about it, is passwords.
They're a bit of a problem, aren't they?
And you know, we all remember life before passwords. We're all of an age where I don't think I started thinking about passwords until I was in my teens.
Particularly for the frailer, more elderly generation, people like Vanja, who are finding it hard to keep track of all of these things.
And of course, people are expecting you to remember lots of passwords, aren't they?
And I, of course, use a unique password, which we're going to talk about why that's important in a second.
But I have to, you know, in my head, I wouldn't be able to remember all those.
And if you could remember that, well, excellent security advice there from Vanja Švajcer.
But I would argue that maybe choosing a password like EnricoJoyouslyLeopards79 isn't such a good idea because, of course, if you get hacked in one place, if your password spills out in a data breach, what's the first thing the hackers are going to do?
It's going to be absolutely horrendous, isn't it?
And had he used that same password on other social accounts, he would have had a real disaster on his hands.
He didn't use that password on his Facebook account, probably his most important account, I imagine, because his security team had said, "Hey, buddy, you've gotta have a really strong password on your account because you are a prime target." You know what, though?
So some of them might accept something like dadada, right?
And that is, you know, it might give you a false sense of confidence that, you know, that they know what they're doing, but actually you need to kind of take ownership of how secure you make your password.
People outside the computer security industry who have sort of accepted that they do need passwords, but aren't necessarily sure quite how they should be dealing with them.
They say all the time, well, what makes a strong password? You know, what should my password be like?
And I've got a couple of rules and maybe you guys can chip in if you can think of any others. But I think one of them is what we've just mentioned. You need a unique password.
You need different passwords for different accounts. But you also need a password which is hard to guess.
And one of the mistakes that some people make is they will make their password the name of their dog or their favorite soccer team or their mother's maiden name or something which is fairly easy for someone to determine if they know that particular individual.
So you might have someone close to you or a work colleague who's then able to work out how to get into your accounts.
And qwertyup is no good. Because we've seen that all before.
So what you have to remember is that you're going to be probably using this account for something. That's why you're setting it up.
And you're going to be putting in data and information that if it did get out, it could prove to be harmful to you.
And this will help make your password hard to crack because one of the things which the hackers are doing is they are using dictionaries.
They have dictionaries of the most common words and the most common passwords, which they will use against a password database in order to try and crack your password.
If you've got the word password, don't just change the A to a 4 and the O to a 0, because, you know, that's no protection at all against a modern attacker trying to crack your password.
So it needs to be better than that. But all of this stuff, right?
The length, the complexity, the uniqueness, all comes down to one central problem, which is how on earth is Carole's puny brain, which is simply full of Bryan Adams lyrics, how is it going to be able to cope?
How is it going to remember all of these puzzles? Ask me.
But what a password manager will do is basically keep all your passwords in one place, and all you need to remember is one master password, which you make, as Graham said earlier, unique hard to crack, holding lots of characters, and I'm talking over 12 characters to be long.
Now, some go up to 20. I mean, that's a minimum. And then you have this one password to access everything.
It proves very useful, and you don't even have to make them memorable that way. So they're not as easy to crack. They're very random because they're automatically generated.
So even if they get compromised, they wouldn't be, you know, the hackers wouldn't be easily guessing their passwords.
We would recommend, for the vast majority of people, run a password management program on your computer which stores your passwords securely and encrypted, protected by one strong master password.
And that master password, if you find it hard to remember all that complexity, maybe you could create a passphrase, whereas you have a sequence of random words.
So it could be something I don't know, suspects38plague21rots or something like that. It's quite a long phrase. You've got some numbers in there as well.
You could add an exclamation mark somewhere in there or an ampersand.
And the beauty of this is that when you try to log into online accounts, you can actually have your password manager pop up and say, "Oh, I know the password for this site.
Let us help you make that a stronger password." Which is wonderful service.
And the bad guys steal your passwords through phishing attacks where they try and lead you to bogus websites trying to trick that, by the way, is another way in which password managers can protect you because they won't pop up if it's a bogus site.
They should only pop up if it's the real site and offer to enter your password.
But you can also have your password stolen through keylogging malware, maybe even keylogging hardware or through a data breach.
What else can people do to better protect their accounts though?
So you can have these sort of unique generators of numbers, which when you authenticate, it really proves that it's you that's trying to log on to a particular system.
So it's not just the password, but an additional number that you have.
You either receive it through an SMS message or you have an app on your phone that generates a number for you, or you have some other specialized hardware that allows you to enter and create those numbers.
So it's like a physical device, in some cases, like hardware.
We would recommend that people do this, enable it in order to harden their accounts.
And if you do that, even if your password does get stolen, Lord forbid that it happens, but if it does get stolen, the hackers shouldn't be able to access your account because they have that extra hurdle to get past.
A good tip there for everybody. Well, I think that's about all we have time for this episode. We very briefly covered passwords.
I'm sure we'll be coming back to passwords again, but I hope that's been some useful advice for most people as to how to create stronger passwords and how to remember their passwords rather than using their puny human brains.
All that's left for me is to apologize to Carole, first of all, for making the rather sexist comment earlier and to recommend that if you like us— Carole, do you forgive me?
We're now going to show our featured interview with Rachael Stockton from LogMeIn, and hear all her little secret tips on how you IT guys out there can make your lives easier.
And I'd really be interested in seeing if you agree with everything we chat about. So, get in touch, Twitter, Reddit, you know how to get in touch with us. Take a listen.
Not only do I and Graham appreciate this professional insight, but many of our listeners want to get to know our sponsors better. So it's really great that you're here.
So that creates an incredible amount of opportunity for us to really help people solve problems around securing access.
So we have been busy the past 2.5 months really helping our customers figure out what's going to be best for their employees, their companies, so that they can manage security and secure identities.
I was, I don't know, maybe 20 years now. Gosh.
It can make it more complicated. It can make it more challenging, but it can also make it much easier.
And I thought maybe we could talk about the challenges that face the IT person when it comes to security because some challenges are more obvious than others.
Actually, maybe we should first talk about the key responsibilities facing an IT person just so that we're all on the same page.
And particularly when you're looking at somebody in a small and medium business, my huge takeaway is literally they are a Swiss Army knife. It's more than just security, right?
I mean, they're responsible for everything from tech support to does everybody have a computer? Does everybody have access to the applications?
Are the applications we're using what's needed? Meet our requirements. Hey, the printer's not working.
Oh my gosh, I have to patch my endpoints, let alone how am I making sure that people are getting access to what they need when they need it.
And so it's this plethora, throwing out that 25-cent word, right, of responsibilities that's amazing.
But the craziest thing is to the one, whether I talk to our CISO or CIO here or our sysadmin, is that when you say, what do you do on a daily basis? 99% say, put out fires.
So it's all that base work that I just described on top of putting out fires. I mean, how do you do that?
Maybe it's a sales tool to help grow the company, or maybe it's a marketing tool, and yet you've got to spend your time putting out fires all the time.
You've allocated time to do the big project, but you just can't ever get there.
It's understanding the priorities of the company and then being able to align your IT strategies and decisions behind it.
So, at least you have that sort of shared common language and idea, but figuring out how you do everything you've committed to while keeping the baseline and your end users and employees happy is really hard.
Do you think that sums it up or is there more to it?
I mean, that makes it sound like 3 checkboxes, but there's so much stuff that you have to consider when you're deciding and choosing a security solution.
And I mean, I think part of it, the biggest part that I've heard from our customers and others is ensuring that you're able to get buy-in and you're able to be successful with the people who are using it.
Because this is not the movie Field of Dreams, right? If you build it, they will not come unless you have the clout to do that.
And in a lot of organizations of all sizes, IT can't do that. So, how you get end-user buy-in, I think, is a huge issue.
And then smaller or medium-sized organizations where the decision maker or the person who really is responsible for the budget isn't technical or isn't an IT person, the other challenge is how do you get them to really understand why you're asking for what you're asking for?
So, I think those are sort of two things that people don't really take into consideration when they're thinking about deploying security in an organization.
Yeah, you have the tools, but how do you get people to use them and how do you get your leadership to buy into funding them?
It's your job to educate the users on security and teach them how to use the tools that you have to safeguard our data and our people.
And yet they're not necessarily trained to be a leader in that area. They're IT guys.
They're not necessarily the person who can be at the forefront and do a presentation or whatever and make people understand the importance of security.
And even talking to your CEO or COO who may not understand it, they may not even understand that there's a literal industry security of hackers out there who are trying to get into organizations of all sizes in industry.
Right. They have products that they sell. They have pricing strategies. They have tech support. That's what your IT person is battling.
There's the users that don't necessarily understand why they have to do the things that they have to do.
And there's the outside threat that's constantly banging at every single door and window of the organization. And their job is to come in 9 to 5 and solve all these problems.
And you're bringing in your phone and you're bringing in an app that you can just put on your credit card that I'm sure will make your department run faster.
But may or may not be secure. Oh, and by the way, half of our employees work outside of our company, you know, outside of our four walls. Oh, and another third are contractors.
How do I handle that?
So in a big city, you've got a huge hospital and, you know, maybe even a university hospital with loads of specialists that really understand specific problems.
And maybe the SMB is more like the small health center outside of town where you've got a really good GP, but they have to be kind of trained in everything.
And he's been here for years, so he really helped grow LogMeIn.
And one thing he mentioned is, you know, really going from a very small organization full of generalists to LastPass, so Swiss Army knife, wears many hats.
Now we have more than 80 people in IT and 7 different departments. So, you are able to have that specialization. We also have a lot of requirements and things like that.
But I think you're right on. I do think that larger organizations who are well-funded, you are able to get that specialization. But you know what you run into?
We've talked about that on the show before, the fact that you've got companies that are asking for specific skill sets and people are desperate to get in the industry, but somehow there's a disconnect.
I always think companies can train smart people in anything. So rather than look for the experience, I think get the brainiacs. But I guess they'd have no one to train them.
Because when you bring somebody in, you do invest and you train them if you're able to and you have that mentor, that knowledge, but then you have to keep them.
And I think that this is actually probably one of the biggest problems that's hitting companies large and small, but you have those smaller organizations that have an even harder time of hiring quality talent because it's just, you know, their offers probably aren't as high, you know, not quite as lucrative, maybe not the ping pong table and lunch every Wednesday sort of thing.
You know, part of that has to do with making it easy for the people who are going to be using it on a daily basis, your employees, but also part of it is how do we make it easy for you?
How do we make it easy for you to integrate into your own infrastructure, the infrastructure you have now and the infrastructure that you're going to grow into because you're going to be so successful, right, as an organization.
And how do we make it easy for you to maintain? How do we make it easy for you to know what's going on.
And I think there are these elements of reporting and automation that are really critical because you don't want to have to add resources for every product that you buy to secure your organization.
So if I'm going to invest in not only buying this software, but also learning it, it needs to pay back tenfold so that I can see the value of it and I can sell it to my bosses.
So, if there's an IT guy out there who really wants to invest in a PIM, piece of security software to protect his users or protect the company, how would he go or how would she go about that?
The key piece that I learned being in marketing for 20-something years is knowing your audience and being able to speak their language.
And so that's the other piece is you have to be able to speak the language of your leadership team.
So they may not know the details behind or even the terms single sign-on or federated identity or multifactor authentication.
Age and experience is actually using big words and complicated thought structures is actually not very smart because it limits the number of people that can actually understand what you're saying.
And I did that by trying to make things a bit more complex. So it's interesting. I think you're right.
Knowing what your audience need from you and then catering exactly to that rather than trying to show your skills and you're smart.
We talk about educating the end users, ensuring that they understand why security matters, why we're asking you to do things, the impact your behavior can have on this entire organization.
But at the same time, there is an education campaign that does need to happen to senior management.
What is truly the environment that we're in when it comes to the potential of threats. What kind of threats are out there? What are other ways organizations are doing that?
The more they can understand, and then the more you can speak their language, the easier it's going to be for them to be able to not just approve but champion your initiatives.
And a lot of that education will help them secure themselves in their home environment.
But passwords are still one of the biggest risks and the bane of so many individuals' existence.
And so even just being able to ensure you have best practices around that, at home and at work, that's going to make a huge difference.
What can a normal user do to make the IT person's life easier?
That may be the first time those words have ever been uttered: "How do I help with IT?" I'd be so interested in hearing the comments that you get back.
I'd love to know what your audience thinks they would hear. But I think one thing would be read the messages that get sent out.
You know, we talk about using the right language, but there is a responsibility from that employee point of view to listen to what they're trying to say.
And so because of that, you do have responsibilities. And that's part of being an employee.
And I think if you just really just do those two things: one, realize your responsibilities, and two, listen to what IT is asking for, I think that would really go a long way.
I think this is an important topic, and I hope listeners, if you work in IT, because we want to know what concerns you and what challenges that you are facing that we may not know about.
And Rachael, of course, thank you for your continued support of Smashing Security. We are extremely grateful.
And you can also join us on Reddit if you want. We have a thriving community up there where you can discuss the show.
Hosts:
Graham Cluley:
Carole Theriault:
Guests:
Vanja Svajcer – @vanjasvajcer
Rachael Stockton
Show notes:
LastPass Enterprise makes password security effortless for your organization.
LastPass Enterprise simplifies password management for companies of every size, with the right tools to secure your business with centralized control of employee passwords and apps.
But, LastPass isn’t just for enterprises, it’s an equally great solution for business teams, families and single users.
Go to lastpass.com/smashing to see why LastPass is the trusted enterprise password manager of over 33 thousand businesses.
Detectify will run over 1500 security tests against your website, identifying real problems with a list of constantly updated vulnerabilities submitted by a global network of over 150 handpicked ethical hackers.
Go hack yourself! Take a 14-day free trial at www.smashingsecurity.com/detectify now.
