dark web

Episode 1 – Week 1: Too Many Passwords

A hearty welcome to all of you to the official blog for “Digital Self-Defense,” the podcast for everyday people to learn the ins and outs of cybersecurity in easy-to-understand language.

By way of a brief introduction: my name is Tim Honker, and I’m a Security Solutions Engineer for a cybersecurity company. I talk to the men and women in charge of information security at large U.S. companies and organizations, and help ensure that they are well-equipped to protect their data and, in many cases, your own data, too. I’m a Certified Information Systems Security Professional (CISSP) and have been working in the industry for almost a decade.

Beyond my professional background, I care about helping people learn about practices they can employ and tools they can use to better secure their data. I’ve taught personal electronic security workshops to friends and colleagues since 2014, and now, I’m bringing that information to the podcast masses.

“Digital Self-Defense” offers an eight-week, step-by-step program in which listeners will learn key strategies and tools to use to better protect themselves and their data in the wake of hacks, breaches, or even simple electronic malfunctions. In an age in which getting hacked or breached is inevitable, digital security shouldn’t just be for the most technically savvy among us.

Everyone deserves personal electronic security.
Everyone deserves the knowledge to respond effectively to breaches and attacks.
Everyone deserves to understand the language journalists and information security professionals use when they describe key issues in the field.

In this inaugural episode, “Too Many Passwords,” my frequent co-host and sound engineer extraordinaire Justin Tapp and I discuss breaches. What are they? Why do they matter? What harm can they do? What is Krokodil and what does it have to do with cybersecurity? Are they really inevitable? And how can better password strategies, like using a password manager like LastPass, offer some protection against the fallout of these breaches? In addition, we’ll discuss a few specific, easy-to-use tools that, when implemented correctly, can improve your security posture without sacrificing too much convenience.

A quick addendum before you go forth and listen: the Digital Self-Defense podcast website includes a glossary that defines key terms and occasionally complicated concepts in cybersecurity. Hop on over here to check it out while you listen or review afterwards!

Additional links:
What happened when LastPass got hacked and why it’s okay
Finding out what public breaches you’ve been a part of
Accessing the Dark Web and being anonymous online with TOR