In this edition of Week in security, Tony looks at these topics:
- How can you break into cybersecurity? We reached out to ESET researchers Aryeh Goretsky and Cameron Camp to hear their thoughts about how people can build a career in this field.
- Are you using the same few personalized passwords for all of your online accounts, putting your personal data and money at risk of theft? Here's what you should do instead.
- What is shadow IT and is your organization also exposed to the security risks associated with employee use of unauthorized software and hardware? We reviewed ways of mitigating the underlying threats.
Read more:
Cybersecurity careers: What to know and how to get started
A recipe for failure: Predictably poor passwords
What’s lurking in the shadows? How to manage the security risks of shadow IT
All this – and more – on WeLiveSecurity.com. Connect with us on Facebook, Twitter, LinkedIn and Instagram.