#alternate TechCrunch » Feed TechCrunch » Comments Feed TechCrunch » Six Lessons From Cybersecurity Superhero Training Comments Feed Upthere’s Beta Users Have Uploaded More Than 3.5M Files Readbug Wants To Be Spotify For Indie Magazines alternate alternate TechCrunch WordPress.com Menu TechCrunch Search * Follow Us * Facebook * Instagram * Twitter * Youtube * Flipboard * LinkedIn * Google+ * RSS * More + Youtube + Flipboard + LinkedIn + Google+ + RSS Got a tip? Let us know. * News + Channels + Startups + Mobile + Gadgets + Enterprise + Social + Europe + Asia + Old Crunch Network + Unicorn Leaderboard + Gift Guides All Topics All Galleries Video Shows * Apps * Breaking News * Bullish * Crunch Report * CES 2016 * Gadgets * Interviews * Reviews * TC Cribs * TC Features All Shows All Videos Events * TechCrunch Events * Disrupt * Startup Battlefield * Crunchies * Meetups * International City Events * Hackathon * Include * NFL’s 1ST and Future * TC Davos 2016 * News About * CES All Events CrunchBase * Trending * Apple * Google * Samsung * News * Startups * Mobile * Gadgets * Enterprise * Social * Europe Search TechCrunch Search TechCrunch ____________________ (BUTTON) Search (BUTTON) Search 9th Annual CrunchiesFind Out Who Will Win The Crunchie For Best Mobile App - Citymapper, Messenger, Periscope, Robinhood or Wish Get Your Tickets Today Security * Why Cloud Computing Will Shake Up Security Why Cloud Computing Will Shake Up Security * The Tor Project Raised Over $200,000 From Its First Crowdfunding Campaign The Tor Project Raised Over $200,000 From Its First Crowdfunding Campaign * MariaDB Raises $9M More, Michael Howard Named New CEO, Monty Widenius CTO MariaDB Raises $9M More, Michael Howard Named New CEO, Monty Widenius CTO * Browse more... cybercrime * Where Are All The Women In White Hats? Where Are All The Women In White Hats? * The Biggest Cybersecurity Risk Is Not Identity Theft The Biggest Cybersecurity Risk Is Not Identity Theft * De-escalation Is The Answer To Today’s Growing Cyber Tension De-escalation Is The Answer To Today’s Growing Cyber Tension * Browse more... identity theft * Why Apple Pay Is Our Best Hope To Stop Online Fraud Why Apple Pay Is Our Best Hope To Stop Online Fraud * Valuing A Data Breach Victim Valuing A Data Breach Victim * Records Of 15 Million T-Mobile Customers Swept Up In Experian Hack Records Of 15 Million T-Mobile Customers Swept Up In Experian Hack * Browse more... phishing * APIs Are The New FTEs APIs Are The New FTEs * Regular Facebook Users Are More Likely To Fall For Phishing Scams Regular Facebook Users Are More Likely To Fall For Phishing Scams * With New Business Suite & Samsung Partnership, Mobile Security Company Lookout Prepares To Take On The Enterprise With New Business Suite & Samsung Partnership, Mobile Security Company Lookout Prepares To Take On The Enterprise * Browse more... Password * Is The Password Dead? The Future Of Web And Mobile Authentication Is The Password Dead? The Future Of Web And Mobile Authentication * 5 Things That Will Disappear In 5 Years 5 Things That Will Disappear In 5 Years * Microsoft Will Warn Users About Suspected Attacks By Government Hackers Microsoft Will Warn Users About Suspected Attacks By Government Hackers * Browse more... Crunch Network Six Lessons From Cybersecurity Superhero Training Posted Nov 21, 2015 by Chris Richter * 0 SHARES * * * * * * * * * Next Story Upthere’s Beta Users Have Uploaded More Than 3.5M Files [heroes.jpg?w=738] Chris RichterCrunch Network Contributor Chris Richter is the senior vice president of global security services at Level 3 Communications. How to join the network One of my distinct grade-school memories is filing out of fourth grade class, nervous, but excited to miss a portion of math class. We were having our quarterly disaster-survival drill; instructing students on what to do in case disaster strikes. While the type of drill varies by location, just about every school kid has participated in a hurricane, tornado, fire or flood drill so they are prepared to handle the situation should it arise. While working through yet another attempted malicious cybersecurity attack it dawned on me, why can’t we apply this diligence and training to cybersecurity? Why can’t we have cybersecurity drills? Today, children are savvy consumers of technology. If you’ve passed by a television in the last month you may have seen the ads for Microsoft 10. It starts with great music and a voiceover, “Imagine, these kids won’t have to remember passwords or obsess about security…” This seemed a little naïve to me. According to a 2014 report from IBM, 95 percent of IT security breaches are caused by human error. And it gets worse. You may also be shocked to learn “123456” is the most common password on the Internet, closely followed by “password,” according to SplashData’s annual list of 25 most common passwords. Why? The answer seems simple: The majority of the population does not receive cybersecurity training in any form. We must do something about the lack of cybersecurity education available. People should know the basic ways to protect their online reputation. I think the solution is to go straight to the native generations. Kids in school today are very familiar and comfortable with tech gadgets. They have access to laptops, tablets, Internet-connected watches and mobile phones all day long. My company was contacted by a local school because a sixth grader hacked the school district’s firewall to override the web content controls. It wasn’t a malicious black hat attack, the student simply wanted to access restricted content on a school computer. Think about it. While the hack wasn’t malicious, it was performed by a sixth grader! How old is a child in the sixth grade, 11 or 12? The fact that a child at such a young age has these skills underscores the point: We can’t underestimate the cyber skills of the upcoming generation — or anyone, for that matter. Technology won’t keep us safe if we don’t adhere to cybersecurity basics. What we can and should do is seize the opportunity for a teachable moment, where we can demonstrate the right course of action and inspire kids to work for the good guys. In this case, we participated in an all-day cybersecurity superhero training program at the school to help students and faculty understand basic cybersecurity rules of the road. Everything Is Connected We kicked off the training by asking the room full of students if they had a smart phone, computer or tablet at home. Every hand in the room shot up in the air. The first step for good cybersecurity hygiene is to identify all the ways you and your family are connected to the Internet. You might be surprised once you start counting and realize all of the IP-enabled devices in your home. Passwords Next, we asked the kids if they knew a strong password. One student took the bait and shouted out her secret code. We hammered home that kids shouldn’t share passwords with anyone except their caregivers. We also detailed what goes into a strong password. The kids were surprised to learn they shouldn’t use names of pets or best friends, as those words are easy to find on social media. Passwords should include letters, numbers and symbols, and should be at least eight characters. And everyone should change their passwords regularly. Lock Those Screens Next, the kids learned the importance of screen time outs and auto locks. One security expert on the panel used an Apple Watch as an example. The minute it was taken off his wrist, no student could access it. You Did Not Win $1 Million Then students learned about safe clicking. When playing games or perusing the Internet, they may experience a pop-up box claiming they are a winner or that their computer needs an immediate update. Kids (and parents) should never click on these links. Close the window and move on. The Biggest Fish You Ever Caught When asked about fishing, many kids told stories of hanging out on the water. No one knew about phishing and spear phishing. Once they learned what this cyber risk was all about, most realized they had received an email from a stranger asking for something. The team taught the kids to never open suspicious emails or click on unknown links. Software Updates Software updates were a hot topic of discussion. The students needed to understand that software updates are an important way companies provide security updates. However, they need to make sure they access only updates from the company or a program’s website. Otherwise, these updates could be pop-up malware. The day closed out with a panel of white hats chatting with the kids about using their powers for good. Topics ranged from games to programs to what a job in cybersecurity might look like. Hopefully we inspired the gifted young student who hacked the school’s firewall to use his powers for good. What I discovered is something I think I have known innately: This type of basic training and preparedness helps to create a society of people who are aware of the dangers, how to prevent them and know what to do in case something happens. Even better, it is something that can be shared. We asked these kids to go home and make sure their parents and relatives abide by these new standards, changing passwords and updating software. There are no silver bullets. Technology won’t keep us safe if we don’t adhere to cybersecurity basics. Featured Image: Yuravector/Shutterstock * 0 SHARES * 0 Share * 0 Tweet * 0 Share * 0 * 0 * 0 * * Advertisement Advertisement TechCrunch Newsletters [ ] TechCrunch Daily Our top headlines Delivered daily [ ] TC Week-in-Review Top stories of the week Delivered weekly [ ] CrunchBase Daily The latest startup funding announcements Delivered daily [ ] TC Europe The top European tech stories Delivered weekly [ ] TC Gadgets Top stories about gadgets Delivered weekly [ ] TC Mobile & Apps Top stories about apps Delivered weekly [ ] TC Startups Top stories about startups Delivered weekly [ ] TC Social Media Top stories about social Delivered weekly [ ] TC Asia The top Asian tech stories Delivered weekly [ ] Crunch Network The best from our contributors Delivered weekly View More Enter Address ____________________ (BUTTON) Subscribe Latest Crunch Report * Facebook Sports Stadium Wants to Be Your New Sports Hub | Crunch Report Facebook Sports Stadium Wants to Be Your New Sports Hub | Crunch Report Watch More Episodes * cybercrime * identity theft * phishing * Password * Security * Popular Posts Featured Stories * Six Lessons From Cybersecurity Superhero Training Don Baer On Politician's Approach To Technology VIDEO | 12:03 | Breaking News * Werner Herzog On His Documentary Lo And Behold, Cockroach Movies And Moving To Mars Werner Herzog On His Documentary Lo And Behold, Cockroach Movies And Moving To Mars 1 hour ago | Matthew Panzarino * Get Ready For A Smaller iPhone 6s Mini Get Ready For A Smaller iPhone 6s Mini 4 hours ago | Romain Dillet * Netflix Makes Good On Promises To Crack Down On VPNs, But Blocks Are Short-Lived Netflix Makes Good On Promises To Crack Down On VPNs, But Blocks Are Short-Lived 5 hours ago | Sarah Perez * Forthcoming Samsung Galaxy S7 Benchmarks Leak Forthcoming Samsung Galaxy S7 Benchmarks Leak 11 hours ago | Natasha Lomas Latest From TechCrunch * Gravit Lets You Illustrate In Your Abode Or On The Road Gravit Lets You Illustrate In Your Abode Or On The Road 1 hour ago | John Biggs * Apple Has A New Apple TV Ad, And It’s All About Apps Apple Has A New Apple TV Ad, And It’s All About Apps 1 hour ago | Romain Dillet * Werner Herzog On His Documentary Lo And Behold, Cockroach Movies And Moving To Mars Werner Herzog On His Documentary Lo And Behold, Cockroach Movies And Moving To Mars 1 hour ago | Matthew Panzarino * A Day After Launch, “Exploding Kittens” Tops The App Store A Day After Launch, “Exploding Kittens” Tops The App Store 1 hour ago | Sarah Perez Up Next Upthere’s Beta Users Have Uploaded More Than 3.5M Files Posted Nov 21, 2015 CrunchBoard Job Listings * Principal Analyst - Marketing Technology CarMax * Architect - Enterprise Information CarMax * Senior Software Developer - Web Development CarMax * Online Systems Platform Manager CarMax * Team Manager- CRM CarMax More from CrunchBoard Advertisement TechCrunch [crunch-network.jpg] * News * TCTV * Events * CrunchBase About * Staff * Contact Us * Advertise With Us * Send Us A Tip International * China * Europe * Japan Follow TechCrunch * Facebook * Twitter * Google+ * LinkedIn * Youtube * Pinterest * Tumblr * Instagram * StumbleUpon * Feed TechCrunch Apps * iOS * Android * Windows 8 Subscribe to TechCrunch Daily Latest headlines delivered to you daily [X] Subscribe to Subscribe to TechCrunch Daily Enter Email Address ____________________ (BUTTON) Subscribe © 2013-2016 AOL Inc. All rights reserved. Aol Tech Privacy Policy About Our Ads Anti Harassment Policy Terms of Service Powered by WordPress.com VIP Fonts by [b?c1=2&c2=6036210&c3=&c4=&c5=&c6=&c15=&cv=1.3&cj=1] * TechCrunch (BUTTON) * News + Startups + Mobile + Gadgets + Enterprise + Social + Europe + Asia + Old Crunch Network + Unicorn Leaderboard + Gift Guides + All Galleries Videos * Apps * Breaking News * Bullish * Crunch Report * CES 2016 * All Shows * All Videos Events * Disrupt * Startup Battlefield * Crunchies * Meetups * International City Events * Hackathon * Include * NFL’s 1ST and Future * TC Davos 2016 * All Events CrunchBase ____________________ (BUTTON) (BUTTON) Most Popular Get Ready For A Smaller iPhone 6s Mini 4 hours ago by Romain Dillet A Day After Launch, “Exploding Kittens” Tops The App Store 1 hour ago by Sarah Perez Forthcoming Samsung Galaxy S7 Benchmarks Leak 11 hours ago by Natasha Lomas Netflix Makes Good On Promises To Crack Down On VPNs, But Blocks Are Short-Lived 5 hours ago by Sarah Perez Why Cloud Computing Will Shake Up Security 2 hours ago by Tom Gillis Apple Has A New Apple TV Ad, And It’s All About Apps 1 hour ago by Romain Dillet SpaceX Tested Its Capsule That Will Send Humans To Space 1 hour ago by Emily Calandrelli These Are The Most-Watched Vines Of The Year 5 hours ago by Jordan Crook Google Reportedly Paid Apple $1B In 2014 To Remain Default Search Engine On iOS 17 hours ago by Jon Russell