Skip to main content

The Cybersecurity Habits That Actually Work: Lessons From a Conversation With Bob Lord

The Cybersecurity Habits That Actually Work: Lessons From a Conversation With Bob Lord

Beau Friedlander

December 11, 2025

Reading time: 5 minutes

On this week’s episode of What the Hack I talked to Bob Lord, a highly respected cybersecurity expert and renowned authority on digital risk. Spend any time around cybersecurity professionals and one thing becomes clear: clarity matters–a lot. 

Lord is no exception. His message is as simple as his prescription. Lord believes most cyber risk can be dramatically reduced, and that most of the anxiety people carry about “advanced threats” distracts them from taking meaningful action to protect themselves. 

Lord was so frustrated about this tendency that he wrote an open letter and got 100 cybersecurity luminaries to sign it. 

The “Stop Hacklore” open letter calls for an end to the FUD-flogging folklore, wrong-answer tactics that too often masquerade as cybersecurity advice. It targets outdated advice like avoiding public Wi-Fi, QR codes, public USB charging ports and the need to regularly change passwords, clear cookies and turn off Bluetooth and near field communication (NFC). 

Clearing away bad advice only matters if people know what to do instead. The “Stop Hacklore” letter provides that much-needed guidance. The advice begins and ends with grounding ourselves in habits that consistently shut down the kinds of attacks ordinary people actually face.

Lord’s core principle is straightforward: the baseline for cyber incidents often comes down to a handful of preventable failures. That’s why he focuses on basics that fall under the rubric of everyday resilience. These include using passphrases, implementing a password manager instead of recycling passwords, updating devices and software when you get the notice to do that, and although he doesn’t mention it, I’m just going to add here that it’s crucial that you pause when a message or any other communication says you need to do something now. Urgency is one of the clearest signals that you’re dealing with a threat actor. 

What makes these fundamentals powerful is not their novelty but their simplicity and functional value because at the end of the days, threat actors are low-effort people. When your defenses are simple, predictable, and regularly maintained, you raise that effort-cost dramatically without needing to worry about a DEF CON demo that’s never been seen in the wild.

If there was one point Lord returned to repeatedly, it was the neverending gobsmacker-like value of multifactor authentication. He sees MFA not as an optional upgrade but as a universal safety measure that can reliably stop entire categories of attacks. Passwords leak. Hackers can “guess” them with very little skill. They can be stolen or phished. A second factor is the barrier much harder for criminals to overcome because it means having mad social engineering skills (possible but only a real threat to high value targets) and often, access to the device or account where that second-layer was delivered.

In the realm of MFA, there is a spectrum of coverage. Text-message codes are good, authenticator apps are better, and hardware security keys are best for anyone at elevated risk. But the takeaway in the “Stop Hacklore” letter is super democratic: any second factor beats none at all. The failure mode Lord worries about isn’t about choosing the “wrong” MFA tool—it’s not using one.

He also offered another rule of safe online life: if you get a login approval prompt you did not initiate, decline it and secure the account immediately. That scenario almost always means someone already has your password.

The thing that makes “Stop Hacklore” standout is a message we don’t hear nearly enough: the distinction between what is possible (think “Mission Impossible”) and what is probable. 

The real danger is mundane. Phishing messages, powered by AI, that look like something you’ve seen before, and might even be expecting (courtesy a data compromise at a service you use). The attacks come from old passwords exposed in long-forgotten breaches. It’s based on hitting an unpatched device. It’s fraudsters exploiting publicly available personal information to impersonate you convincingly enough to slip past customer service because there are hundreds of pieces of your data “out there” waiting for you to do something about it.  

Lord’s point isn’t that high-end attacks don’t exist. It’s that defending against the most likely ones delivers far more safety for much less effort. A security posture organized around probability, rather than possibility, removes fear from the equation and replaces it with a sense of proportion—and four things you can do right now.

Lord’s frustration with outdated advice and misplaced focus is really about attention. Most people don’t need a cybersecurity overhaul—they need clarity about what matters.

His model rejects fear and replaces it with maintenance: turn on MFA, use a password manager, update your devices, and use passphrases. If you want my two cents: treat urgency as a warning sign, not a cue to act, and use DeleteMe to remove your PII from people search sites because your data is everywhere, and so is the crime it enables.

That’s it. No overhaul required—just good habits that scale.

SHARE THIS ARTICLE
Hundreds of companies collect and sell your private data online. DeleteMe removes it for you.

Our privacy advisors: 

  • Continuously find and remove your sensitive data online
  • Stop companies from selling your data – all year long
  • Have removed 35M+ records
    of personal data from the web
Special Offer

Save 10% on any individual and
family privacy plan
with code: BLOG10

Want more privacy
news?
Join Incognito, our monthly newsletter from DeleteMe that keeps you posted on all things privacy and security.

Icon mail and document

Don’t have the time?

DeleteMe is our premium privacy service that removes you from more than 750 data brokers like Whitepages, Spokeo, BeenVerified, plus many more.

Save 10% on DeleteMe when you use the code BLOG10.

Related Posts

When the Stranger Isn’t a Stranger

What Social Media Is Telling Us About Privacy that We’re Not Teaching Our Kids We talked with cybercrime expert Paul Raffile about sextortion this we…
Beau Friedlander
December 2, 2025

The Anti-Money Laundering Paradox: AI versus Outlier Criminality

The global financial system moves vast sums of money every second—a blur of capital that includes everything from micro-payments to billions of dolla…
Beau Friedlander
November 18, 2025

A(I) Blueprint for Modern Cybersecurity

Cybersecurity titan Neil Daswani was this week’s guest on ”What the Hack?” where we shot the gamut, landing on a critical question: How much harder w…
Beau Friedlander
November 12, 2025