The processes that go into making applications more secure are still relatively immature and ownership in an organization is not always consistent or clear. This paper provides seven practical steps organizations can begin today to secure their applications and prevent the damages cyber attacks can bring.