Recently, Twitter user Sean Gallagher, Threat Researcher and former Cybersecurity Editor, posed this question to his 25K followers: what’s the dumbest security advice you’ve ever heard? At last check, his post had received over 400 replies ranging from funny to the obvious and everything in between. We have curated the most “liked” ones in this blog. Check out the entire thread.
1. “Don’t trust suspicious looking emails.”
Contributed by: Rob Graham (@ErrataRob)
Why is it dumb: If it looks sus, we definitely won’t trust it, duh! And BTW, the whole idea behind phishing emails is that they make them look legit to trick users!
2. “Three strikes policy, then they’re fired for clicking on phishing tests.”
Contributed by: Lesley Carhart (@hacks4pancakes)
Why is it dumb: Because this reeks of the security team’s inability to abstract the risk away from the users and then throwing their hands up in the air saying, “that’s all we can do!”
3. “If you use single factor auth twice in sequence, it counts as 2FA.”
Contributed by: Adrian Sanabria (@sawaba)
Why is it dumb: Because it is TWO factor authentication, i.e you need to have two different factors (such as a password and a phone/email/biometric) to prove identity: something you know, something you have, something you are.
4. “Your password must contain lowercase, uppercase, a digit, and a special character.”
Contributed by: Michael Seirchio
Why is it dumb: It depends. It is a bad idea to create passwords based on a dictionary word and substituting some of the letters for numbers or symbols isn’t that clever as well. Password crackers know to include words like “vuln3rabl3” or “trustno1” in their lookup tables.
To be fair, using mixed case, numbers and special characters makes the password much stronger than just using lowercase. While exact figures will vary based on the amount of processing power on hand, a modern computer will take two days to crack an eight-character password, so your best bet is to have longer passwords.
5. “All of my assets are critical assets.”
Contributed by: Dimitry McKay (@dimitrimckay)
Why is it dumb: It’s obvious, right? No organization can characterize all assets as critical. Asset business criticality is determined by both its inherent properties like asset category (laptop, server, storage, etc.), business unit and geography and contextual properties like role of the asset, user privileges, and its interaction with other assets.
6. “Network segmentation is too hard; we are investing in zero trust.”
Contributed by: Spy604 (@spy604)
Why is it dumb: In organizations with no network segmentation, attackers can rapidly move laterally across the network from an initial compromised asset. Individual system compromises can easily turn into major data breaches.
7. “No successful intrusions means that we can’t justify continuing to spend the same on cybersecurity… [famous last words]”
Contributed by: Z3ROTrust (@z3r0trust)
Why is it dumb: WELL? Because this is usually followed by “8 months later… “We had to pay $3 million in ransom to decrypt our files.”
8. “Patch right away. Every time.”
Contributed by: Intruder (@IntruderVS1400)
Why is it dumb: While this is not necessarily dumb advice, it is hard to do due to long, unprioritized lists of vulnerabilities and resource-constrained teams. Organizations need to prioritize vulnerabilities and patch in order of importance.
Other “bad security advice” honorable mentions:
- “Unplug your modem at night or hackers can hack your turned-off computer”
- “Servers are more secure than clients because they are in the data center.”
- “It’s better to have local accounts than using centralized authentication.”
- “Air-gapping is a basic OT security practice.”
- “Multi-factor is too inconvenient for users, so you should avoid it.”
Have one of your own to add here?
Comment on our LinkedIn post and tell us the dumbest security advice that you’ve ever heard.