Archistry

Survivability by Design™ since 2006

  • Home
  • About
    • Who Is Andrew?
    • C2T System™
    • The Agile Security System™
  • Contact
You are here: Home / Archistry Daily / Why “don’t click links” is credibility-killing cybersecurity advice

September 19, 2019

Why “don’t click links” is credibility-killing cybersecurity advice

A couple of days ago, Mike Johnson, who was the former CISO of Lyft, started a thread on LinkedIn about bad cybersecurity advice that must die. His contribution to the thread was the oft espoused “don’t click links” mantra of many in our industry—including some people who I respect.

I have to agree with him. This is terrible advice. It’s like saying don’t get out of bed, or don’t walk across the street or don’t eat anything you don’t kill yourself.

And the biggest, most important, most precious thing we possess as security leaders and practitioners is our credibility with our customers—in this case, those people who keep clicking the links.

So when we tell them don’t do something that’s as necessary to them in their job as breathing, then what we’re really doing is showing how ignorant we can be of what their world looks like, a total lack of caring about what they’re trying to accomplish and a complete failure to give them the credit they probably deserve as humans to learn how to deal with the basics.

Because, let’s face it. If we can survive without clicking or getting scammed for the obvious ones, there’s probably only a handful of habits we need to get them to create in order to internalize the same tests we as security professionals already do.

…and for the ones where those tests fail, most of us on the planet, as humans, are probably going to be a victim if someone is good enough and determined enough and they have enough access, information and resources. So you just need to get over the fact that there are some of these kinds of things you won’t be able to prevent. You need to be able to detect, react and contain accordingly.

So at this point, you’re either agreeing with me, or you’ve already deleted the email or clicked the unsubscribe link at the bottom.

The important part about all this is understand what we’re really trying to accomplish. For me, the mission and purpose, the ultimate aim and responsibility we have in our organizations, is to enable our organization to deliver its strategy as quickly and safely as possible.

And there’s a key objective we need to deliver if we’re going to have the influence and resources we need to make that happen: our credibility. Because our credibility is the basis of the trust and respect we have with those we hope to protect.

So if someone has a job to do where they live in their inbox and click links in order to do their part to deliver our organization’s strategy, how do you think they’ll feel about us if we tell them “don’t click links” like they’re a spoiled child who doesn’t have the ability to think by themselves?

They’re going to just reject it, and ultimately…they’re going to reject us as authority figures or influencers they will listen to.

One of the key problems we have in security is a failure to understand the worlds of our customers and then being able to translate the customer desires and wants into concrete control requirements that minimize the risk of our security program failing to deliver value to our customers.

That failure is basically, by definition, a failure to do effective requirements engineering from a the perspective of our customers so we can enable them to do what they need to do as quickly and safely as possible.

They need to click links. Get over it.

And your security awareness program is a control. Meaning it’s not fit-for-purpose, and it’s potentially impeding the execution of the organization’s strategy…

…meaning we fail as security, and we destroy our credibility.

If you want to learn about the right way to figure out how to keep them safe while still allowing to do what they need to do (and figuring out the difference between what’s necessary and what’s nice-to-have), then you should make sure you subscribe to the print, delivered-to-your-door Security Sanity™ newsletter before the end of the month.

Because in 12 days, it goes to the printer, and you’ll have missed a whole load of actionable tips and techniques you can put to use the same day to make sure you’re building your credibility day-by-day and decision-by-decision…

instead of flushing it down the toilet all in one go with misguided and impossible to implement advice for the lusers in your organization.

The link’s here: https://securitysanity.com

The deadline is the 30th of September.

The choice is yours.

Stay safe,

ast
—
Andrew S. Townley
Archistry Chief Executive

Article by Andrew Townley / Archistry Daily / Agile Security, Principle #2, Requirements Engineering, Security Awareness

  • Email
  • LinkedIn
  • Twitter
  • YouTube

EMAIL NEWSLETTER

Want to get DAILY email tips on how to build a more effective security program so you can prove your security investments deliver value to the business?

You can always unsubscribe at any time, and we won't sell your data to third parties.

About Us

Archistry works with you to ensure what you want to achieve actually gets done, linking strategy, risk, governance and compliance to enable sustained exceptional performance Read More…

Testimonials

Andrew is a highly skilled and experienced information systems architect and consultant, which in my view is a rare thing. He is innovative in his thinking and merits the title of 'thought leader' in his specialist domains of knowledge—in particular the management of risk. Andrew has embraced SABSA as a framework and, in doing so, has been a significant contributor to extending the SABSA body of knowledge."

— John Sherwood, Chief SABSA Architect

"Fabulous person to work with. Very engaging and insightful. Extremely good technical knowledge with ability to relate concepts together and overcome differing opinions. Makes things work."

— Kevin Howe-Patterson, Chief Architect, Nortel - Wireless Data Services

"Andrew was able to bring clarity and great depth of knowledge to the table. His breadth of thinking and understanding of the business and technical issues along with a clear and effective communication style were of great benefit in moving the process forward towards a successful conclusion."

— Doug Reynolds, Product Manager, MobileAware

"Andrew is a fabulous consultant and presenter that you simply enjoy listening to, as he manages to develop highly sophisticated subjects in very understandable way. His experience is actually surprising and his thoughts leave you without considerable arguments for any doubts in the subjects he covers."

— Biljana Cerin, Director, Information Security and Compliance

Recent Posts

  • If you want better security, you’d better have a better security architecture
  • The ultimate security song to keep you focused on what you’re doing
  • Security heroes
  • There’s always a people problem
  • Putting your data flow diagrams out to pasture…for good

Looking for something else?

  • Home
  • About
  • Contact

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright © 2006-2025 Archistry Incorporated or its affiliates

"Archistry", the stained glass window logo, "Pragmantix" and the Pragmantix™ logo, "Archistry Execution Framework (AEF)", "Archistry Execution Framework, Cybersecurity Edition (ACS)", "The Agile Security System", "The Agile Business System", "Baseline Perspectives", "Architecture Wall", "Archistry Execution Engine", "Renegade Security", "Renegade Security System", "Security Value Delivery System (SVDS)" "Collapse-to-Traction", "Collapse-to-Traction System", "Adaptive Trust & Governance Model (ATGM)", and "Adaptive Trust & Governance Model for Organizations (ATGM4O)" are trademarks of Archistry Incorporated or its affiliates.