May 2, 2016 By Kevin Beaver 2 min read

We have all witnessed time and again how history has a tendency to repeat itself, especially as it relates to managing information security in the enterprise. It’s human nature to believe that nothing bad will happen to us, and therefore, we don’t need to be prepared. After all, bad things only happen to other people. From average employees to business executives, people keep doing what they’ve done and they get the same results.

Stein’s Law and Security

There’s an interesting corollary to history repeating itself called Stein’s Law. Named after Herbert Stein, former chairman of the Council of Economic Advisers under U.S. Presidents Nixon and Ford, the law states that if something cannot go on forever, it will stop.

When I first heard about this, I couldn’t help but think about how information security is often mismanaged in the enterprise through various predictable means. Some of these include:

  • Relying on paperwork (security policies) to minimize information risks;
  • Assuming that compliance equals security;
  • Redirecting information risks to outside parties such as contractors and cloud service providers;
  • Supposing that when things seem to be going well on the network (i.e., no alerts or confirmed issues) that they truly are;
  • Believing that just because patch management can be difficult, it can be ignored; and
  • Thinking that incident response planning is something that’s done after a breach has occurred.

The list is endless, but you get the point. If things cannot go on forever in your information security program then, simply put, they won’t. The consequences will inevitably arise. Incidents will happen.

Growing Threats

Unfortunately, things are going to escalate a few notches. It’s all just a matter of time. Not unlike lifestyle choices that impact your health, these information security issues will eventually catch up to you.

Luckily, the odds are good that poor security practices won’t kill you. However, they surely will make you look bad in the eyes of your leaders, peers and subordinates. As an IT or information security professional, a toxic CV is the last thing you need.

Take the time to acknowledge the problems with your information security program. You know what they are; you probably know how to fix them. What’s likely missing is the motivation and discipline to see things through on the part of everyone involved. Make a stand to make things right before Stein’s Law comes to fruition.

More from CISO

Making smart cybersecurity spending decisions in 2025

4 min read - December is a month of numbers, from holiday countdowns to RSVPs for parties. But for business leaders, the most important numbers this month are the budget numbers for 2025. With cybersecurity a top focus for many businesses in 2025, it is likely to be a top-line item on many budgets heading into the New Year.Gartner expects that cybersecurity spending is expected to increase 15% in 2025, from $183.9 billion to $212 billion. Security services lead the way for the segment…

On holiday: Most important policies for reduced staff

4 min read - On Christmas Eve, 2023, the Ohio State Lottery had to shut down some of its systems because of a cyberattack. Around the same time, the Dark Web had a “Leaksmas” event, where cyber criminals shared stolen information for free as a holiday gift. In fact, the month of December 2023 saw more than 2 billion records breached and 1,351 disclosed security incidents, according to research from IT Governance — an increase of 332% and 187%, respectively, over the month of…

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today