Security by Post-It
by in Feature Articles on 2011-04-28Over the years, we've seen some fairly interesting security principles discussed here on The Daily WTF. While most in the industry already appreciate the benefits of Security by Obscurity, readers like you have contributed some fascinating alternatives including Security by Oblivity, Security by Insanity, Security by Letterhead, and and Security by Posterity. Today, I'm excited to add a new strategy for securing information systems: Security by Post-It.
With the rash of high-profile breaches happening everywhere from credit card processors to government bureaus to gaming networks, many organizations are clamping down on security to make sure that everything feels extra-secure. Now granted, many of these break-ins are a result of SQL Injection, social engineering, and simply forgetting to check authorization rules, anything could be a vector of attack – including your very own mind.