Some Laws of Information Security: A Savvy Approach to Modern Cyber Risk
As we navigate the murky waters of the cyber age, it’s crucial to reevaluate traditional axioms and replace them with principles that resonate with our increasingly complex digital landscape. In that spirit, let’s delve into five new laws of information security that are as enlightening as they are entertaining:
1. Schrodinger’s Data: Your Data is Both Secure and Insecure Until Observed
- Quantum physics jokes aside, this law encapsulates the uncertainty principle of the cyber world. No matter how bulletproof you believe your security measures are, you can’t truly know their efficacy until tested. Just like in quantum mechanics, observation—through regular security audits, penetration tests, and real-world incidents—collapses the wave function, revealing the true state of your data security.
2. The Heisenberg Uncertainty Principle of Security: The More Secure You Make Something, The Less Usable It Becomes
- We’ve all been there: 25-character passwords that require upper-case letters, lower-case letters, numbers, special characters, a hieroglyph, and a DNA sample. While such complex authentication measures might seem ultra-secure, they often drive users to find workarounds that compromise security, like writing passwords on sticky notes or using the same “strong” password for multiple accounts.
3. Newton’s Third Law for Cybersecurity: For Every Action, There Is an Unequal and Over-the-Top Reaction
- The law encapsulates the idea that responses to security incidents often become theatrical displays of “doing something” rather than implementing measures that are genuinely effective. Patching a bug might lead to three new bugs, and the introduction of an advanced AI-driven IDS could lead to a surge in false positives.
4. The P.T. Barnum Law: There’s a Phish Born Every Minute
- This law plays on P.T. Barnum’s saying, “There’s a sucker born every minute.” In the cyber realm, even the most tech-savvy individuals can fall victim to a well-crafted phishing scam. Therefore, continuous education and training—like certification courses offered by CompTIA Security+ or the (ISC)² CISSP—should be part and parcel of an organization’s security posture.
5. The Theory of Security Relativity: E=mc^2 (Effort = More Cash Squared)
- Einstein’s theory of relativity gets a capitalistic makeover. The more effort (and money) invested in multi-layered security measures, the exponentially higher the odds of safeguarding an enterprise from vulnerabilities. Investing in a comprehensive approach that incorporates technology, staff training, governance, and constant monitoring can pay off exponentially in terms of both actual and reputational capital.
Final Thoughts
We’ve entered an age where security isn’t just a tech issue but an essential aspect of business strategy and even social well-being. Adopting a multi-dimensional approach—reflecting technical, human, and governance facets—provides a robust foundation for security in today’s digital age. And remember, while laws are often considered set in stone, in the ever-evolving field of cybersecurity, they might just be written in sand. Keeping a keen eye on changes in threat landscapes and being prepared to adapt is the key to enduring security.

