Don't sweat the small things, the saying goes. But over time, small risks add up, until you end up with a tower ready to topple I live in Key Largo, Fla., near one of the world’s most beautiful reefs, and I scuba dive almost every day I can. I’ve been diving for 20 years now, with hundreds of dives under my weight belt, and I’m one of the most safety-conscious guys I know.Yet there I was 100 feet down on the ocean floor without any air to breathe and nobody to help.I thought I was the cautious type, but on this particular dive I had accumulated multiple risks, each of which I had faced before individually. I made the mistake of letting them layer on, and I let my memory of successfully facing those risks one at a time lull me into thinking the unexpected could not happen.I couldn’t breathe due to a regulator failure — at the deepest part of my dive, while diving by myself to recover a stuck boat anchor, without my pony bottle. I didn’t panic, but I certainly wasn’t happy to be at zero pounds of air 100 feet down. I did what my training taught me: a free ascend, slowly blowing out air so that my lungs wouldn’t explode as I rose. I survived without injury. But I was left wondering why I had broken so many common dive rules in my rush to retrieve a stupid boat anchor.Turning a blind eye to riskA regulator had never failed on me in nearly two decades of diving, so I had become complacent. Likewise, I had knowingly accepted additional risks — no dive buddy, no pony bottle, no regulator backup — because I had faced each of those risks separately, where one failure could easily be overcome. I see the same mistakes every day in the computer world. Knowledgeable, experienced people who should know better accept incremental risk after incremental risk over time. Then — boom! — something really bad happens. If you look at any company that has suffered a major breach in the last two decades, you can point to a growing cascade of risks that were accepted and became business as usual.As I noted last week, you can’t simply collect vulnerabilities and ignore them. Normally, the workers on the frontline aren’t the ones who ignore the risks — they typically raise the alarm. But I often see respected managers walk into project meetings, listen to the risks, and blow them off as small, unlikely, or inconsequential.I’m involved in a project now where every single critical risk I raise is blown off as “not a big deal.” It’s true that if everything works out perfectly, the project and deployment will go swimmingly. But if any of the small risks blow up, the whole project will be killed or at least significantly delayed.Most successful hacks occur due to multiple vulnerabilities. A series of mistakes opens up the holes to the point where the hacker has an exploit superhighway once the first hurdle is cleared. Every company living with a high percentage of unpatched software falls in this category. That’s no small liability. It’s a big one, and when coupled with a few little risks, it’s an open invitation to hackers.Other common “little” risks I see accepted all the time — many of which aren’t little — include the following:Identical admin credentials across multiple assets and domainsToo many (permanent) members of privileged groupsToo many groups whose purpose no one can rememberHard-coded passwordsLittle or no user training about social engineering risksInconsistent security policies across managed domainsOverly broad permissions and privilegesUnnecessary software and services no one usesUnverified build imagesPoor de-commissioning of user accounts, service accounts, groups, or applicationsPoor security auditingOverreliance on intrusion detection — or intrusion detection that fails to detect common attacksPoor operation and management of existing security solutionsContinuing use of weak and vulnerable protocolsPoor security domain separationPoor software coding practicesLack of disk encryptionHow to shake up the status quoIf you work in a culture where people blow off incremental risk, speak up! Don’t become part of that culture. Push back. Be the voice of reason. You can help your argument by listing accepted risks — then linking them to attack scenarios detailing how a bad guy would work from the initial hack to your Holy Grail assets. For extra punch, create a video where you exploit one of those chains of vulnerabilities. Make it short, between 30 seconds and 2 minutes long; senior management has more than its share of ADHD types. End the video with the capture of a high-value asset.This three-step approach packs a wallop:List the accepted risksOffer scenarios showing how the risks could result in the compromise of high-value assetsShoot a short video demonstrating the most compelling of those scenariosI’ve yet to see a senior management team that didn’t listen and change course.One certainty: If you don’t take action, those risks will accumulate, and you’ll end up with the security equivalent of no air to breath on the ocean floor. Related content analysis The 5 types of cyber attack you're most likely to face Don't be distracted by the exploit of the week. Invest your time and money defending against the threats you're apt to confront By Roger Grimes Aug 21, 2017 7 mins Phishing Malware Social Engineering analysis 'Jump boxes' and SAWs improve security, if you set them up right Organizations consistently and reliably using one or both of these approaches have far less risk than those that do not. By Roger Grimes Jul 26, 2017 13 mins Authentication Access Control Data and Information Security analysis Attention, 'red team' hackers: Stay on target You hire elite hackers to break your defenses and expose vulnerabilities -- not to be distracted by the pursuit of obscure flaws By Roger Grimes Dec 08, 2015 4 mins Hacking Data and Information Security Network Security analysis 4 do's and don'ts for safer holiday computing It's the season for scams, hacks, and malware attacks. But contrary to what you've heard, you can avoid being a victim pretty easily By Roger Grimes Dec 01, 2015 4 mins Phishing Malware Patch Management Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe