Security Without Pessimism: Why “Just One Click” Can Still Break Everything

The Myth of the Harmless Click
It’s late on a Friday afternoon. You’ve taken back-to-back phone calls, your inbox is overflowing, and your caffeine is slowly but surely fading. Then comes one last email. It’s something from HR about a new hire policy update.

You click, skim, and move on.

Five minutes later, that “harmless” click starts a slow-motion domino fall. Credentials harvested, tokens stolen, access expanding, all before you’ve even closed your laptop.

People think, “It was just one click.”
That’s the point. It only ever takes one.

The Domino Effect
Here’s what happens after that moment most people never see.

That fake login page doesn’t just steal your password, it grabs your session cookies, mimics your device fingerprint, and jumps the line of trust. Suddenly, it’s you logging in from a new location, sending a file, approving an invoice.

Once inside, attackers don’t move fast. They move quietly. They study your company like a playbook, structure, tone, and approval chains. The next email they send looks even more real because it’s built with your real data.

By the time anyone notices, the damage has often been done for days.

But why do we fall for it? The answer isn’t carelessness—it’s psychology.

The Psychology of the Click
No one falls for this because they’re careless. They fall because they’re human.

Attackers know when we don’t double-check: near quitting time, maybe when you’re experiencing that post-lunch carb crash, or when you’re in a rush to make that 9am meeting. All of those moments when we see what we expect to see. They don’t need to hack your brain, they simply nudge it the right way.

Speed, familiarity, and trust are their sharpest weapons, which is why “training” alone doesn’t solve the problem. Awareness isn’t a habit. The mind knows better, but the hand clicks first.

How Attackers Exploit Normalcy
Modern phishing doesn’t seem sketchy; it seems routine.

They copy internal phrasing, familiar names, work to perfect internal branding. The trick isn’t panic anymore, it’s comfort and familiarity.

Common triggers:

  • “Quick update before the weekend.”
  • “Need approval by end of day” or “close of business.”
  • “Can you confirm this invoice?”

Nothing dramatic. That’s the point. The hook isn’t fear, it’s familiarity.

How to Build a Click Buffer
You can’t eliminate every threat, but you can slow the chain reaction.

Build a Click Buffer. Think of it as a two-second pause that keeps good habits automatic:

  • Hover before you click. Make it reflex.
  • Check the sender domain. If it looks almost right, it’s wrong.
  • Stop treating “urgent” as a priority. Urgency is a tactic, not truth.
  • Ask IT. They’d rather you check 100 false alarms than clean up one breach.

A brief pause can equal a big payoff. Security starts with seconds, not software.

Culture Over Blame
Here’s where most companies stumble: they turn mistakes into shame. Someone clicks a bad link, and suddenly they’re the subject of the next slide in “staff security awareness training.”

That doesn’t build security, it builds silence.

A healthy culture rewards curiosity. If people feel safe saying, “Hey, I think I messed up,” the damage stops faster, every time.

You can’t stop every click. However, you can build a team that identifies, shares, and learns from mistakes before they spiral out of control.

Final Thought
The real security upgrade isn’t another tool or rule to apply, it’s simply learning to breathe and take a little extra time to pause before you click.

  • One breath before the click. One second to hover over the link.
  • One habit that keeps the rest intact.
  • That’s not fearmongering.
  • That’s just good hygiene.

If you found this helpful, please share it with your team or reflect on your own scanning and clicking habits. Security is a team effort and every small pause makes a difference.

Multi-Factor Authentication: Boring, Annoying, Essential

In cybersecurity, we get excited about new technologies like AI, zero trust, and quantum encryption. But ask any practitioner what quietly stops the most breaches day to day? It’s still MFA.

Multi-Factor Authentication may not be exciting. It can slow people down and sometimes feels awkward. Even so, it remains one of the best ways to stop credential theft, which is the most common way attackers get into any network.

Why MFA Matters

• Passwords are weak. People reuse them across accounts, attackers buy them on the dark web, and “123456” still shows up in breach data.
• Phishing is effective. Users still click links and enter credentials. MFA blocks stolen passwords from being enough.
• Attacks are automated. Bots hammer login pages at scale. MFA breaks that automation by forcing a second factor.

Despite everything we know, MFA is still the easiest and most effective step in cyber defense. It often makes the difference between stopping an incident and having to respond to one.

The Pushback Problem

When we first rolled out MFA our district, the resistance was loud.

“It’s annoying.”
“It slows us down.”
“We don’t have time for that.”
“Why do I need this if I’m just checking email?”

At first, security changes can feel like a big hassle for everyone, whether you’re a teacher, technician, or leader. But a few seconds of extra effort can save us from days or even weeks of problems.

To make sure everyone accepted MFA, we took our time and built support step by step:

• Continuous staff education. Regular updates explained the “why” behind MFA, not just the “how.”
• Knowledge-base articles gave our help desk a clear playbook, no scrambling when someone was locked out or confused.
• Anticipating questions became part of the rollout strategy. From custodians logging into shared workstations to the superintendent approving district-wide communications, everyone got personalized guidance.

We kept the message clear: MFA is not a burden. It’s part of how we protect our entire staff and precious student PII, and PHI data. We aways have to remain FERPA, COPPA, CIPA, and PPRA compliant.

Over time, the complaints faded. Now, using MFA is second nature. It’s simply part of our routine.

The Fix

• Enforce MFA on all critical systems.
• Use phishing-resistant methods (authenticator apps, hardware keys) and worst-case scenario SMS.
• Train users that a few extra seconds of friction is the cost of resilience.

The Parallel

Using MFA is similar to wrapping your hands before boxing. It might seem tedious when you’re just getting started, but it protects you. If you skip it once, you might be fine, but skip it again, and you risk real trouble.

Security, like weightlifting, CrossFit, martial arts or meal prep it works best when the basics become instinct.

Again, MFA is boring. But, it’s also one of the most powerful shields you have.

The Art of Cyberwar | Part I | The Illusion of Truth

The principle:
All warfare is based on deception. —Sun Tzu

In warfare, there’s a certain irony in how often truth becomes a casualty before the first shot is ever fired. As an American, that line from The Art of War has always carried extra weight. Our history is full of moments when deception wasn’t just a tactic on the battlefield; it was the spark that lit the fuse.

From the smoke and mirrors of the Spanish-American War to the Gulf of Tonkin and the blurred motives of the Gulf Wars and the Global War on Terrorism, we’ve seen how perception shapes permission. Wars don’t always start because one side is stronger; they start because one story feels true enough to believe.

And since “All warfare is based on deception,” Sun Tzu went on to say:

When you’re able to attack, you must appear unable. When using our forces, we must seem inactive. When we are near, we must make the enemy believe we are far away. When we’re far away, we must make him believe we are nearby.

We must hold out bait to entice the enemy and then crush him. If he is superior in strength, evade him. If your opponent is overconfident in nature, seek to provoke him. Pretend to be weak, so that he may grow arrogant and attack when he otherwise wouldn’t. Attack him where he is unprepared, appear where you are not expected. If he is trying to take rest and recover, give him no rest. If his forces are united, divide them.

The general who loses a battle has made only a few calculations beforehand. Thus, many calculations lead to victory, and making only a few calculations ensures defeat. By paying attention to these points, I can foresee who is likely to win or lose.

Deception as Strategy

The principles articulated by Sun Tzu extend beyond the battlefield to broader strategic contexts. His observations highlight the value of misdirection for leaders and strategists. The objective is not to create disorder, but to control perception and attention. In both conventional warfare and digital security, success frequently depends on understanding the adversary’s perception of reality. This principle underpins the effectiveness and prevalence of social engineering tactics.

Contemporary deception strategies have shifted focus from traditional military maneuvers to achieving information dominance. Modern tools include manipulated narratives, deepfakes, phishing campaigns, propaganda, and misinformation. These methods target cognitive processes rather than physical harm. Once individuals accept misinformation as truth, further manipulation becomes significantly easier. The Committee on Public Information, the United States’ World War I propaganda agency, exemplifies institutionalized information control.

Cybersecurity’s Ethical Deception

In cybersecurity, deception is employed with the intent to enhance defense mechanisms. Techniques such as honeypots attract attackers, sandbox environments facilitate malware analysis, and red team exercises simulate adversarial tactics to maintain robust security postures.

In this context, deception functions as a defensive measure rather than an offensive tool. It is utilized to identify vulnerabilities rather than to exploit them. The underlying principle that can mislead a nation may, when applied ethically, serve to protect it. The distinction lies in the intent: defense and awareness as opposed to manipulation and illusion.

Both approaches depend on psychological insight and require strategic foresight. However, only defensive deception is fundamentally grounded in ethical integrity.

The Martial Mirror

Martial artists understand deception in its purest, most physical form. A feint isn’t a lie, it’s a question. In Wing Chun, they’re called “asking hands.” You draw your opponent’s attention, focus and/or movement one way to reveal where they’re vulnerable. The best fighters aren’t those who hide, but those who read intent faster than it’s shown. It’s why attacks on the halfbeat are so effective. But, that’s a lesson for another time.

Cybersecurity employs similar principles. Confrontation is not always optimal; instead, threats are redirected, absorbed, or neutralized preemptively. The discipline emphasizes anticipating patterns before they fully emerge, rather than merely reacting. This approach is often described as the art of fighting without fighting.

The Modern Maxim

“Deception reveals more than it hides, it shows what we most want others to believe.”

In this context, each act of deception simultaneously reveals underlying motives, strategies, and tactics.

For those responsible for safeguarding systems, individuals, or factual accuracy, the task often begins where clarity diminishes. The primary challenge is not to eliminate deception entirely, but to recognize and understand it without compromising ethical standards.

The initial action in any conflict, whether digital, physical, or psychological, is seldom a direct attack; it is often the creation of a narrative to tell. The essential responsibility is to accurately identify threats based on objective analysis, rather than relying solely on presented information. Illustrating the everlasting importance of learning the principle of this story: All warfare is based on deception.

Forty Point Two

3, 2, 1 get some!

Five weeks ago, I pulled a 41.3-second 250 meter row. Today, I hit 40.2. Just over a second faster.

Most wouldn’t notice the difference, but if you’ve ever chased improvement in anything, lifting, rowing, writing, or career-related, you know what that second really means.

It’s not one test. It’s everything between the test and the retest.

Early mornings. Late nights. Lifting after focusing on a screen all day, securing cloud configs, writing incident reports, and drafting security policies. Endless meetings, collaborating with stakeholders, or staying disciplined enough to meal prep when convenience is whispering your name.

The first test showed where I was. The weeks that followed demonstrated what I was willing to do to get a little bit better every day.

That one second didn’t come from luck. It came from honesty. From taking stock of where my form slipped when fatigue hit, where breathing got shallow, where my leg drive gave too early, and where comfort started whispering, “Hey man, you’ve done enough.”

It came from the same place real growth always hides: the re-tests, not the first runs. Every domain follows the same law: test, learn, refine, retest. That’s how systems harden. That’s how people do, too.

The next time you test something, whether it’s a lift, a sprint, IAM permissions, or a personal limit, remember this: progress rarely looks dramatic as it happens. It might seem minor, but the one second I cut over five weeks shows the value of steady effort. Others might have said, “Hey man, that 41.3 is pretty damn good for a man your age.” For me, that will never be enough.

What “the science” says:

  • Power output was 673 Watts
  • VO2 Max is 68.5 ml/kg/min
  • Faster than 95% of male rowers your age
  • 89% faster than all male rowers

No matter what, 41.3 → 40.2 is proof that attention to detail and small improvements over time are earned, never issued, and that’s the real story.

Strength & Resilience: Why Chaos Is the Real Teacher

henry rollins matt shannon cloud security
The Iron Never Lies — Henry Rollins

Overreach Is the Enemy of Resilience

yalta imperial over reach

History shows that the biggest threats to national security, safety, and sovereignty usually come from within. Empires, and leaders, often fail not because they are weak, but because they try to do too much, too quickly, and often end up heading in the wrong direction.

The Yalta Conference in February 1945 brought together Churchill, Roosevelt, and Stalin in an alliance of necessity. Few in the 1930s could have imagined democratic America and Britain siding with Stalin’s Soviet Union; yet necessity led to a partnership with lasting consequences.

The alliance beat Nazi Germany, but it also allowed the Soviet Union to spread into Eastern Europe, which led to the Cold War. The key takeaway: short-term use of power without considering long-term impact can resolve immediate issues but create new, lasting problems.

The same risks are present in cloud security today. Trying to do too much still undermines resilience.

Why Overreach Happens

Overreach is a common trap. If having some power is good, it’s easy to think that having more is better. In cybersecurity, this often happens because of:

  • Fear of falling behind leads teams to adopt new tools without a clear strategy.
  • Vendor pressure, with marketing insisting, “If you don’t have this, you’re insecure.”
  • Internal signaling, where having numerous tools initially appears impressive, but problems soon emerge.

Historical Lessons: The Cost of Overreach

Germany in WWII: Too Much, Too Fast

Germany under Hitler is a classic example of overreach. In 1941, the Nazis invaded the Soviet Union. Initially, their advance was rapid, and they gained significant territory. However, German forces became overstretched, supplies dwindled, winter conditions set in, and the supply lines became unmanageable. What appeared to be a demonstration of power ultimately contributed to their downfall.

Lesson: Expansion without capacity undermines itself.

Japan: Provoking Too Many Enemies

Japan’s decision to attack Pearl Harbor in 1941 reflected a similar flaw. In pursuit of empire across Asia, Japan provoked a much larger adversary: the United States. Instead of consolidating its position, this overreach led to a conflict Japan could not sustain. Lesson: Overreaching creates adversaries you can’t manage.

The Allies: Yalta’s Unintended Consequences

Even the victors faced challenges. The Yalta alliance was necessary at the time, but also carried significant risk. By permitting the Soviet Union to expand into Eastern Europe, the Allies set the stage for forty years of Cold War tension, arms races, and indirect conflicts. Gaining power in one region led to new risks elsewhere.

Lesson: Gains made without foresight can create future vulnerabilities.

The Cost of Overreach in Cloud Security

The same dynamics play out in modern cybersecurity:

The Better Path: Discipline and Restraint

Want to dive deeper into the history and strategy behind these lessons? Here are some recommended reads:

  • Churchill, Hitler, and “The Unnecessary War”: How Britain Lost Its Empire and the West Lost the World, by Patrick J. Buchanan
  • The New Dealers’ War: Franklin D. Roosevelt and the War Within World War II, by Thomas Fleming

Progress Isn’t Linear, in Martial Arts or Cybersecurity

musashi

The Myth of Linear Progress

We often imagine progress as, although slow, always moving upward. Reality is less predictable.

  1. Perfection Bias
    We assume improvement should always feel smooth. However, mastery, in both martial arts and cybersecurity, is a jagged path. The dips are where the depth develops.
  2. The Comparison Trap
    We see others’ highlight reels, the black belt breaking boards, or the company posting its “zero vulnerabilities” report, and mistake it for constant progress. Behind every clean result lies a mess of mistakes, patches, and failed tests.
  3. Forgetting That Setbacks Build Strength
    Regression often signals deeper adaptation in progress. In training, it’s when you refine mechanics. In security, it’s when you reinforce foundations.

Why Steps Back Matter

Plateaus and regressions aren’t detours; they’re checkpoints. They test persistence. Anyone can stay motivated when everything goes as planned; resilience forms when it doesn’t.

They reveal gaps in fundamentals. A failed pen test or misconfigured IAM or conditional access policy highlights what needs real attention. They build humility and precision. Overconfidence blinds; setbacks sharpen focus.

On the mats and in the SOC, mastery isn’t about avoiding mistakes, it’s about learning faster from them.

Cloud Security and Meal Prep: The Routine That Saves You When It Counts

Whether you’re a cloud engineer, a school IT lead, or just someone juggling a lot of responsibilities, you know routines matter. Here’s how a few simple habits, both in the kitchen and in the cloud, can make all the difference when things get hectic.

Meal prep can feel like a grind: chopping, portioning, stacking containers into neat rows. Yet when a demanding week hits, that fridge full of ready-made meals is your quiet victory. It’s proof that routine pays off when pressure arrives.

Vulnerability scanning and patching works similarly. It’s repetitive, rarely celebrated, and usually annoying. But consistency is what saves you during mission-critical moments, when vulnerabilities surface or threat actors strike.

The Problem with Patching

Patching never ends. There’s always another round of updates, another CVE, another “critical” bulletin. The challenge isn’t just time, it’s motivation.

  • It’s endless. You finish one cycle only to start another.
  • It’s invisible. No one notices the breach that never happened.
  • It’s easy to delay. “We’ll patch later” often becomes “we wish we had.”

In cloud environments, the pace is faster. Systems scale dynamically, microservices update constantly, and the attack surface grows by the minute. Skipping one patch cycle is like skipping a week of prep: you won’t feel it right away, but the fallout is inevitable.

The Solution: Treat It Like Meal Prep

The way through is rhythm and habit, small, consistent actions that compound into resilience.

  • Automate Where Possible
    Just like batch cooking, automation saves time and reduces errors. Use tools like AWS Systems Manager Patch Manager, Azure Update Management, or Google Cloud OS Config to deploy updates automatically across fleets. Automate notifications and reporting as well, so visibility remains high without incurring manual overhead.

Pro tip: If you’re new to automation, start small by piloting auto-patching in a test environment before rolling it out everywhere.

  • Schedule Cycles and Stick to Them
    Create predictable patch windows: weekly for endpoints, monthly for servers, rolling updates for cloud workloads. Align these cycles with CI/CD pipelines to ensure updates integrate seamlessly with development. Repetition builds trust in the process and limits downtime surprises.
  • Make It a Habit
    The goal isn’t to be a hero, but to be consistent. Prep your meals each week, patch your systems on schedule, and review your process every month. Eventually, these steps just become part of your routine.

The Payoff: Prepared Beats Panicked

When a zero-day hits, the teams that patch regularly move smoothly through the chaos. Their systems are up to date, their dependencies are tracked, and their processes are tested. The rest scramble for emergency fixes while downtime bleeds into dollars.

Routine patching does more than fix vulnerabilities. It helps you stay calm when things get stressful. This steady discipline keeps your operations running smoothly, even when others are scrambling.

Persistence Beats Perfection

Chasing perfection can be tempting. It makes us believe that if we get everything exactly right, like following a flawless training plan or a perfect patch cycle, we’ll be safe from risks or mistakes. But perfection is fragile. One mistake or setback, and it falls apart. That’s when persistence matters most.

Persistence, on the other hand, is unbreakable and endures where perfection falters.

Anyone who’s trained in martial arts or strength sports knows some days you set PRs, some days you don’t. Some days you win; other days, you learn. The outcome of a single session doesn’t matter; what counts is that you keep showing up.

Cybersecurity runs on the same principle. Rather than expecting flawless results, it relies on the daily commitment, running scans, monitoring logs, and applying updates, which builds resilience over time.

Why Perfection Fails

  • Unrealistic expectations: Nobody patches everything at once. Expecting to do so leads to burnout.
  • Procrastination: Waiting until you can do it “perfectly” means it never gets done.
  • Fragility: Perfection breaks under stress; persistence adapts.

Why Persistence Wins

  • Consistency compounds. One small patch today, another tomorrow, adds up to systemic strength.
  • Resilience under pressure. When incidents occur, teams that have developed daily habits respond more quickly.
  • Adaptability. Persistence isn’t rigid; it bends, adjusts, and continues forward.

The Martial Arts Parallel

Martial artists don’t achieve mastery through perfection. They drill basics until instinctive, spar, fail, and adapt. Each session is about persistence; the discipline of returning to the mat, working on strikes, footwork, counter-wrestling, etc, etc.

Cybersecurity professionals must do the same. Drill, repeat, refine, and drill some more. That way, when the attacks come, your persistence in training wins the day.

Closing Thought:
Persistence, not perfection, is the key to success. Perfection is unattainable, persistence ensures progress, and tangible results.

The Cloud’s Silent Killer: Misconfigured Defaults

shannon cloud security

When you think of a data breach, you might envision elite hackers executing sophisticated attacks. However, the reality is far more alarming and preventable. Most breaches are the result of basic, avoidable misconfigurations, such as open buckets and overly broad permissions. These are mistakes anyone can make, and attackers are counting on it.

It’s tempting to trust default settings, they feel safe, like the standard path everyone takes. But most cloud defaults are built for quick setup, not lasting security. If you let them go unchecked, you’re leaving the door wide open for disaster.

The Usual Suspects

Let’s talk specifics. Over and over again, these defaults show up in post-mortem reports:

  • Open storage buckets and blobs: Data storage left publicly accessible, sometimes with read and write permissions wide open. Attackers do not need to guess. They simply scan and find these vulnerabilities.
  • Overly permissive IAM roles: The infamous *:* permission set (which allows access to all resources), granting far more access than necessary. It only takes one compromised credential to turn this into a complete takeover of the environment.
  • Unrestricted security groups: Allowing traffic from “anywhere, any time” because it worked during testing… and then nobody locked it down.

These aren’t rare oversights. They’re everywhere, so common that attackers make a living scanning the internet for them. If you don’t fix them, it’s only a matter of time before someone else finds them first.

Why Defaults Are So Dangerous

  1. They lure you into a false sense of security, making you believe all is well until it’s far too late.
    Teams assume that “default” means “safe enough.” But in reality, cloud vendors prioritize usability over airtight security.
  2. They scale the wrong way.
    What seems harmless in one instance becomes catastrophic when duplicated across dozens of accounts, regions, and services.
  3. They’re hard to spot once deployed.
    Without deliberate reviews, defaults blend into the noise. They look “normal,” even when they’re wide open.

Breaking the Cycle

So how do you stop defaults from turning into disasters?

  • Audit your configurations against standards. Frameworks like CIS Benchmarks exist for a reason. They help ensure your usual settings are not leaving the door wide open.
  • Enforce least privilege from the start. Treat it as your default stance. Add access only when necessary, and remove it just as quickly.
  • Build guardrails into Infrastructure as Code. With tools like Terraform, CloudFormation, or ARM templates (methods for defining infrastructure settings in code), you can embed security policies that prevent dangerous defaults from being introduced unnoticed.
  • Automate reviews and alerts. Cloud-native tools (such as AWS Config, Azure Policy, or GCP Security Command Center services) and third-party scanners can flag risky defaults before attackers do.

The Martial Arts Parallel

In martial arts, the stance you start with can determine the fight. A weak stance means you begin off balance before your opponent moves.

Cloud defaults work the same way. If you start with insecure settings, attackers already have the upper hand before you realize there’s a problem.

Closing Thoughts

The cloud makes it easy to move quickly, but speed without careful planning can be risky. Default settings may save you time, but they also make things much easier for attackers. Cloud security is not about dramatic battles or brilliant hackers. It is about consistently following basic best practices. Never assume that default means secure. Take responsibility and set your own standards.