I’m a hacker. Do you know which doors you left open for me?
Most organisations don’t get compromised because they ignore security altogether.They get compromised because they assume something is already taken care of.That assumption is where most security failures begin.
When I look at companies that run into serious security issues, I rarely see a lack of effort. What I see is a lack of visibility into ownership, risk and responsibility. No one can clearly explain where the risks are, who owns them, or how they’re being managed.
Every risk is like a door, if you don’t know you have it, you can’t put a lock on it.
Knowing you should act isn’t the same as knowing what to do
Almost every organisation knows they “should do something with security.” They hear it everywhere. But when you ask what that actually means, the answers get vague.
Where do we start, what should we focus on, and what actually matters for our organisation?
So comfortable assumptions appear.
“It’s handled by our IT provider.”
“We don’t really have anything interesting anyway.”
That’s not ignorance.
That’s being unknowingly unprepared.
IT and security are not the same thing
An IT professional is not a security specialist. And a security specialist is not an IT professional.
IT focuses on keeping systems running. Security focuses on how those systems can be protected from abuse.Those are very different ways of thinking, yet they’re still often treated as the same responsibility.
That’s where assumptions creep in.
And assumptions create blind spots.
The door almost everyone forgets
The most commonly forgotten “door” in security isn’t technical.
It’s the belief that someone else is responsible for it.
Once that belief exists, nobody checks anymore. Nobody questions ownership. Nobody verifies whether things are still configured the way everyone thinks they are. Security becomes implicit instead of explicit.
That’s where real problems show up.
Not in systems that are actively managed, but in things that were built once and then forgotten. Old websites. Temporary test environments. Subdomains nobody remembers setting up. Systems that still function, so nobody feels the need to question them.
Blind spots attackers don’t miss
This is also where phishing and impersonation come into play.
Not because people are careless, but because organisations don’t see the attack paths that exist. Email domains that can be spoofed. DNS records that were never properly configured. Basic protections that take minutes to set up but were simply never verified.
If those basics aren’t in place, attackers notice. Immediately.
And if the front door already has gaps, it’s worth looking further. Because chances are the rest isn’t any better.
The cloud doesn’t remove responsibility
The cloud often reinforces a false sense of safety. Everything is “in the cloud,” so it feels secure. Almost like a magic blue pill.
Cloud environments can be extremely well protected. But if an attacker gains access to your account, they gain access to everything behind it. Cloud providers are responsible up to the door. Everything beyond that: accounts, permissions, configurations. It’s still yours.
That responsibility doesn’t disappear just because the infrastructure is outsourced.
What being secure actually means
First of all, security isn’t a one-off project. It’s not something you finish.
A realistic definition of security is much simpler: knowing your risks, understanding where you’re exposed, and having a conscious plan for how you deal with that.
Not by locking everything down.
Not by buying random tools.
But knowing what actually matters for your organisation.
So, the real question is: do you know where your door is?