In Search of Perfect Security

You’re gonna be looking for a while.

Perfect security is a myth. What's important is to pay attention to the trade-offs you make.
A Viking warrior standing in a rugged landscape, holding a large shield with the word 'Security' emblazoned on it. The Viking wears traditional armor with a helmet, displaying a powerful and determined expression. The background is a dramatic, cloudy sky, with the warrior prepared for battle, symbolizing the strength and vigilance of security.
(Image: DALL-E 3)
Question:

Am I safe?

If I do X, will I be safe?

Will running this program make me safe?

No. No, you are not. No, it will not.

There’s no such thing as “safe” on the internet. Period.

And yet, as those representative questions imply, it’s something I get asked all the time. Let me explain why the answer is always “no” — and what you can strive for instead.

TL;DR:

Perfect security?

Perfect security doesn’t exist. Every security measure is a tradeoff between safety and convenience. Instead of striving for absolute safety, aim to be “secure enough” by making informed, balanced choices with tools and habits while staying aware of risks. This allows you to maintain a practical, confident approach to online safety.

We are all under constant attack

Not a day goes by when our technology isn’t bombarded by threats of compromise such as

— and probably more we don’t even realize. If you run a server online, it’s even worse.

The good news is, we rarely need to think about it because we have security tools in place.

Security tools and techniques

We use an assortment of tools and techniques to protect ourselves so we can feel more secure.

— and probably other special-purpose tools I can’t think of right now.

There’s no such thing as perfect security

You can’t be perfectly safe or perfectly secure. You just can’t.

That’s true in life and especially true for technology.

Those tools I just mentioned? None of them are perfect. Your skepticism? Imperfect. Your ability to tell truth from fiction or scams from legit contact is also flawed. Heck, your ability to even use all those tools is fallible.

Don’t feel bad. I’m just as imperfect as the next guy. We all are.

The most realistic thing we can hope for is “secure enough”.

Security is a spectrum

We make decisions and face tradeoffs every day. We constantly balance security and convenience with our needs and practicalities.

Consider password choice…

  • Short, memorable passwords are convenient but put us at greater risk of compromise.
  • Longer complex passwords are more secure but more difficult to manage.

Or password use…

  • Having one (presumably strong) password you use in multiple places is more convenient, but puts all the accounts at risk should one be compromised.
  • Having unique passwords for every account introduces even more management complexity.

Or password managers…

  • Learning to use a password manager is ultimately more secure than any alternative, but it is not without its own risks.

And that’s just passwords! Every decision you make about your security involves some sort of compromise.

It’s all about tradeoffs

Security is not about reaching some hypothetical perfection; it’s about choosing tradeoffs that keep you secure enough without crippling your ability to get anything done.

Those tradeoffs involve the software you use, the websites you visit, the networks you connect to, the email you open, and much, much more.

There is no best or correct answer. What matters most is that you are aware of the tradeoffs you’re making and the risks you’re willing to assume while keeping your technology accessible and useful. It’s about choosing the right mix of technology and behavior to stay as safe as you need to be.

Safe enough.

Do this

  1. Be aware that perfect security is a myth.
  2. Don’t let your guard down. No single tool or measure guarantees complete safety.
  3. Balance security and convenience: make informed, aware choices that let you use your technology with confidence.

While it might sound daunting, it doesn’t have to be hard. A little awareness and a few informed choices can go a long way toward making your online experience safe (enough!), productive, and enjoyable.

Let me show you how I deal with my own imperfections! Subscribing to my weekly newsletter, Confident Computing? Less frustration and more confidence, solutions, answers, and tips in your inbox every week.

Podcast audio

Play
Posted: November 20, 2024 in: Leo's blog
This is an update to an article originally posted March 6, 2016
Shortlink: https://askleo.com/21748
« Previous post:

Leo Who?

I'm Leo Notenboom and I've been playing with computers since I took a required programming class in 1976. I spent over 18 years as a software engineer at Microsoft, and "retired" in 2001. I started Ask Leo! in 2003 as a place to help you find answers and become more confident using all this amazing technology at our fingertips. More about Leo.

3 comments on “In Search of Perfect Security”

Leave a reply:

Before commenting please:

  • Read the article.
  • Comment on the article.
  • No personal information.
  • No spam.

Comments violating those rules will be removed. Comments that don't add value will be removed, including off-topic or content-free comments, or comments that look even a little bit like spam. All comments containing links and certain keywords will be moderated before publication.

I want comments to be valuable for everyone, including those who come later and take the time to read.