Don't review system, application, and security logs.
Expect end-users to forgo convenience in place of security.
Lock down the infrastructure so tightly, that getting work done becomes very difficult.
Say “no” whenever asked to approve a request.
Impose security requirements without providing the necessary tools and training.
Focus on preventative mechanisms while ignoring detective controls.
Have no DMZ for Internet-accessible servers.
Assume your patch management process is working, without checking on it.
Delete logs because they get too big to read.
Expect SSL to address all security problems with your web application.
Ban the use of external USB drives while not restricting outbound access to the Internet.
Act superior to your counterparts on the network, system admin, and development teams.
Stop learning about technologies and attacks.
Adopt hot new IT or security technologies before they have had a chance to mature.
Hire somebody just because he or she has a lot of certifications.
Don't apprise your manager of the security problems your efforts have avoided.
Don't cross-train the IT and security staff.