-  Don't review system, application, and security logs. 
-  Expect end-users to forgo convenience in place of security. 
-  Lock down the infrastructure so tightly, that getting work done becomes very difficult. 
-  Say “no” whenever asked to approve a request. 
-  Impose security requirements without providing the necessary tools and training. 
-  Focus on preventative mechanisms while ignoring detective controls. 
-  Have no DMZ for Internet-accessible servers. 
-  Assume your patch management process is working, without checking on it. 
-  Delete logs because they get too big to read. 
-  Expect SSL to address all security problems with your web application. 
-  Ban the use of external USB drives while not restricting outbound access to the Internet. 
-  Act superior to your counterparts on the network, system admin, and development teams. 
-  Stop learning about technologies and attacks. 
-  Adopt hot new IT or security technologies before they have had a chance to mature. 
-  Hire somebody just because he or she has a lot of certifications. 
-  Don't apprise your manager of the security problems your efforts have avoided. 
-  Don't cross-train the IT and security staff.