Â鶹´«Ã½AV

Skip to content

Shelly Palmer - Passwords on Post-It Notes

If someone writes a password on a Post-It note and sticks it to a monitor, the whole system is compromised.
cloud-storage
Security isn’t a product. It’s a practice.

A journalist was accidentally added to a Signal group chat intended for classified military discussions. It happened. Mistakes happen. Everyone makes them. That’s exactly why security protocols exist—to prevent human error from becoming a systemic failure.

Security systems are only as effective as the people who use them. You can have military-grade encryption and zero-trust architecture, but if someone writes a password on a Post-It note and sticks it to a monitor, the whole system is compromised. That’s what happened here: not a hack, not a breach of technology — a breach of process, protocol and common sense.

Let’s break it down:

Wrong Tool for the Job: Signal is fine for securing personal messages, not for classified information or proprietary business data. Enterprise-grade systems enforce access rules by design. If your communication platform doesn’t know who’s supposed to be in the room, either it’s the wrong platform or people aren't using it correctly.

Failure to Verify Participants: The journalist didn’t hack the group—he was invited. Without identity verification, access is a guessing game. Whether it’s a group chat or a shared drive, knowing who’s on the thread isn’t optional.

No Access Controls: On a secure platform, a name without proper clearance wouldn’t even appear as an option. This wasn’t a system failure—it was a failure to use a system designed to prevent exactly this kind of mistake.

Everyone is scrambling to protect proprietary data as they work with LLMs, embedding pipelines, and agentic systems. The fear is that sensitive data might be leaked, stolen, or used without permission, but the real threat isn’t always a sophisticated hack—it’s someone skipping the steps. It’s someone hardcoding credentials, failing to restrict database access, or assuming “internal” means “secure.”

Security isn’t a product. It’s a practice.

As always your thoughts and comments are both welcome and encouraged. Just reply to this email. -s

P.S. I'm excited to announce the Shelly Palmer Innovation Series VIP Breakfast presented by 3C Ventures at POSSIBLE (April 30 | Miami) featuring Mark Cuban, Jeffrey Katzenberg, Michael Kassan, and me. .

Shelly Palmer is the Professor of Advanced Media in Residence at Syracuse University’s S.I. Newhouse School of Public Communications and CEO of The Palmer Group, a consulting practice that helps Fortune 500 companies with technology, media and marketing. Named  he covers tech and business for , is a regular commentator on CNN and writes a popular . He's a , and the creator of the popular, free online course, . Follow  or visit . 

push icon
Be the first to read breaking stories. Enable push notifications on your device. Disable anytime.
No thanks