Infosec: Here, install this 3rd-party blob on all systems & run it as root; requires an unsigned kernel module, posts data to some AWS IP. We use it to detect if any other processes do the same thing.
Infosec: Well, uhm, NEVER do _that_. Or _that_. And not like _that_. But don't look at our code, cause that has all the same problems for some reason.
Infosec: Rotate frequently, NEVER write them down. Except nowadays you SHOULD write them down in a Very Special program & no rotate & most importantly whoops I got side-tracked arguing about entropy and theoretical cracking speeds while making hunter2 jokes.
Infosec: Easy. Only ever plug USB sticks into an airgapped system inside a high-security vault that is subsequently wiped and reinstalled from a cryptographically signed and known safe image.
Infosec: Lol, idiot. Just take a regular USB cable, cut it in half, strip the shielding, twist and cut some of the wires in the right order, solder them, tape them up, and you're good to go.
Infosec: We'll phish-shame you until you include "This is not a phishing email." in all your emails.
Infosec: Uhm... don't click bad links. Good ones are ok, tho. No, we don't know how to tell the difference, either.