A segment from the keynote talk delivered at the Information Security South Africa (ISSA) 2011 conference, considering the potential mismatch between what users need from security technologies and what they are often provided with. [Released under Creative Commons Attribution-NonCommercial-ShareAlike 2.0 UK: England & Wales licence.]