Today, the internet has become an important part of our lives. Almost everything we do requires internet. Let’s face it. Everything from instant messaging, banking, emailing, shopping and even traveling – none of these things can be done without the internet. Moreover, with the growing need of the internet, protecting our information and data have also become a necessity. Whether you own a company, business or if you’re simply a habitual user of the internet, you should be aware of how to minimize threats, risks, and cybercrime as well as be cautious, proactive and stay informed of Cyber-Criminals.

Here are 99 quotes by security leaders and advocates that you can apply to your online habits.

Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.

Edward Snowden

Security used to be an inconvenience sometimes, but now it’s a necessity all the time.

Martina Navratilova

I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We’ve created life in our own image.

Stephen Hawking

We’re all going to have to change how we think about data protection.

Elizabeth Denham

Privacy – like eating and breathing – is one of life’s basic requirements.

Katherine Neville

You know something is wrong when the government declares opening someone else’s mail is a felony but your internet activity is fair game for data collecting.

E.A. Bucchianeri

Security leaders are under a lot of pressure to show quick wins while knowing full well that everything they do will be heavily scrutinized and challenged, and ultimately, they will pay the price for things that are not under their control.

Yaron Levi

As cybersecurity leaders, we have to create our message of influence because security is a culture and you need the business to take place and be part of that security culture.

Britney Hommertzheim

If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using every technology tool at their disposal to hack into people’s accounts. If they know there’s a key hidden somewhere, they won’t stop until they find it.

Tim Cook

As we’ve come to realize, the idea that security starts and ends with the purchase of a prepackaged firewall is simply misguided.

Art Wittmann

Cybercrime is the greatest threat to every company in the world.

Ginni Rommety

Information is the oxygen of the modern age. It seeps through the walls topped by barbed wire, it wafts across the electrified borders.

Ronald Reagan

It’s funny to us as we’re so used to worms and viruses being bad news rather than making the world a better place.

Graham Cluley

At the end of the day, the goals are simple: safety and security.

Jodi Rell

Social engineering scams are a particular concern. With these scams, attackers present a post intended to get the target user to click on a link. That link usually leads to the user downloading some malicious code that has the potential to steal information on the user’s computer or mobile device. These scams are sometimes also called phishing and baiting, as well as click-jacking. Whatever they’re called, just know that not every post on social media is safe to click on. You should take special care to treat every link with suspicion, especially those that look like click bait.

Rick Delgado

Let’s face it: the future is now. We are already living in a cyber society, so we need to stop ignoring it or pretending that is not affecting us.

Marco Ciapelli

Finally, we’re seeing that nearly everyone understands security is a business risk issue at the end of the day. I joke with my clients, ‘the board gets it, so they want to do something about cybersecurity, that’s the good news.’ But the bad news is, ‘the board gets it and they want to do something about cybersecurity.’ But of course it really is good news.

Bruno Haring

In digital era, privacy must be a priority. Is it just me, or is secret blanket surveillance obscenely outrageous?

Al Gore

The only crime that has been proven is the hack. That is the story.

Ramon Fonseca

We shouldn’t ask our customers to make a tradeoff between privacy and security. We need to offer them the best of both. Ultimately, protecting someone else’s data protects all of us.

Tim Cook

If security were all that mattered, computers would never be turned on, let alone hooked into a network with literally millions of potential intruders.

Dan Farmer

Every time you indulge into any sort of online activity, your data can be easily monitored and checked. The websites you visit receive your IP address, location, browser and operating system, screen resolution, ISP and more. You can check on what information you give away at stayinvisible.com. I have nothing against sharing this data when I do simple browsing. I am like Dutch windows without curtains — doing nothing wrong, peep in whenever you want, I have nothing to hide.

Victoria Ivey

We are giving away too much biometric data. If a bad guy wants your biometric data, remember this: he doesn’t need your actual fingerprint, just the data that represents your fingerprint. That will be unique, one of a kind.

Mike Muscatel, Sr.

Privacy is not for the passive.

Jeffrey Rosen

Privacy snafus are to social networks as violence is to football. The whole point of social networks is to share stuff about people that’s interesting, just as the whole point of football is to upend the guy with the ball. Every so often, someone gets paralyzed, which prompts us to add padding to the helmets or set new rules about tackling. Then we move on.

Nicholas Thompson

I’ve come to the conclusion that if you give a data point to a company, they will eventually sell it, leak it, lose it or get hacked and relieved of it. There really don’t seem to be any exceptions, and it gets depressing.

Brian Krebs

Cyber criminals can use personal details, such as your favorite color, the last four digits of your credit card and your email addresses, to make educated guesses about your sign-in credentials.

Larry Alton

When it comes to data protection, small businesses tend to be less well prepared. They have less to invest in getting it right. They don’t have compliance teams or data protection officers. But small organizations often process a lot of personal data, and the reputation and liability risks are just as real.

Elizabeth Denham

A good programmer is someone who always looks both ways before crossing a one-way street.

Doug Linder

Companies spend millions of dollars on firewalls, encryption and secure access devices, and it’s money wasted; none of these measures address the weakest link in the security chain.

Kevin Mitnick

When you say, ‘I have nothing to hide,’ you’re saying, ‘I don’t care about this right

Edward Snowden

In the very near future, cybersecurity exercises are going to be absolutely expected of all companies by regulators.

Michael Vatis

Privacy is not an option, and it shouldn’t be the price we accept for just getting on the Internet.

Gary Kovacs

Corporate America should get ready. Cybersecurity regulations will soon be coming to the United States — and that’s actually a good thing… I firmly believe that the US will pass similar regulations (like GDPR) over the next two years.

Robert Herjavec

Hoaxes use weaknesses in human behavior to ensure they are replicated and distributed. In other words, hoaxes prey on the Human Operating System.

Stewart Kirkpatrick

Only people with dull lives can afford to forego privacy.

Jan Chipchase

Amateurs hack systems, professionals hack people.

Bruce Schneier

We demand privacy, yet we glorify those that break into computers.

Bill McCollum

We discovered in our research that insider threats are not viewed as seriously as external threats, like a cyberattack. But when companies had an insider threat, in general, they were much more costly than external incidents. This was largely because the insider that is smart has the skills to hide the crime, for months, for years, sometimes forever.

Dr. Larry Ponemon

Ransomware is unique among cybercrime because, in order for the attack to be successful, it requires the victim to become a willing accomplice after the fact.

James Scott

As a Global CISO, the best advice I can give is don’t try to do something different for every part of the world. Pick and choose what you’re going to use from a policy and procedure standpoint. Generally, pick from a global perspective the most onerous and strict regulations you have to comply with and implement them globally.

James Waters

Just as drivers who share the road must also share responsibility for safety, we all now share the same global network, and thus must regard computer security as a necessary social responsibility. To me, anyone unwilling to take simple security precautions is a major, active part of the problem.

Fred Langa

A secure system is one that does what it is supposed to.

Eugene Spafford

A breach alone is not a disaster, but mishandling it is.

Serene Davis

Most people are starting to realize that there are only two different types of companies in the world: those that have been breached and know it and those that have been breached and don’t know it. Therefore, prevention is not sufficient and you’re going to have to invest in detection because you’re going to want to know what system has been breached as fast as humanly possible so that you can contain and remediate.

Ted Schlein

We need a cybersecurity renaissance in this Country that promotes cyber hygiene and a security-centric corporate culture applied and continuously reinforced by peer pressure.

James Scott

One person’s “paranoia” is another person’s “engineering redundancy.

Marcus J. Ranum

Privacy is dead, and social media holds the smoking gun.

Pete Cashmore

What happens in Vegas ends up on YouTube.

Tim Leberecht

There’s no silver bullet solution with cybersecurity, a layered defense is the only viable defense.

James Scott

How many IoT devices exist, with how many computing devices do they share data? How many others have access to that data and what decisions are being made with this data? No one really knows. We just don’t know.

Rebecca Herold

You might think that your government is vigilant when it comes to securing your personal information, or that of your children. You would be wrong. Hackers have discovered one of the biggest potential security holes of the modern era, one that can leave data exposed to any hacker willing to find it. And in at least one instance, that vulnerability has resulted in a data breach impacting almost three dozen children and their families.

Jake Tapper

Cyber-Security is much more than a matter of IT.

Stephane Nappo

Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it.

Edward Snowden

I really think that if we change our own approach and thinking about what we have available to us, that is what will unlock our ability to truly excel in security. It’s a perspectives exercise. What would it look like if abundance were the reality and not resource constraint?

Greg York

Being able to break security doesn’t make you a hacker any more than being able to hotwire cars makes you an automotive engineer.

Eric Raymond

As our country increasingly relies on electronic information storage and communication, it is imperative that our Government amend our information security laws accordingly.

Jo Ann Davis

It used to be expensive to make things public and cheap to make them private. Now it’s expensive to make things private and cheap to make them public.

Clay Shirky

Investors see data breaches as a threat to a company’s material value and feel discouraged in investing in a business that has had its sensitive information compromised.

Malcolm Marshal

From cyberbullying to sexting to prowling predators, the Information Age has brought with it a new spectrum of risks and threats for parents to guard their children against, and now that spectrum of threats has expanded to include child identity theft.

Richard Power

I believe we will all be responsible for our own security – no vendor, service provider, or even government entity will save us.

Sean Martin

IoT without security = internet of threats

Stepahne Nappo

Any type of operating system that I wanted to be able to hack, I basically compromised the source code, copied it over to the university because I didn’t have enough space on my 200-megabyte hard drive.

Kevin Mitnick

In an ICS environment, typical enterprise IT doesn’t work. Small maintenance windows are part of the problem. When things must run around the clock, sometimes there is just once a year where there’s enough downtime to do a security upgrade.

Tauseef Ghazi

If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked.

Richard Clarke

Whether it’s Facebook or Google or the other companies, that basic principle that users should be able to see and control information about them that they themselves have revealed to the companies is not baked into how the companies work. But it’s bigger than privacy. Privacy is about what you’re willing to reveal about yourself.

Eli Pariser

Security culture can achieve more than prohibition posture.

Stephane Nappo

The knock-on effect of a data breach can be devastating for a company. When customers start taking their business—and their money—elsewhere, that can be a real body blow.

Christopher Graham

There are no secrets better kept than the secrets that everybody guesses.

George Bernard Shaw

When you know that you’re capable of dealing with whatever comes, you have the only security the world has to offer.

Harry Browne

Secure web browsing is a game of changing tactics. Just when you think you’ve made your computer as safe to use as possible, the landscape changes. Cybercriminals are constantly developing new methods to hijack your system, and unless you stay ahead of the game you could find yourself with a very large problem.

Pat Heck

We will bankrupt ourselves in the vain search for absolute security.

Dwight D.

We should treat personal electronic data with the same care and respect as weapons-grade plutonium – it is dangerous, long-lasting and once it has leaked there’s no getting it back.

Cory Doctorow

Security is a public good. You don’t get as much of it if you try to only protect yourself as you do if you work to protect the whole #community and others do the same.

Tarah M. Wheeler

A modern cybersecurity program must have Board and Executive level visibility, funding, and support. The modern cybersecurity program also includes reporting on multiple topics: understanding how threats impact revenues and the company brand, sales enablement, brand protection, IP protection, and understanding cyber risk.

Demitrios ‘Laz’ Lazarikos

Passwords are like underwear: you don’t let people see it, you should change it very often, and you shouldn’t share it with strangers.

Chris Pirillo

The methods that will most effectively minimize the ability of intruders to compromise information security are comprehensive user training and education. Enacting policies and procedures simply won’t suffice. Even with oversight the policies and procedures may not be effective: my access to Motorola, Nokia, ATT, Sun depended upon the willingness of people to bypass policies and procedures that were in place for years before I compromised them successfully.

Kevin Mitnick

A business will have good security if its corporate culture is correct. That depends on one thing: tone at the top. There will be no grassroots effort to overwhelm corporate neglect.

William Malik

Relying on the government to protect your privacy is like asking a peeping tom to install your window blinds.

John Perry Barlow

What we should actually be doing is thinking about what are our key controls that will mitigate the risks. How do we have those funneled and controlled through the team that we have, how do we work through that in a well formatted, formulated process and pay attention to those controls we have chosen? Not a continual, add more, add more, add more.

Dr. Chris Pierson

Be a little suspicious. A very large number of attacks rely on simple social engineering. Ask yourself next time you receive an e-mail claiming you have won an iPad or received a FedEx package — is this probably real? Would it happen to me walking down the street? Scams today aren’t all identifiable by poor grammar and spelling mistakes, as they once were.

James Lyne

We’re concerned that people are trading security for convenience…People are doing things on free Wi-Fi that are really alarming.

Doug Shadel

Understand what data you hold, how you are using it, and make sure that you are practicing good data hygiene.

David Mount

The emerging nature of cyber risk is that it’s becoming systemic – as were the risks that led to the credit crisis.

John Scott

If we are safe online, we can all enjoy the internet’s abundant resources of information, entertainment, and social connection – while guarding against dangers and risks which can turn our internet experience from good to bad.

Paul Fletcher

In theory, one can build provably secure systems. In theory, theory can be applied to practice but in practice, it can’t.

M. Dacier

When it comes to privacy and accountability, people always demand the former for themselves and the latter for everyone else.

David Brin

No system of mass surveillance has existed in any society, that we know of to this point, that has not been abused.

Edward Snowden

My message to companies that think they haven’t been attacked is: ‘You’re not looking hard enough.

James Snook

Data. We love it. And we also know just how important it is to keep it safe. These days we’re plugged in anywhere and all the time. Sometimes, we may not even realize how plugged in we actually are while our apps, web searches, and credit card purchases are constantly storing our actions in the background.

Katie Atkinson

Disruptive technologies are fundamentally expanding the ‘Art of the Possible’; reshaping the solution provider ecosystem with a new hierarchy of winners and losers and discombobulating expectations of how and by whom risk and security should be managed and led.

Thornton May

A security system with several layers is difficult to hack. So, even if your data is targeted, getting through the many tiers of security will be a hassle. The simplest of programs, such as free online email accounts, have multi-layered security, too. Even if accessing your accounts takes a few extra steps, it is still worth the effort, certainly better than losing your data. Using a firewall, making sure your antivirus software is updated, running antivirus checks frequently and updating your programs regularly are all part of maintaining your personal data security.

Doug Theis

Security in IT is like locking your house or car – it doesn’t stop the bad guys, but if it’s good enough they may move on to an easier target.

Paul Herbka

Strengthening U.S. cybersecurity is common sense, like locking your door at night. But it’s one thing to turn the lock — and another to spend the night hunched in your living room with a shotgun.

Douglas Birch

All computer users should treat any unsolicited email attachments with extreme caution, or they run the risk of being ripped off. Anyone unfortunate enough to run malicious software could potentially be allowing hackers to gain access to their computer to spy, steal and cause havoc. Users need to savvy-up to reduce the risk of being taken in by greedy, money-grabbing internet criminals.

Graham Cluley

While it’s illegal to use Brad Pitt’s image to sell a watch without his permission, Facebook is free to use your name to sell one to your friends.

Eli Pariser

The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.

Gene Spafford

Information security’s response to bitter failure, in any area of endeavour, is to try the same thing that didn’t work — only harder.

Marcus Ranum

Torture the data, and it will confess to anything.

Ronald Coase

Leave a Reply

Your email address will not be published. Required fields are marked *