If you spend your time living and breathing information security, there are some quotes that you share with others on a regular basis. Here are some quotes that provide insight, reminders, and tips.
 Scott Nealy, co-founder of computer technology company Sun Microsystems, once said, “You have zero privacy.” Once you post something online, it has the potential to be online forever. So, think before you post. Do you really want that photo to be seen by your boss or by your grandmother? Ask yourself that question before posting anything.
 Mike Sullivan, Director of Education for Take Charge America, said “I always tell people that if you haven’t had your identity stolen already, you will. There are just so many outlets and so many ways it can happen.”
 Richard Power, Distinguished Fellow, Carnegie Mellon CyLab, wrote, “From cyberbullying to sexting to prowling predators, the Information Age has brought with it a new spectrum of risks and threats for parents to guard their children against, and now that spectrum of threats has expanded to include child identity theft.”
 Kevin Mitnick wrote, “Companies spend millions of dollars on firewalls, encryption and secure access devices, and it’s money wasted, because none of these measures address the weakest link in the security chain.” How much time and effort does your business allocate toward regular network security training for all employees?
 Technology author Richard Clarke has said, “If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked.”
 Bruce Schneier said, “Computer security can simply be protecting your equipment and files from disgruntled employees, spies, and anything that goes bump in the night, but there is much more. Computer security helps ensure that your computers, networks, and peripherals work as expected all the time, and that your data is safe in the event of hard disk crash or a power failure resulting from an electrical storm. Computer security also makes sure no damage is done to your data and that no one is able to read it unless you want them to.”
 James Scott said, “Ransomware is unique among cybercrime because in order for the attack to be successful, it requires the victim to become a willing accomplice after the fact.” Again, how often does your business provide network security training to all employees?
 According to Stepahane Nappo, “It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.” State of Hawaii, are you listening?
 According to Jo Ann Davis, “As our country increasingly relies on electronic information storage and communication, it is imperative that our Government amend our information security laws accordingly.” Legislators, are you listening?
What’s your fave infosec quote, reminder, or tip?