CYBER NEWS









Does cyber security concern you? You may think not, but think twice! How secure is your data? Has the company you’ve been working for ever been hacked? Do you use public Wi-Fi? Have you backed up your data? Are you familiar with encryption? How much do you value уour data and respectively, yourself?









Let’s “ask” the experts!

Top 20 Cyber Security Quotes: Truth Be Told!

Q: I got hacked! Who should I blame?

A: “As the world is increasingly interconnected, everyone shares the responsibility of securing cyberspace.”

– Newton Lee, Counterterrorism and Cybersecurity: Total Information Awareness

Q: Why are black hats acting like they’re not part of this world?

A: “In the underworld, reality itself has elastic properties and is capable of being stretched into different definitions of the truth.”

– Roderick Vincent, The Cause

Q: Why is ransomware so effective?

A: “Ransomware is more about manipulating vulnerabilities in human psychology than the adversary’s technological sophistication.”

– James Scott, Sr. Fellow, Institute for Critical Infrastructure Technology

A: “Ransomware is unique among cybercrime because in order for the attack to be successful, it requires the victim to become a willing accomplice after the fact.”

– James Scott









Q: Why is a firewall never enough?

A: “As we’ve come to realize, the idea that security starts and ends with the purchase of a prepackaged firewall is simply misguided.”

– Art Wittmann

A: “Companies spend millions of dollars on firewalls, encryption and secure access devices, and it’s money wasted; none of these measures address the weakest link in the security chain.”

– Kevin Mitnick, “The World’s Most Famous Hacker”

Q: How easy is it to hack a system?

A: “Any type of operating system that I wanted to be able to hack, I basically compromised the source code, copied it over to the university because I didn’t have enough space on my 200 megabyte hard drive.”

– Kevin Mitnick

Q: What targets do hackers prefer?

A: “Hackers find more success with organizations where employees are under appreciated, over worked and under paid. Why would anyone in an organization like that care enough to think twice before clicking on a phishing email?”

– James Scott

A: “People always make the best exploits. I’ve never found it hard to hack most people. If you listen to them, watch them, their vulnerabilities are like a neon sign screwed into their heads.”

– Elliot Alderson, Mr. Robot

Q: Why is information constantly at risk of exploits?

A: “Hardware is easy to protect: lock it in a room, chain it to a desk, or buy a spare. Information poses more of a problem. It can exist in more than one place; be transported halfway across the planet in seconds; and be stolen without your knowledge.”

– Bruce Schneier, Protect Your Macintosh, 1994

Q: Why do computer viruses exist at all?

A: “I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We’ve created life in our own image.”

– Stephen Hawking

Q: Why can’t I be a hacker?!

A: “Being able to break security doesn’t make you a hacker anymore than being able to hotwire cars makes you an automotive engineer.”

– Eric Raymond

Q: Why was I hacked? I had active anti-malware protection!

A: “If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology.”

– Bruce Schneier

A: “Hoaxes use weaknesses in human behavior to ensure they are replicated and distributed. In other words, hoaxes prey on the Human Operating System.”

– Stewart Kirkpatrick

Q: Why is cyber security such a successful business field?

A: “We will bankrupt ourselves in the vain search for absolute security.”

– Dwight D. Eisenhower

A: “One person’s “paranoia” is another person’s “engineering redundancy.”

– Marcus J. Ranum

Q: Expert security advice for companies?

A: “My message for companies that think they haven’t been attacked is: “You’re not looking hard enough”.

– James Snook

A: “Understand what data you hold, how you are using it, and make sure that you are practicing good data hygiene.”

– David Mount

A: “In the very near future, cyber security exercises are going to be absolutely expected of all companies by regulators.”

– Michael Vatis

Q: Why is it so difficult to arrest hackers?

A: “The only crime that has been proven is the hack. That is the story.”

– Ramon Fonseca

Quote sources:

http://www.goodreads.com/quotes/tag/cyber-security

https://blog.illusivenetworks.com

http://www.cyberrescue.co.uk/







