Anna Saraswati / Cyber Criminals / Cyber Security / Cybersecurity PR / Developer / Hackers / Hacking / Integrated Marketing Communications / IT Infrastructure Solution / IT Solution / Marketing and Business / Marketing PR / Phishing / White Hat Hackers April 6, 2018
Data security is a top concern not only for enterprises and small business, but for everyday consumers as well. With widespread data breaches exposing everything from customer login credentials to credit card information to personal health records, consumers must be savvy about data security and take steps to protect their own information. Fortunately, there are many ways individuals and families can take extra precautions to ensure their personal data is safe and secure from hackers and malicious criminals.
While few security measures can guarantee that no data security breaches will affect you, implementing multiple layers of personal data security protections substantially reduces the likelihood that your data will be compromised. Educating yourself on what to do should your identity be stolen or your personal data exposed will help you take the proper steps to minimize damage after the fact.
To that end, we’ve compiled a list of 101 informative quotes on data security, ranging from quotes about the state of modern data security to useful tips on protecting your family’s personal information, how to teach your children proper data security measures and keep them safe online, identifying hoaxes and scams, and more. The following 101 data security quotes are categorized for simple perusing and are not listed in any particular order of importance.
GENERAL COMPUTER AND DEVICE SECURITY
1) “If there are other people using your computer, you may be worried that someone else may accidentally access, modify, and/or delete your files. Most operating systems (including Windows XP and Vista, Mac OS X, and Linux) give you the option of creating a different user account for each user, and you can set the amount of access and privileges for each account. You may also choose to have separate accounts for your work and personal purposes. While this approach will not completely isolate each area, it does offer some additional protection. However, it will not protect your computer against vulnerabilities that give an attacker administrative privileges. Ideally, you will have separate computers for work and personal use; this will offer a different type of protection.” – United States Computer Emergency Readiness Team (US-CERT) Twitter: @uscert_gov
2) “It’s always a good idea to lock your PC if strangers are nearby and you step away for a few minutes. Just press Windows key+L to lock your PC. Alternatively, you can set your screensaver (via the Screensaver tab in Display Settings under Control Panel) to require a password if it’s deactivated by checking the box in ‘Settings’ that says ‘On resume, password protect.'” – ComputerShopper.com (The Best Computer Tips and Tricks: Data Security) Twitter: @computershopper
3) “Practice the principle of least privilege. Do not log into a computer with administrator rights unless you must do so to perform specific tasks. Running your computer as an administrator (or as a Power User in Windows) leaves your computer vulnerable to security risks and exploits. Simply visiting an unfamiliar Internet site with these high-privilege accounts can cause extreme damage to your computer, such as reformatting your hard drive, deleting all your files, and creating a new user account with administrative access.” – Indiana University (Best practices for computer security) Twitter: @insideUITS
4) “Software updates often fix security problems, so download updates as soon as they become available. To make this easier, more software programs–including Windows, Office, Flash, Java and Adobe Acrobat—now offer options to download and install updates automatically; these can generally be accessed through ‘Settings’ or ‘Preferences.'” – California SBDC (10 Tips to Computer Security for Your Small Business – June 2012) Twitter: @SBDCLosAngeles
5) “Your computer operating system may allow other computers on a network, including the Internet, to access the hard-drive of your computer in order to “share files”. This ability to share files can be used to infect your computer with a virus or look at the files on your computer if you don’t pay close attention. So, unless you really need this ability, make sure you turn off file-sharing. Check your operating system and your other program help files to learn how to disable file sharing. Don’t share access to your computer with strangers!” – CyberSmart.org (Internet Safety Tips for Elementary and Middle School Students, Educators and Families)
6) “The biggest mistake any hardware user can make is to ignore backing up their data. Software can be reinstalled; data lost is irreplaceable. We are in a digital age and a lot of our data is stored digitally – bank records, photos, letters, music. A recent NCSA/Symantec study showed that over 68% of Americans store more than 25% of their photos digitally, for example. There are any number of ways data can be lost. Accidental deletion is common. Device failure happens. Natural events, such as electrical or wind storms, fires, or floods can eradicate data. Cyber events such as viruses, spyware or other cyber attacks can remove data, as well.” – SafetyWeb (Cyber Security Tips)
7) “The Internet of Things arrived in force at this year’s International CES, the huge trade show here. But while manufacturers at the event painted a rosy picture of connected grills, coffee makers, refrigerators, and door locks, security experts and regulators warned that the Internet of Things could be a threat to both security and privacy. Hackers have already breached Internet-connected camera systems, smart TVs, and even baby monitors. In one case, someone hacked a networked camera setup and used it to scream obscenities into a baby nursery.” – Molly Wood, The New York Times (CES: Security Risks from the Smart Home) Twitter: @mollywood
8) “You have to make sure that your hard drive is external from your computer. If you put yourself in the minds of the thief, they want to make a quick buck. They don’t really care about your hard drive, just your computer. An external hard drive is critical. In my case they left the hard drive behind and I was able to plug it into my new computer. It was the key to everything.” – Michael Stelzner, Social Media Marketer (Theft: 9 Ways to Protect Yourself from Losing Your Data) Twitter: @SMExaminer
9) “It is important to properly handle data erasure and disposal of electronic media (e.g. PCs, CDs, thumb drives) in order to protect confidential and sensitive data from accidental disclosure. Become familiar with the proper methods of sanitizing, destroying, or disposing of media containing sensitive information.” – Multi-State Information Sharing and Analysis Center (Safeguarding Your Data) Twitter: @CISecurity
10) “Disable the Auto-Run feature in Windows. This built-in Windows component allows silent programs to execute without your knowledge because auto-run grants them permission to initiate without obtaining active consent.” – ComboFix.org (15 Tips for Online Safety and Security)
11) “Many recommendations across the ‘Net sound like this: ‘Don’t keep your information on the cloud.’ Fair enough, but it’s the same as if you asked, ‘How not to get my house burned down?’ and the answer would be, ‘Do not have a house.’ The logic is solid, but a better way to translate such advice is, ‘avoid storing sensitive information on the cloud.’ So if you have a choice you should opt for keeping your crucial information away from virtual world or use appropriate solutions.” – Victoria Ivey, CIO.com (5 Tips to Keep Your Data Secure on the Cloud) Twitter: @CIOonline
12) “Your Windows login password is not encrypting your computer (surprise!). Full-disk encryption (used by very few people) is a good step, but by itself it still will not completely protect your data from prying eyes, overzealous governments, or your own mistake of leaving your company’s crown jewels at the local coffee shop.” – Brandon Gregg, CSO Online (Three steps to properly protect your personal data) Twitter: @CSOonline
13) “Nearly 60 percent of Americans use three or more Internet-connected devices at home across three different operating systems, according to a recent survey by the Internet security company AVG. With so many gadgets connected to online marketplaces, credit-card and Social Security numbers, banking information, passwords, family photos, and more accumulate in places you might not expect—say on that 7-year-old Nintendo Wii collecting dust on a shelf in your family room or on a hard drive you used to back up your PC at some point very early in President Obama’s first term.” – ConsumerReports.org (Avoid ID theft and protect personal data when getting rid of a gadget) Twitter: @ConsumerReports
14) “A security system with several layers is difficult to hack. So, even if your data is targeted, getting through the many tiers of security will be a hassle. The simplest of programs, such as free online email accounts, have multi-layered security, too. Even if accessing your accounts takes a few extra steps, it is still worth the effort, certainly better than losing your data. Using a firewall, making sure your antivirus software is updated, running antivirus checks frequently and updating your programs regularly are all part of maintaining your personal data security.” – Doug Theis, Innovative Integration, Inc. (3 Simple Tips for Protecting Personal Data) Twitter: @InnovativeII