Top 27 Cyber Security Quotes

Cyber Security QuotesCybersecurity is a trending topic right now across industries, and for apparent reasons. With increased cybercrimes cases including data breach that exposes everything from client’s login credentials to credit card details to personal health records, customers need to be aware of data security measures and how to protect themselves against cyber crimes. The good news is that there are many ways individuals can take to keep their data safe from malicious criminals. Implementing several layers of data security reduces the risk of your data being compromised. It’s also important to educate yourself on what to do in case there is a security breach, and your personal data is exposed to hackers.

That said, we’ve enlisted some informative cybersecurity quotes you need to know to navigate through the modern cybersecurity world.


“Passwords are like underwear: don’t let people see it, change it very often, and you shouldn’t share it with strangers.” – Chris Pirillo

US Cyber Security Regulations

“Corporate America should get ready. Cybersecurity regulations will soon be coming to the United States — and that’s actually a good thing… I firmly believe that the US will pass similar regulations (like GDPR) over the next two years.” – Robert Herjavec, CEO of Herjavec Group

General Data Protection Regulation (GDPR)

“The FCA is all too aware of the sheer breadth of cyber issues facing firms, which more than half of UK businesses reported to have been hit by ransomware attacks. The expectation is that firms should seek out this particularly prevalent form of attack. There is no single type of ransomware attack but whichever form of ransomware is used, all will seek to prevent a firm or an individual from using their IT systems and will ask for something (usually payment of a ransom) to be done before access will be restored.” Stacy English, Head of Regulatory Intelligence at Thomas Reuters Regulatory Intelligence

Biometric Data’s Security

“We are giving away too much biometric data. If a bad guy wants your biometric data, remember this: he doesn’t need your actual fingerprint, just the data that represents your fingerprint. That will be unique, one of a kind.” — Mike Muscatel, Senior. Information Security Manager, Snyder’s-Lance.

Security of Computers and Devices

“A security system with several layers is difficult to hack. So, even if your data is targeted, getting through the many tiers of security will be a hassle. The simplest of programs, such as free online email accounts, have multi-layered security, too. Even if accessing your accounts takes a few extra steps, it is still worth the effort, certainly better than losing your data. Using a firewall, making sure your antivirus software is updated, running antivirus checks frequently and updating your programs regularly are all part of maintaining your personal data security.” – Doug Theis, Innovative Integration, Inc.

“The popularity and adoption of smartphones have greatly stimulated the spread of mobile malware, especially on the popular platforms such as Android. In light of their rapid growth, there is a pressing need to develop effective solutions. However, our defense capability is largely constrained by the limited understanding of these emerging mobile malware and the lack of timely access to related samples.” – Yajin Zhou and Xuxian Jiang, North Carolina State University

“Whether you’re traveling with a laptop, netbook, smartphone, iPad, or all of the above, the risks and defenses against them are basically the same, according to Joe Nocera, an information security expert and a principal with PricewaterhouseCoopers. ‘Many of the security concerns that people think about when they think about their personal computers are applicable in the mobile world.’ As mobile devices become more sophisticated, they lend themselves to the same types of access to e-mail, passwords, and other secure information that PCs have done in the past.” – Logan Kugler, PCWorld

The Effectiveness of Ransomware

“Ransomware is more about manipulating vulnerabilities in human psychology than the adversary’s technological sophistication.”– James Scott, Senior. Fellow, Institute for Critical Infrastructure Technology

“Ransomware is unique among cybercrime because in order for the attack to be successful, it requires the victim to become a willing accomplice after the fact.” – James Scott

“We’re talking about the fate of our economy and the questionable resiliency of our Nation’s critical infrastructure. Why are experts so polite, patient, and forgiving when talking about cybercrime, cyber security quotes, and National Security? The drama of each script kiddie botnet attack and Nation State pilfering of our IP has been turned into a soap opera through press releases, sound bites and enforced absurdity of mainstream media. It’s time for a cybersecurity zeitgeist in the West where cyber hygiene is a meme that is aggressively distributed by those who have mastered it and encouraged to be imitated by those who have experienced it.” ― James Scott.

Security of Firewalls

“Companies spend millions of dollars on firewalls, encryption, and secure access devices, and its money wasted; none of these measures address the weakest link in the security chain.”– Kevin Mitnick, “The famous hacker in the world”

“As we’ve come to realize, the idea that security starts and ends with the purchase of a prepackaged firewall is simply misguided.” – Art Wittmann

Hacking Systems

“Any type of operating system that I wanted to be able to hack, I basically compromised the source code, copied it over to the university because I didn’t have enough space on my 200-megabyte hard drive.” – Kevin Mitnick

“Most people are starting to realize that there are only two different types of companies in the world: those that have been breached and know it and those that have been breached and don’t know it. Therefore, prevention is not sufficient and you’re going to have to invest in detection because you’re going to want to know what system has been breached as fast as humanly possible so that you can contain and remediate.” – Ted Schlein, a venture capitalist with Kleiner Perkins Caufield & Byers.

Security Features and Controls

“What we should actually be doing is thinking about what are our key controls that will mitigate the risks. How do we have those funneled and controlled through the team that we have, how do we work through that in a well formatted, formulated process and pay attention to those controls we have chosen? Not a continual, add more, add more, add more.” — Dr. Chris Pierson, Chief Executive Officer at Binary Sun Cyber Risk Advisors, SecureWorld Charlotte

Effect of a Data Breach

“The knock-on effect of a data breach can be devastating for a company. When customers start taking their business—and their money—elsewhere, that can be a real body blow.” – Christopher Graham

Cyber Risks

“Cybercriminals are finding local government agencies to be prime targets for cyberattacks. The City of Atlanta is a recent example, where a ransomware attack is costing the city millions of dollars, after knocking out critical services and erasing years of sensitive data. This incident shows how, without data, our communities cease to function in any sort of fashion today’s citizens find acceptable. Data protection needs to be top of mind no matter the size of the community or agency.” – Jim Varner, CEO and president of SecurityFirst

“One of the main cyber-risks is to think they don’t exist. The other is to try to treat all potential risks.
(Fix the basics, protect first what matters for your business and be ready to react properly to pertinent threats. Think data, but also business services integrity, awareness, customer experience, compliance, and reputation).” ― Stephane Nappo

“Threat is a mirror of security gaps. Cyber-threat is mainly the reflection of our weaknesses. An accurate vision of digital and behavioral gaps is crucial for a consistent cyber-resilience.” ― Stephane Nappo

“Cybercriminals can use personal details, such as your favorite color, the last four digits of your credit card and your email addresses, to make educated guesses about your sign-in credentials. They might contact a service provider posing as a user, provide identifying details and gain even greater access to accounts. This is why it is so important to prevent your security credentials from becoming stagnant. Rotate your password every few months and consider using new security questions and answers, too.” – Larry Alton,

“Connecting any strategic infrastructure to the internet makes it vulnerable to security threats and most government systems connected in South are extremely vulnerable to hacking, data leakages, and hijacking.” ― Arzak Khan

“Cybercrime is the greatest threat to every company in the world.” – Ginni Rommety

The Internet of Things (IoT)

“How many IoT devices exist, with how many computing devices do they share data? How many others have access to that data and what decisions are being made with this data? No one really knows. We just don’t know.” — Rebecca Herold, Privacy Professor, at SecureWorld Atlanta

Identity Theft Security

“Data privacy and security is about much more than keeping hackers at bay. It is also about assuring consumers that the trust they place in a consumer product brand is warranted. The results of a recent survey of consumers and executives show that consumers have a keen sense of awareness of the risks surrounding data security and privacy, and that many consumer product executives are likely overestimating the extent to which they are meeting consumer expectations related to data privacy and security.” – Pat Conroy, Raj Singhal, Anupam Narula & Frank Milano, Deloitte University Press.

Introducing an Updated Cyber Risk Program

“A modern cybersecurity program must have Board and Executive level visibility, funding, and support. The modern cybersecurity program also includes reporting on multiple topics: understanding how threats impact revenues and the company brand, sales enablement, brand protection, IP protection, and understanding cyber risk.” — Demitrios ‘Laz’ Lazarikos, Founder, Blue Lava, Inc.

Solution to Cybersecurity

“I really think that if we change our own approach and thinking about what we have available to us, that is what will unlock our ability to truly excel in security. It’s a perspectives exercise. What would it look like if abundance were the reality and not resource constraint?” — Greg York, Vice President, Tribune Media, at SecureWorld Chicago

Wrapping it Up

In a nutshell, from the cyber security quotes above, it’s clear that cybercrime is a great problem faced by many individuals and businesses. Companies that ignore the risk of data breach or failure to invest in data protection systems are unlikely to survive for a long time.

So, it’s time to focus on the cybersecurity menace before it gets out of hand.


Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.