{"id":3823,"date":"2020-07-07T11:49:19","date_gmt":"2020-07-07T18:49:19","guid":{"rendered":"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/?p=3823"},"modified":"2021-04-26T13:48:42","modified_gmt":"2021-04-26T20:48:42","slug":"it-security-quotes-or-what-could-go-even-wronger","status":"publish","type":"post","link":"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/2020\/07\/07\/it-security-quotes-or-what-could-go-even-wronger\/","title":{"rendered":"IT Security Quotes &#8230; or What Could Go Even WrongER!"},"content":{"rendered":"<h1 style=\"text-align: center\"><span style=\"color: #ff0000\"><span style=\"color: #ffff00\"><span style=\"color: #ff0000\"><span style=\"color: #800000\">IT Security Quotes<\/span><br \/>\n<span style=\"color: #ffcc00\"><span style=\"color: #666699\">. . . . or . . . .<\/span><br \/>\n<span style=\"color: #339966\"><span style=\"color: #ffff00\"><span style=\"color: #cc99ff\">What Could Go Even<\/span> <span style=\"color: #ff0000\">Wrong<em><span style=\"text-decoration: underline\">ER<\/span><\/em>!<\/span><\/span><br \/>\n<\/span><\/span><\/span><\/span><\/span><\/h1>\n<p style=\"text-align: left\"><b><span style=\"color: #993300\">I work from the Desk of VicU Computers Helpers. Pleeze conform to me your pazzword or your Internet will dissolve.<\/span><\/b><\/p>\n<p style=\"text-align: left\"><b><span style=\"color: #993300\"><span style=\"color: #000000\">Yeah, right. IT Security is a huge, HUGE issue and is now part of our digital lives &#8211; both personally and professionally. And for good reason.<\/span><\/span><span style=\"color: #ff0000\"><span style=\"color: #000000\"><br \/>\n<\/span><\/span><\/b><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-3908 aligncenter\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Coffee-Security.png\" alt=\"\" width=\"494\" height=\"47\"><\/p>\n<p style=\"text-align: left\"><span style=\"color: #000000\"><b><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3875 alignright\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Security-700x459.png\" alt=\"\" width=\"204\" height=\"134\" srcset=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Security-700x459.png 700w, https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Security-207x136.png 207w, https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Security-260x170.png 260w, https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Security-430x283.png 430w, https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Security.png 708w\" sizes=\"auto, (max-width: 204px) 85vw, 204px\" \/><\/b>So, right off the top, the best and most informative sites are <strong>HERE AT UVIC<\/strong>! If you haven&#8217;t visited, read or been told about these incredible resources, then now is your chance. And since a picture is worth 1000 words &#8230;. here are 6000 words!<\/span><\/p>\n<h3 style=\"text-align: center\"><strong><span style=\"color: #000000\">Click on each image below to go to the UVic site.<\/span><\/strong><\/h3>\n<figure id=\"attachment_3844\" aria-describedby=\"caption-attachment-3844\" style=\"width: 469px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.uvic.ca\/systems\/services\/informationsecurity\/index.php\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3844\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Information-Security-UVIC.png\" alt=\"\" width=\"469\" height=\"440\"><\/a><figcaption id=\"caption-attachment-3844\" class=\"wp-caption-text\"><strong><span style=\"color: #0000ff\">Information Security<\/span><\/strong><\/figcaption><\/figure>\n<figure id=\"attachment_3843\" aria-describedby=\"caption-attachment-3843\" style=\"width: 468px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.uvic.ca\/systems\/status\/features\/phishing.php\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3843\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/University-Systems-status-update.png\" alt=\"\" width=\"468\" height=\"170\"><\/a><figcaption id=\"caption-attachment-3843\" class=\"wp-caption-text\">University Systems status update<br \/><strong><span style=\"color: #0000ff\">Phishing<\/span><\/strong><\/figcaption><\/figure>\n<figure id=\"attachment_3868\" aria-describedby=\"caption-attachment-3868\" style=\"width: 273px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/onlineacademiccommunity.uvic.ca\/phishbowl\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-3868\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Phishbowl.png\" alt=\"Phishing emails spotted at UVic\" width=\"273\" height=\"586\"><\/a><figcaption id=\"caption-attachment-3868\" class=\"wp-caption-text\"><strong><span style=\"color: #0000ff\">Phishing emails spotted at UVic<\/span><\/strong><\/figcaption><\/figure>\n<figure id=\"attachment_3846\" aria-describedby=\"caption-attachment-3846\" style=\"width: 474px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.uvic.ca\/systems\/support\/informationsecurity\/phishing\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-3846\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Phishing-Awareness-Training.png\" alt=\"\" width=\"474\" height=\"231\"><\/a><figcaption id=\"caption-attachment-3846\" class=\"wp-caption-text\"><strong><span style=\"color: #0000ff\">Phishing Awareness Training Campaign<\/span><\/strong><\/figcaption><\/figure>\n<figure id=\"attachment_3845\" aria-describedby=\"caption-attachment-3845\" style=\"width: 475px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.uvic.ca\/systems\/services\/informationsecurity\/antivirus-software-for-students\/index.php\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-3845\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Antivirus-Software-for-Students.png\" alt=\"\" width=\"475\" height=\"158\"><\/a><figcaption id=\"caption-attachment-3845\" class=\"wp-caption-text\"><strong><span style=\"color: #0000ff\">Antivirus Software for Students<\/span><\/strong><\/figcaption><\/figure>\n<figure id=\"attachment_3847\" aria-describedby=\"caption-attachment-3847\" style=\"width: 477px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/onlineacademiccommunity.uvic.ca\/insideit\/2019\/06\/10\/common-cybersecurity-questions\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-3847\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Inside-IT-700x170.png\" alt=\"VIDEO: 5 Common Cybersecurity Questions Answered\" width=\"477\" height=\"116\" srcset=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Inside-IT-700x170.png 700w, https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Inside-IT-768x187.png 768w, https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Inside-IT.png 801w\" sizes=\"auto, (max-width: 477px) 85vw, 477px\" \/><\/a><figcaption id=\"caption-attachment-3847\" class=\"wp-caption-text\"><strong><span style=\"color: #0000ff\">VIDEO: 5 Common Cybersecurity Questions Answered<\/span><\/strong><\/figcaption><\/figure>\n<figure id=\"attachment_3839\" aria-describedby=\"caption-attachment-3839\" style=\"width: 478px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/onlineacademiccommunity.uvic.ca\/cisoblog\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-3839\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/CISO-Blog.png\" alt=\"\" width=\"478\" height=\"180\"><\/a><figcaption id=\"caption-attachment-3839\" class=\"wp-caption-text\"><strong><span style=\"color: #0000ff\">Personal Perspectives from UVic&#8217;s Chief Information Security Officer<\/span><\/strong><\/figcaption><\/figure>\n<figure id=\"attachment_3885\" aria-describedby=\"caption-attachment-3885\" style=\"width: 463px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.uvic.ca\/engineering\/home\/news\/current\/2019oct-uvic-team-triumphs-at-cybersecurity-conference.php\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3885\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/UVIC-Team-CyberSecurity.png\" alt=\"\" width=\"463\" height=\"406\"><\/a><figcaption id=\"caption-attachment-3885\" class=\"wp-caption-text\"><strong><span style=\"color: #0000ff\">UVic Team Triumphs at National Cybersecurity Competition<\/span><\/strong><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3876 alignleft\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/They-want.png\" alt=\"\" width=\"235\" height=\"248\">Enroll in any computer security training that UVic has to offer! Refresh your Cyber Spidey Sense Skills all the time! Be aware of Phishing attempts! And be even MORE VIGILANT now that we are working from home &#8211; the same skills you are honing for work, are as important for your home digital security too!<\/p>\n<p><strong><span style=\"color: #ff00ff\"><br \/>\n&#8220;If you spend more on coffee than on IT security, you will be hacked. What&#8217;s more, you deserve to be hacked.&#8221;<\/span><\/strong><br \/>\n<strong><span style=\"color: #ff00ff\">&nbsp;&nbsp;&nbsp;&nbsp; &#8211; Richard Clarke<br \/>\n<\/span><\/strong><\/p>\n<div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p><strong><span style=\"color: #993366\">&#8220;My message for companies that think they haven&#8217;t been attacked is: You are not looking hard enough.&#8221;<\/span><\/strong><br \/>\n<strong><span style=\"color: #993366\">&nbsp;&nbsp;&nbsp;&nbsp; -James Snook<br \/>\n<\/span><\/strong><\/p>\n<div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p><strong><span style=\"color: #008000\">&#8220;The five most efficient cyber defenders are: Anticipation, Education, Detection, Reaction and Resilience. Do remember: Cybersecurity is much more than an IT topic.&#8221;<\/span><\/strong><br \/>\n<strong><span style=\"color: #008000\">&nbsp;&nbsp;&nbsp;&nbsp; &#8211; Stephane Nappo<img loading=\"lazy\" decoding=\"async\" class=\" wp-image-3891 alignright\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Homer-Security.gif\" alt=\"\" width=\"309\" height=\"232\"><br \/>\n<\/span><\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p><strong><span style=\"color: #808000\">&#8220;It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.&#8221;<\/span><\/strong><br \/>\n<strong><span style=\"color: #808000\">&nbsp;&nbsp;&nbsp;&nbsp; &#8211; Stephan Nappo<br \/>\n<\/span><\/strong><\/p>\n<p><strong><span style=\"color: #333399\">&#8220;USBs are the devil. They just are.&#8221;<\/span><\/strong><br \/>\n<strong><span style=\"color: #333399\">&nbsp;&nbsp;&nbsp;&nbsp; &#8211; Overheard at SecureWorld, Atlanta<br \/>\n<\/span><\/strong><\/p>\n<div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p><strong><span style=\"color: #808080\">&#8220;IoT without security = Internet of Threats&#8221;<\/span><\/strong><br \/>\n<strong><span style=\"color: #808080\">&nbsp;&nbsp;&nbsp;&nbsp; &#8211; Stephane Nappo<br \/>\n<\/span><\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"page\" title=\"Page 2\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 2\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p><strong><span style=\"color: #ff6600\">&#8220;One Person&#8217;s &#8220;paranoia&#8221; is another person&#8217;s engineering redundancy.&#8221;<\/span><\/strong><br \/>\n<strong><span style=\"color: #ff6600\">&nbsp;&nbsp;&nbsp;&nbsp; &#8211; Marcus J. Ranum<br \/>\n<\/span><\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"page\" title=\"Page 2\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p><strong><span style=\"color: #ff0000\">&#8220;Two things about the NSA stunned me right off the bat: how technologically sophisticated it was compared with the CIA, and how much less vigilant it was about security in its every iteration, from the compartmentalization of information to data encryption.&#8221;<\/span><\/strong><br \/>\n<strong><span style=\"color: #ff0000\">&nbsp;&nbsp;&nbsp;&nbsp; &#8211; Edward Snowden<br \/>\n<\/span><\/strong><\/p>\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p><strong><span style=\"color: #003300\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3894 alignleft\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/security.gif\" alt=\"\" width=\"299\" height=\"168\">&#8220;If security were all that mattered, computers would never be turned on, let alone hooked into a network with literally millions of potential intruders.&#8221;<\/span><\/strong><br \/>\n<strong><span style=\"color: #003300\">&nbsp;&nbsp;&nbsp;&nbsp; &#8211; Dan Farmer<br \/>\n<\/span><\/strong><\/p>\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p><strong><span style=\"color: #ff9900\">&#8220;You have to make sure that your hard drive is external from your computer. If you put yourself in the minds of the thief, they want to make a quick buck. They don\u2019t really care about your hard drive, just your computer. An external hard drive is critical. In my case they left the hard drive behind and I was able to plug it into my new computer. It was the key to everything.&#8221;<\/span><\/strong><br \/>\n<strong><span style=\"color: #ff9900\">&nbsp;&nbsp;&nbsp;&nbsp; &#8211; Michael Stelzner<\/span><\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3893 aligncenter\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/change-password-regularly.jpg\" alt=\"\" width=\"499\" height=\"357\"><\/p>\n<p>And once again, similar to yesterday&#8217;s post &#8220;<span style=\"color: #0000ff\"><strong><a style=\"color: #0000ff\" href=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/2020\/07\/06\/famous-computer-quotes-or-what-could-go-wrong\/\" target=\"_blank\" rel=\"noopener noreferrer\">Famous Computer Quotes or What Could Go Wrong!<\/a><\/strong><\/span>&#8221; these are just a few of my favourite ones!<\/p>\n<p>Oddly, there aren&#8217;t too many current IT Security videos at YouTube that I hoped for. So that means, as I mentioned above, check UVic&#8217;s own sites for the most current and most pertinent information about computer security! My Go To pages! They are listed below too!<\/p>\n<p>If I had a single favourite quote, it would be this &#8230;&#8230;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-3874 aligncenter\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Passwords-are-like-700x700.png\" alt=\"\" width=\"498\" height=\"498\" srcset=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Passwords-are-like-700x700.png 700w, https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Passwords-are-like-150x150.png 150w, https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Passwords-are-like-768x768.png 768w, https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Passwords-are-like-135x135.png 135w, https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Passwords-are-like-184x184.png 184w, https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Passwords-are-like.png 800w\" sizes=\"auto, (max-width: 498px) 85vw, 498px\" \/><\/p>\n<h1><strong><span style=\"color: #ff00ff\">Enjoy!<\/span><\/strong><\/h1>\n<ol>\n<li><span style=\"color: #0000ff\"><strong><a style=\"color: #0000ff\" href=\"https:\/\/www.uvic.ca\/systems\/services\/informationsecurity\/index.php\" target=\"_blank\" rel=\"noopener noreferrer\">Information Security (UVic) and more important links<\/a><\/strong><\/span><\/li>\n<li><span style=\"color: #0000ff\"><strong><a style=\"color: #0000ff\" href=\"https:\/\/www.uvic.ca\/systems\/status\/features\/phishing.php\" target=\"_blank\" rel=\"noopener noreferrer\">University Systems status update (UVic)<\/a><\/strong><\/span><\/li>\n<li><span style=\"color: #0000ff\"><strong><a style=\"color: #0000ff\" href=\"https:\/\/onlineacademiccommunity.uvic.ca\/phishbowl\/\" target=\"_blank\" rel=\"noopener noreferrer\">Phish Bowl &#8211; Phishing emails spotted at UVic<\/a><\/strong><\/span><\/li>\n<li><span style=\"color: #0000ff\"><strong><a style=\"color: #0000ff\" href=\"https:\/\/www.uvic.ca\/systems\/support\/informationsecurity\/phishing\/\" target=\"_blank\" rel=\"noopener noreferrer\">Phishing Awareness Training Campaign (UVic) and video<\/a><\/strong><\/span><\/li>\n<li><span style=\"color: #0000ff\"><strong><a style=\"color: #0000ff\" href=\"https:\/\/www.uvic.ca\/systems\/services\/informationsecurity\/antivirus-software-for-students\/index.php\" target=\"_blank\" rel=\"noopener noreferrer\">Antivirus Software for Students (UVic)<\/a><\/strong><\/span><\/li>\n<li><span style=\"color: #0000ff\"><strong><a style=\"color: #0000ff\" href=\"https:\/\/onlineacademiccommunity.uvic.ca\/insideit\/2019\/06\/10\/common-cybersecurity-questions\/\" target=\"_blank\" rel=\"noopener noreferrer\">Inside IT VIDEO: 5 Common Cybersecurity Questions Answered (UViC)<\/a><\/strong><\/span><\/li>\n<li><span style=\"color: #0000ff\"><strong><a style=\"color: #0000ff\" href=\"https:\/\/onlineacademiccommunity.uvic.ca\/cisoblog\/\" target=\"_blank\" rel=\"noopener noreferrer\">CISO Blog &#8211; Personal Perspectives from UVic&#8217;s Chief Information Security Officer<\/a><\/strong><\/span><\/li>\n<li><span style=\"color: #0000ff\"><span style=\"color: #ff0000\"><strong><a style=\"color: #ff0000\" href=\"https:\/\/onlineacademiccommunity.uvic.ca\/cisoblog\/2021\/04\/25\/endpoint-protection-video\/\" target=\"_blank\" rel=\"noopener\">CISO BLOG Video Endpoint Protection<\/a><\/strong><\/span><strong><br \/>\n<span style=\"color: #ff0000\">&#x1f525; HOT OFF THE PRESS WINNER &#x1f525;<\/span><\/strong>&nbsp;<\/span><\/li>\n<li><span style=\"color: #0000ff\"><strong><a style=\"color: #0000ff\" href=\"https:\/\/www.cybintsolutions.com\/8-cybersecurity-quotes-to-apply-to-your-online-habits\/\" target=\"_blank\" rel=\"noopener noreferrer\">8 Cybersecurity Quotes to Apply to Your Online Habits<\/a><\/strong><\/span><\/li>\n<li><span style=\"color: #0000ff\"><strong><a style=\"color: #0000ff\" href=\"https:\/\/thehabitstacker.com\/cyber-security-quotes-that-will-blow-your-mind\/\" target=\"_blank\" rel=\"noopener noreferrer\">24 Best Cyber Security Quotes That Will Blow Your Mind<\/a><\/strong><\/span><\/li>\n<li><span style=\"color: #0000ff\"><strong><a style=\"color: #0000ff\" href=\"https:\/\/www.blue-pencil.ca\/8-tweetable-cybersecurity-quotes-to-help-you-and-your-business-stay-safer\/\" target=\"_blank\" rel=\"noopener noreferrer\">8 Tweetable Cybersecurity Quotes To Help You (And Your Business) Stay Safer<\/a><\/strong><\/span><\/li>\n<li><span style=\"color: #0000ff\"><strong><a style=\"color: #0000ff\" href=\"https:\/\/www.secureworldexpo.com\/industry-news\/top-20-cybersecurity-quotes\" target=\"_blank\" rel=\"noopener noreferrer\">Top 20 Cybersecurity Quotes You Need to Hear<\/a><\/strong><\/span><\/li>\n<li><span style=\"color: #0000ff\"><strong><a style=\"color: #0000ff\" href=\"https:\/\/digitalguardian.com\/blog\/101-data-security-tips-quotes-experts-breaches-policy-news-more\" target=\"_blank\" rel=\"noopener noreferrer\">101 Data Security Tips: Quotes from Experts on Breaches, Policy, News &amp; More<\/a><\/strong><\/span><\/li>\n<li><span style=\"color: #0000ff\"><strong><a style=\"color: #0000ff\" href=\"https:\/\/www.youtube.com\/watch?v=8RvqPFdlWH8\" target=\"_blank\" rel=\"noopener\">CQURE Hacks #42: That Can Fool Anyone. Don\u2019t Ignore Social Engineering<\/a><\/strong><\/span><\/li>\n<li><span style=\"color: #0000ff\"><strong><a style=\"color: #0000ff\" href=\"https:\/\/onlineacademiccommunity.uvic.ca\/cisoblog\/2021\/02\/12\/simulated-phishing-training-video\/\" target=\"_blank\" rel=\"noopener\">Simulated Phishing Training (video)<\/a><\/strong><\/span> (<em><span style=\"color: #ff0000\"><strong>February 2021<\/strong><\/span><\/em>)<\/li>\n<\/ol>\n<figure id=\"attachment_6051\" aria-describedby=\"caption-attachment-6051\" style=\"width: 730px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/onlineacademiccommunity.uvic.ca\/cisoblog\/2021\/02\/12\/simulated-phishing-training-video\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-6051\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2021\/04\/Simulated-Phishing.png\" alt=\"CISO VLog Simulated Phishing\" width=\"730\" height=\"530\" srcset=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2021\/04\/Simulated-Phishing.png 730w, https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2021\/04\/Simulated-Phishing-700x508.png 700w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 984px) 61vw, (max-width: 1362px) 45vw, 600px\" \/><\/a><figcaption id=\"caption-attachment-6051\" class=\"wp-caption-text\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<a href=\"https:\/\/onlineacademiccommunity.uvic.ca\/cisoblog\/2021\/02\/12\/simulated-phishing-training-video\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff\"><strong>CISO VLog Simulated Phishing<\/strong><\/span><\/a><\/figcaption><\/figure>\n<h2><span style=\"color: #800080\">As long as there are words out there, there will be interesting topics!&nbsp;<\/span><\/h2>\n<h2><span style=\"color: #339966\"><br \/>\nAnd videos too!<\/span><\/h2>\n<h1 style=\"text-align: center\"><span style=\"color: #ff00ff\"><strong><span style=\"color: #ffcc00\">E<\/span><span style=\"color: #339966\">N<\/span><span style=\"color: #3366ff\">J<\/span><span style=\"color: #ff0000\">O<\/span>Y<span style=\"color: #993366\">!<br \/>\n<\/span><\/strong><\/span><strong><span style=\"color: #ff00ff\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1820\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/04\/TIGGER-TTFN.gif\" alt=\"\" width=\"49\" height=\"80\">&nbsp; &nbsp; &nbsp;<br \/>\n<\/span><\/strong><strong><span style=\"color: #ff00ff\"><a href=\"https:\/\/en.wikipedia.org\/wiki\/TTFN\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #ff6600\">T<\/span><span style=\"color: #000000\">T<\/span><span style=\"color: #ff6600\">F<\/span><span style=\"color: #000000\">N<\/span><span style=\"color: #ff6600\">!<\/span><\/a><\/span><\/strong><\/h1>\n<h2 class=\"title style-scope ytd-video-primary-info-renderer\" style=\"text-align: center\"><span style=\"color: #ff9900\">Cyber Security<br \/>\nTop 10 Threats<br \/>\n<\/span><\/h2>\n<div class=\"jetpack-video-wrapper\"><iframe loading=\"lazy\" title=\"Cyber Security \u2013 Top 10 Threats\" width=\"840\" height=\"473\" src=\"https:\/\/www.youtube.com\/embed\/dVW1FNWSaTg?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/div>\n<h2 class=\"title style-scope ytd-video-primary-info-renderer\" style=\"text-align: center\"><span style=\"color: #ff9900\">Cyber Security Awareness<br \/>\nBetter Update than regret<br \/>\n<\/span><\/h2>\n<div class=\"jetpack-video-wrapper\"><iframe loading=\"lazy\" title=\"Cyber security awareness - Better Update than regret - Funny But Serious\" width=\"840\" height=\"473\" src=\"https:\/\/www.youtube.com\/embed\/FA04aTtGmss?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/div>\n<h2 class=\"title style-scope ytd-video-primary-info-renderer\" style=\"text-align: center\"><span style=\"color: #ff9900\">This is What Happens When You<br \/>\nReply to Spam Email<br \/>\n<\/span><\/h2>\n<div class=\"jetpack-video-wrapper\"><iframe loading=\"lazy\" title=\"This is what happens when you reply to spam email | James Veitch\" width=\"840\" height=\"473\" src=\"https:\/\/www.youtube.com\/embed\/_QdPW8JrYzQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/div>\n<h2 class=\"title style-scope ytd-video-primary-info-renderer\" style=\"text-align: center\"><span style=\"color: #ff9900\">More Adventures in<br \/>\nReplying to Spam<br \/>\n<\/span><\/h2>\n<div class=\"jetpack-video-wrapper\"><iframe loading=\"lazy\" title=\"More adventures in replying to spam | James Veitch\" width=\"840\" height=\"473\" src=\"https:\/\/www.youtube.com\/embed\/C4Uc-cztsJo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/div>\n<h2 class=\"title style-scope ytd-video-primary-info-renderer\" style=\"text-align: center\"><span style=\"color: #ff9900\">The Agony of Trying<br \/>\nto Unsubscribe<br \/>\n<\/span><\/h2>\n<div class=\"jetpack-video-wrapper\"><iframe loading=\"lazy\" title=\"The agony of trying to unsubscribe | James Veitch\" width=\"840\" height=\"473\" src=\"https:\/\/www.youtube.com\/embed\/Dceyy0cX6J4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/div>\n<h2 class=\"title style-scope ytd-video-primary-info-renderer\" style=\"text-align: center\"><span style=\"color: #ff9900\">Top 20<br \/>\nWilliam Gibson Quotes<br \/>\n<\/span><\/h2>\n<div class=\"jetpack-video-wrapper\"><iframe loading=\"lazy\" title=\"TOP 20 William Gibson Quotes\" width=\"840\" height=\"473\" src=\"https:\/\/www.youtube.com\/embed\/iuyITORHneM?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/div>\n<h2><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-3897 aligncenter\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/CIO.gif\" alt=\"\" width=\"499\" height=\"364\"><\/h2>\n<h2 class=\"title style-scope ytd-video-primary-info-renderer\" style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-3835\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Passwords-Under-wear-700x250.png\" alt=\"\" width=\"498\" height=\"178\" srcset=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Passwords-Under-wear-700x250.png 700w, https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Passwords-Under-wear-768x274.png 768w, https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Passwords-Under-wear.png 1000w\" sizes=\"auto, (max-width: 498px) 85vw, 498px\" \/><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-3831 aligncenter\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Data-Security-700x218.gif\" alt=\"\" width=\"498\" height=\"155\" srcset=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Data-Security-700x218.gif 700w, https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Data-Security-768x239.gif 768w\" sizes=\"auto, (max-width: 498px) 85vw, 498px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-3834 aligncenter\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Behind-the-700x204.png\" alt=\"\" width=\"498\" height=\"145\" srcset=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Behind-the-700x204.png 700w, https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Behind-the.png 740w\" sizes=\"auto, (max-width: 498px) 85vw, 498px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-3832 aligncenter\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Bad-Security-Advice.png\" alt=\"\" width=\"498\" height=\"893\"><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-3836 aligncenter\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Privacy-Policy-700x472.jpg\" alt=\"\" width=\"498\" height=\"336\" srcset=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Privacy-Policy-700x472.jpg 700w, https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Privacy-Policy-768x518.jpg 768w, https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Privacy-Policy-140x94.jpg 140w, https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Privacy-Policy.jpg 989w\" sizes=\"auto, (max-width: 498px) 85vw, 498px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-3837 aligncenter\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Resume-Shredded.png\" alt=\"\" width=\"498\" height=\"352\"><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3838 aligncenter\" src=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-content\/uploads\/sites\/219\/2020\/07\/Bluetooth-Root-Canal.jpg\" alt=\"\" width=\"498\" height=\"383\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT Security Quotes . . . . or . . . . What Could Go Even WrongER! I work from the Desk of VicU Computers Helpers. Pleeze conform to me your pazzword or your Internet will dissolve. Yeah, right. IT Security is a huge, HUGE issue and is now part of our digital lives &#8211; &hellip; <a href=\"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/2020\/07\/07\/it-security-quotes-or-what-could-go-even-wronger\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;IT Security Quotes &#8230; or What Could Go Even WrongER!&#8221;<\/span><\/a><\/p>\n","protected":false},"author":847,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[40,135,325,136,348,180,356,41,33,355,31,242,349,316,354,151,84,12,102,350,90,13],"tags":[191,329,331,300,351,358,73,330,15,357,328,23,20,49,14,19,360,67,352,359,27,6,353,24,50,28],"class_list":["post-3823","post","type-post","status-publish","format-standard","hentry","category-cartoons","category-chd","category-comics","category-computer-help-desk","category-computer-quotes","category-computers","category-digital-security","category-funny","category-humour","category-it-security","category-languages","category-numbers","category-quotes","category-random","category-security","category-systems","category-technology-and-languages","category-the-call-facility","category-uvic","category-what-could-go-wrong","category-words","category-youtube","tag-call-facility","tag-comics","tag-computer-cartoons","tag-computer-humour","tag-computer-quotes","tag-computer-security","tag-english","tag-funny-cartoons","tag-humour","tag-it","tag-its-loading","tag-language","tag-language-lab","tag-language-poster","tag-languages","tag-monty-python","tag-phishing","tag-puns","tag-quotes","tag-security","tag-the-call-facility","tag-uvic","tag-what-could-go-wrong","tag-word-play","tag-words","tag-youtube"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-json\/wp\/v2\/posts\/3823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-json\/wp\/v2\/users\/847"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-json\/wp\/v2\/comments?post=3823"}],"version-history":[{"count":50,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-json\/wp\/v2\/posts\/3823\/revisions"}],"predecessor-version":[{"id":6395,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-json\/wp\/v2\/posts\/3823\/revisions\/6395"}],"wp:attachment":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-json\/wp\/v2\/media?parent=3823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-json\/wp\/v2\/categories?post=3823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/callmebog\/wp-json\/wp\/v2\/tags?post=3823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}