Anda di halaman 1dari 6

Security Awareness Slogans, Mottos, Tag lines, Catch Phrases, Maxims...

Control + Alt + Delete When You Leave Your Seat Before leaving the scene, clear your desk and your screen. Leave a clear desk while you're away and at the end of each day. Give your computer a rest when you're not at your desk. Don't get hooked by phishers. Phishing: If you suspect deceit, hit delete! There's no excuse for computer misuse. Prepare for Disaster: Recover Faster. SEC_RITY is not complete without U! Sec-UR-rity - You are at the center. Amateurs hack systems, professionals hack people. Bruce Schneier Think before you click. Protect personal information. The identity saved could be your own. Don't let your trash become someone else's treasure. Feed your shredder often. Passwords: Longer is Stronger. You wouldn't share your ATM pin, so why would you share your password? Passwords are like dirty socks. If left laying around, they'll create a stinky mess. The bug stops here. Use anti-malware programs to prevent virus infections. Security by Obscurity. Don't leave data or portable computing devices alone and in view. You can't unring a bell. Before you give PII* to anyone, make sure that access is allowed.
(* PII stands for Personally Identifiable Information)

We all value privacy. Report actual or suspected spills of PII... before they become floods. Because we care, we're security aware. Report data spills before molehills become mountains or small leaks become fountains.

Before sharing PII, know who, what, and why. Good security increases shareholder value. Don't be shy about protecting PII. Know how and when to say no. Don't share protected personal information with strangers. Don't be afraid to say no. To show our respect, we protect personal information that we collect. Protecting PII is everyone's job; PII is not everyone's business. Stop Neglect. Protect before you connect.

More Slogans

Do Your Part - Be Security Smart! Slogan provided by Cheri Huber, CHC, CHPC Napa County Privacy Officer Dont be Quick to Click be wary when you shop online. Slogan provided by Vic Duca Cora Restart is Smart! (When leaving your computer for the day, always choose restart. This allows your computer to receive updates from the IT department through the network.) A user who restarts is a user after my own heart! Valentine Restart slogans provided by Mirinda Feeler

Your CAC Card - Don't leave the office without it! CAC slogan provided by Herbert C. Wilson, Jr. Passwords are like toothbrushes. They are best when new and should never be shared. Analogy provided by Kara Kirschner-Brooks, CUDE; Learning & Development Specialist

When you and your system part away, Your system should be first off for the day. Slogan provided by Zeeshan Qamer

Your mind is a storage room of information, keep the door locked. Slogan provided by Irene Deichsel, FSO/Office Admin Manager, Cobham Analytic Solutions

Ones that Didn't Make the Cut



When passwords are heard, losses are incurred. Prevent security breaches by being careful with your speeches. Each of us must make a fuss if we're asked about something we must not discuss. Until we learn what breaches teach us, we'll be a target for data leeches. Prevent a security breach by keeping data out of reach. Loose clicks can cause security to be deep-sixed. Loose clicks invite hacker tricks. Data spills provide no thrills (unless you're the bad guy). Sec U R IT y - Tag! You're it! Taking a break? Don't be a flake. Log off before you leave. A worker once left her ID Unattended, where all could see. It disappeared that day. And were sorry to say So did the companys IP. (IP = intellectual property)

Things to Say to a Stranger in Your Work Area



Hi, Im John. Who are you? Can you show me where the restroom is? May I help you find something? Excuse me, did you drop this thumb drive? How did you get past the guards without your badge? Thats odd. Our organizations name is misspelled on your badge. Is that a real convict ankle bracelet?

Follow with a discussion of how to handle unknown visitors. Be sure to include that if an employee is uncomfortable with challenging a visitor, he or she should move to a safe location and call security or a supervisor.

Places Not to Hide Your Password



On a whiteboard in your office On the ceiling above your desk On a sticky note under a bookshelf Written in permanent marker on the light bulb of your desk lamp

Things Not to Put in an E-mail from Your Work Account



Ads for your home business Threats Anything written in anger, especially about your boss Bad grammar and spelling Pornography Copyrighted material that you are not allowed to share

Verify the identity of those who request information and you will be successful. Be alert for a new opportunity to challenge a stranger in your work area. Security begins with you. Before leaving your seat, log off with CTRL+ALT+DELETE. Share confidential information on a "Need-to-Know" basis. Loose clicks sink ships. Your efforts to protect personally identifying information will be worthwhile. Curiosity can kill a network. Prevent virus infection; don't open suspicious e-mails. You will achieve success by being suspicious of offers that look too good to be true. You are wise and diligent. You always wear your ID and escort your guests. Confucius say... Leave clear desk while away and at the end of each day.

Just click NO if a Web site or application offers to remember your password. Passwords, like bubblegum, if left laying around will create a sticky mess! Those who are wise do not discuss sensitive information in public. You will avoid financial disaster if you shred sensitive papers that you no longer need. Good fortune awaits those who wear ID badges above the waist, picture facing out.

Let us not look back in anger or forward in fear, but around in awareness. James Thurber

The user's going to pick dancing pigs over security every time. Bruce Schneier

If you reveal your secrets to the wind, you should not blame the wind for revealing them to the trees. Kahlil Gibran

There are no secrets better kept than the secrets that everybody guesses. George Bernard Shaw

Better be despised for too anxious apprehensions, than ruined by too confident security. Edmund Burke

The mantra of any good security engineer is: 'Security is a not a product, but a process.' It's more than designing strong cryptography into a system; it's designing the entire system such that all security measures, including cryptography, work together. Bruce Schneier

Politically Correct Virus: Doesn't refer to itself as a virus - instead, refers to itself as an "electronic microorganism." Mark Kaye

I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We've created life in our own image. Stephen Hawking

In view of all the deadly computer viruses that have been spreading lately, Weekend Update would like to remind you: when you link up to another computer, you're linking up to every computer that that computer has ever linked up to. Dennis Miller

Securing a computer system has traditionally been a battle of wits: the penetrator tries to find the holes, and the designer tries to close them. Gosser

A computer lets you make more mistakes faster than any invention in human history - with the possible exceptions of handguns and tequila. Mitch Ratliff

It is much more secure to be feared than to be loved. Niccolo Machiavelli

"You shouldn't overestimate the I.Q. of crooks." NYT: Stuart A. Baker, General Counsel for the NSA, explained why crooks and terrorists who are smart enough to use data encryption would be stupid enough to choose the U.S. Government's compromised data encryption standard.

Anda mungkin juga menyukai