Control + Alt + Delete When You Leave Your Seat Before leaving the scene, clear your desk and your screen. Leave a clear desk while you're away and at the end of each day. Give your computer a rest when you're not at your desk. Don't get hooked by phishers. Phishing: If you suspect deceit, hit delete! There's no excuse for computer misuse. Prepare for Disaster: Recover Faster. SEC_RITY is not complete without U! Sec-UR-rity - You are at the center. Amateurs hack systems, professionals hack people. Bruce Schneier Think before you click. Protect personal information. The identity saved could be your own. Don't let your trash become someone else's treasure. Feed your shredder often. Passwords: Longer is Stronger. You wouldn't share your ATM pin, so why would you share your password? Passwords are like dirty socks. If left laying around, they'll create a stinky mess. The bug stops here. Use anti-malware programs to prevent virus infections. Security by Obscurity. Don't leave data or portable computing devices alone and in view. You can't unring a bell. Before you give PII* to anyone, make sure that access is allowed.
(* PII stands for Personally Identifiable Information)
We all value privacy. Report actual or suspected spills of PII... before they become floods. Because we care, we're security aware. Report data spills before molehills become mountains or small leaks become fountains.
Before sharing PII, know who, what, and why. Good security increases shareholder value. Don't be shy about protecting PII. Know how and when to say no. Don't share protected personal information with strangers. Don't be afraid to say no. To show our respect, we protect personal information that we collect. Protecting PII is everyone's job; PII is not everyone's business. Stop Neglect. Protect before you connect.
More Slogans
Do Your Part - Be Security Smart! Slogan provided by Cheri Huber, CHC, CHPC Napa County Privacy Officer Dont be Quick to Click be wary when you shop online. Slogan provided by Vic Duca Cora Restart is Smart! (When leaving your computer for the day, always choose restart. This allows your computer to receive updates from the IT department through the network.) A user who restarts is a user after my own heart! Valentine Restart slogans provided by Mirinda Feeler
Your CAC Card - Don't leave the office without it! CAC slogan provided by Herbert C. Wilson, Jr. Passwords are like toothbrushes. They are best when new and should never be shared. Analogy provided by Kara Kirschner-Brooks, CUDE; Learning & Development Specialist
When you and your system part away, Your system should be first off for the day. Slogan provided by Zeeshan Qamer
Your mind is a storage room of information, keep the door locked. Slogan provided by Irene Deichsel, FSO/Office Admin Manager, Cobham Analytic Solutions
Follow with a discussion of how to handle unknown visitors. Be sure to include that if an employee is uncomfortable with challenging a visitor, he or she should move to a safe location and call security or a supervisor.
Verify the identity of those who request information and you will be successful. Be alert for a new opportunity to challenge a stranger in your work area. Security begins with you. Before leaving your seat, log off with CTRL+ALT+DELETE. Share confidential information on a "Need-to-Know" basis. Loose clicks sink ships. Your efforts to protect personally identifying information will be worthwhile. Curiosity can kill a network. Prevent virus infection; don't open suspicious e-mails. You will achieve success by being suspicious of offers that look too good to be true. You are wise and diligent. You always wear your ID and escort your guests. Confucius say... Leave clear desk while away and at the end of each day.
Just click NO if a Web site or application offers to remember your password. Passwords, like bubblegum, if left laying around will create a sticky mess! Those who are wise do not discuss sensitive information in public. You will avoid financial disaster if you shred sensitive papers that you no longer need. Good fortune awaits those who wear ID badges above the waist, picture facing out.
Let us not look back in anger or forward in fear, but around in awareness. James Thurber
The user's going to pick dancing pigs over security every time. Bruce Schneier
If you reveal your secrets to the wind, you should not blame the wind for revealing them to the trees. Kahlil Gibran
There are no secrets better kept than the secrets that everybody guesses. George Bernard Shaw
Better be despised for too anxious apprehensions, than ruined by too confident security. Edmund Burke
The mantra of any good security engineer is: 'Security is a not a product, but a process.' It's more than designing strong cryptography into a system; it's designing the entire system such that all security measures, including cryptography, work together. Bruce Schneier
Politically Correct Virus: Doesn't refer to itself as a virus - instead, refers to itself as an "electronic microorganism." Mark Kaye
I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We've created life in our own image. Stephen Hawking
In view of all the deadly computer viruses that have been spreading lately, Weekend Update would like to remind you: when you link up to another computer, you're linking up to every computer that that computer has ever linked up to. Dennis Miller
Securing a computer system has traditionally been a battle of wits: the penetrator tries to find the holes, and the designer tries to close them. Gosser
A computer lets you make more mistakes faster than any invention in human history - with the possible exceptions of handguns and tequila. Mitch Ratliff
"You shouldn't overestimate the I.Q. of crooks." NYT: Stuart A. Baker, General Counsel for the NSA, explained why crooks and terrorists who are smart enough to use data encryption would be stupid enough to choose the U.S. Government's compromised data encryption standard.