Top 10 IT Security Quotes

There are many IT security quotes around the internet and these are the ten of my favorites that keep me informed from time to time on the definition of IT security.


“I think computer viruses should count as life.  I think it says something about human nature that the only form of life we have created so far is purely destructive.  We’ve created life in our own image.”

– Stephen Hawking


The true computer hackers follow a certain set of ethics that forbids them to profit or cause harm from their activities.

— Kevin Mitnick


“Being able to break security doesn’t make you a hacker anymore than being able to hotwire cars makes you an automotive engineer.”

– Eric Raymond


“Companies spend millions of dollars on firewalls, encryption and secure access devices, and it’s money wasted, because none of these measures address the weakest link in the security chain.”

– Kevin Mitnick


“If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology.”

– Bruce Schneier


“Hoaxes use weaknesses in human behavior to ensure they are replicated and distributed.  In other words, hoaxes prey on the Human Operating System.”

– Stewart Kirkpatrick


“The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.”

– Gene Spafford


“Any type of operating system that I wanted to be able to hack, I basically compromised the source code, copied it over to the university because I didn’t have enough space on my 200 megabyte hard drive.”

— Kevin Mitnick


“Passwords are like underwear: you don’t let people see it, you should change it very often, and you shouldn’t share it with strangers.”

– Chris Pirillo


“If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked.

— Richard Clarke

Build Your Own Security
Subscribe to my newsletter and get a copy of my eBook for free.
We hate spam just as much as you

Related posts:

  1. Top 10 Web Application Vulnerabilities and Security Risks 2010
  2. Top 8 Ways to a Secured Database Security for Any Web Application
  3. Top 10 Reason to Buy BitDefender Total Security 2011 Now
About Alan Tay

This blog is owned and operated by myMediaInc. My Media operates content based online portals for IT professionals, technology managers and decision makers as well as business leaders. We publish original quality content focused in Software Development, IT Security, SaaS, Cloud Computing, Outsourcing, Project Management and Mobile and Wireless. Our mission is to explore how to help you optimize your resources in each of these areas.

Find us here IT Security Column.


  1. Altaf says:

    WOW nice Quotes I love it
    Altaf recently posted..Love QuotesMy Profile

  2. Lee says:

    Hi I like7 basically I presume it is saying that if it is connected to something and switched on then it can be hacked. I am sure this is true . Let’s be honest there is always some one to make a fire wall and there will always be some one who will crack it.

    Thanks lee

Speak Your Mind


CommentLuv badge

This blog uses premium CommentLuv which allows you to put your keywords with your name if you have had 3 approved comments. Use your real name and then @ your keywords (maximum of 3)