American - Businessman | August 6, 1963 -
Choosing a hard-to-guess, but easy-to-remember password is important!
Kevin Mitnick
ImportantChoosing
No company that I ever hacked into reported any damages, which they were required to do for significant losses.
CompanyLossesSignificantEverWere
My hacking was all about becoming the best at circumventing security. So when I was a fugitive, I worked systems administrator jobs to make money. I wasn't stealing money or using other people's credit cards. I was doing a 9-to-5 job.
BestMoneyJobPeopleDoingCredit
I was an accomplished computer trespasser. I don't consider myself a thief. I copied without permission.
MyselfThiefWithoutAccomplished
Businesses should absolutely set aside funding in their budgets for security consultants. Unless there is an expert on staff, and there usually is not, it needs to be outsourced.
SecurityExpertAbsolutelySetNeeds
Most people assume that once security software is installed, they're protected. This isn't the case. It's critical that companies be proactive in thinking about security on a long-term basis.
PeopleThinkingSecurityProactive
To have transactions made on your web site via credit card, you must be PCI compliant. Businesses make the mistake of thinking that because you passed the requirements and are PCI certified, you are immune to attacks.
MistakeThinkingCreditYouWeb
Most of the computer compromises that we hear about use a technique called spear phishing, which allows an attacker access to a key person's workstation. It's extremely difficult to defend against.
KeyPersonDifficultDefendAgainst
I don't know the capabilities of our enemies. But I found it quite easy to circumvent security at certain phone companies throughout the United States. So if an inquisitive kid can do it, why can't a cyberterrorist do it?
EasyPhoneSecurityKnowWhyKid
A log-in simulator is a program to trick some unknowing user into providing their user name and password.
NameUserSomeTrickProviding
I started with CB radio, ham radio, and eventually went into computers. And I was just fascinated with it. And back then, when I was in school, computer hacking was encouraged. It was an encouraged activity. In fact, I remember one of the projects my teacher gave me was writing a log-in simulator.
TeacherSchoolMeWritingComputers
When I read about myself in the media, even I don't recognize me. The myth of Kevin Mitnick is much more interesting than the reality of Kevin Mitnick. If they told the reality, no one would care.
MyselfMeCareRealityInteresting
Copyright © 2024 QuotesDict Kevin Mitnick quotes