Quote preview background for Kevin Mitnick
The methods that will most effectively minimize the ability of intruders to compromise information security are comprehensive user training and education. Enacting policies and procedures simply won't suffice. Even with oversight the policies and procedures may not be effective: my access to Motorola, Nokia, ATT, Sun depended upon the willingness of people to bypass policies and procedures that were in place for years before I compromised them successfully
Kevin Mitnick
Turn into a Quote Card

Quote Detail

The methods that will most effectively minimize the ability of intruders to compromise information security are comprehensive user training and education. Enacting policies and procedures simply won't suffice. Even with oversight the policies and procedures may not be effective: my access to Motorola, Nokia, ATT, Sun depended upon the willingness of people to bypass policies and procedures that were in place for years before I compromised them successfully

Quick Answer

What this quote page tells you

This canonical quote page keeps the full saying, the attributed author, any linked work, and the topic tags together so the quote can be cited from one stable URL.

Related Quotes

More quote cards from the same area

"

To paraphrase Hannah Arendt__s portrayed in the recently released movie of the same name__he Nazi war criminal__ actions stemmed from her well-known phrase __anality of evil,_ not as a result of mental illness but as a result of a lack of thinking. Their greatest error was delegating the process of thinking and decision-making to their higher ups. In Rudolf Höss__ case, this would have been his superiors, particularly Heinrich Himmler. To many this conclusion is troubling, for it suggests that if everyday, __ormal,_ sane men and women are capable of evil, then the atrocities perpetrated during the Holocaust and other genocides could be repeated today and into the future.Yet, this is exactly the lesson we must learn from the war criminals at Nuremberg. We must be ever wary of those who do not take responsibility for their actions. And we ourselves must be extra vigilant, particularly in this day of accelerated technological power, heightened state surveillance, and global corporate reach, that we do not delegate our thinking to others.