Skip to main content

Cybersecurity Story Details

Safety. Reassurance. Trust. Strength. Protection, peace.

Keepin' us safe from bad "phishermen".

I do, but other people don't.

I have major concerns that even though I do my best to practice cybersecurity, those around me do not, and that puts me at risk as well. It seems like hackers can grab information out of the air and use it to gain information from anyone on a home or business network.     ~Lynn D.

Protecting University property and personal information.

Always be cautious, pay close attention!

Essential for all; underestimated by many.

Risk management. Awareness Malware. Information security.

Safety. Security. Anonymity. Password. IT ServiceDesk.

Don't click on that email link!

My mom fell victim to a phishing attack, despite having been warned. After having to wipe her computer, change all passwords, put a credit freeze on her accounts... she won't do it again!     ~Csilla C.

Safety. Vigilance. Passwords. Firewall. Anti-spam. IT.

Privacy. Protection. Vigilance. Awareness. Safety. Community.

Protecting against bad people on campus.

~Salvador G-P.

Password. Verify. Backup. Safety. Secure. Check.

All apply to security.

It's computer/network protection against unauthorized users.

It defines what I believe cybersecurity is.

Safety. Russia. Election hacked. Hopeless. Fake.

~Sarah P.

Stay organized. Be vigilant. Be aware.

My data and privacy protected, safe.

~Alexandra B.

Awareness. Preparedness. Strength. Encryption. Health. Safety.

Cybersecurity is important because our lives are so electronic.     ~Andres L.

Identity theft and don't click spam.

to not get a virus

Important, Secure. Reliable. Aware. Dependent. done.

Anonymous. Hacker. Secure. Protected. Safe, Computer.

~Kacy M.

Passwords. Phishing. Hacking. Browser. Secure. Proactive.

~Britinee Y.

Protected at all times including now.

Security. Safety Phishing. Password. Service. Awareness.

Watch your back and be aware.

They say it all.     ~Tami F.

Passwords. Phishing. Hacking. Browser. Secure. Surfing.

Identity theft and don't click that.

Safety. Awareness. Professional. Data. Password. Efficiency.

Your security, my security, our security.

~Ron G.

Private. Mine. Unique. Different. Changing. Necessary.

Hacking. Protection. Passwords. Share. Health. Identity.

~Ana K-F.

Phish that I do not like.

SecUrity is incomplete without 'U'. Thanks.

THINK, before you click that link!

Emailing is the most effective way to launch spam & phishing attacks. Almost all of these have harmful links embedded in the message. A large portion of these links will be clicked without a thought.

Good technology solves layer 8 issues.

Humans are imperfect and they will eventually fail if perfection is what is required for them to be safe. Technology can act as a much needed buffer. I point to a product I use to work with (not cyber security related but life or death related). That was the Alaris (Now Carefusion) infusion pumps. The GuardRails software helped prevent nurses from making dosing errors with drugs. Without something like this, nurses had to get the dose right the 1st time every time or very bad things could happen. I take this same mental approach for security. What happens if I fail to lock my door at night, accidentally click on some dumb link, etc., etc., etc.... maybe I can set my doors to lock automatically at a certain hour, maybe I can have Cisco Umbrella running for dumb links.....maybe I don't have to be perfect to protect myself.

~Kenneth O.

Cybersecurity: too complicated for six words.

Security ≙ Technology as the Sieve ≙ Cooking

Prevent Big Brother from watching you.

Resilience. Safety. Protected. Privacy. Peace-of-mind. Freedom.

To me, being cybersecure means being resilient to potential hackers and invaders of my tech-housed information, to feel safe and protected when storing and sharing my information online, to ensure privacy where I expect it, to give me full freedom and peace-of-mind as I utilize and explore the cyberuniverse. ~Brianna L.


Overwhelming. Broad-stroke. Persevering. Research-blind. Baffling. Evolving.

Healthcare cybersecurity is a special case. Health Sciences research that does not involve human subjects should not be subject to the same constraints as patient care systems. But because IT has not been able to work out a way to separate us that allows us to remain somewhat connected, we continue to have problems. Example: one of my labs just got a new desktop computer. We called on SOM IT to set it up. PI concerns about being able to function correctly with our server that holds all our scientific data, and to upload software required for data analysis, meant we had to ask the technician to return the computer untouched. One of our PIs will set up the new computer in a way that will allow the lab to function as needed because after over a year of delays and excuses, our work request was effectively denied, and we continue to have to manage our own server that sits in our administrative office. Research is hobbled by paying for support from HS IT yet having to provide our own IT support from PIs who have full time science and administrative responsibilities.

When in doubt, send-to!

I won a recent contest for forwarding spam/abuse emails. Since then, I have sent so many emails to "" to the point where they probably roll their eyes when they receive one from me!
Better safe than sorry!! :).    ~Gail S.

Token training. Lackluster leadership. Average achievement.

~Matt W.

Protecting our information from bad people.

Integrity. Vigilance. Security. Caution. Respect. Honesty.

~Cristina B.

21st Century Cybersecurity is Your Life!

One has to be careful when using the internet. For som, breaching cybersecurity is their business. As a matter of fact, we may not be able to bring back our private lives once the damage is done. Think twice. Someone is always watching you!!

Protection for home business and community.

I'm able to apply the training I receive on campus to my home life as well. I share the security tips with my family and members of my community who don't have access to this level of guidance.

Be aware of your cloud data.

Once your data is on the cloud, it's there forever, so be cautious.

Protection. Dynamic. Dangerous. Everyone. Human firewall.

The interconnected world we live in offers many conveniences and improved performance/efficiency. It also opens up incredible opportunities for evildoers to take advantage of. Some of those possibilities are incredibly scary when you think of potential impacts to infrastructure of cities and countries. We all need to do our part to keep one another safe.     ~Bill H.


Only you can protect you. Educate.

All of our actions have consequences, whether they are good or bad. The best way to be secure is to make smart choices in the first place and smart choices are often made by being educated and aware of the circumstances.     ~Anju S.

Innovative minds improving fragile protection LikeA6WordLimitBuiltIntoAWebFormField.

While effectively surpassing a word limit in a web form is a minor example of effectively bypassing a rule built into a system, the overall lesson is clear: creative malicious users will work around protection systems given enough time and information about the system. Only through persevering innovation can we protect our critical data and systems.     ~Ryan N.

1234 is NOT a secure password.

My husband is a network cybersecurity engineer and he is always on his people about passwords. He tells them 1234 is NOT a secure password meaning that they have to think harder about what they are using.

Protection. Privacy. Threats. Defense. Awareness. Information.

The technology age we are living right now can control and lead our daily lives in our own home and at work. Protection is our best defense to provide security and to be aware and be informed and on top of everything that is happening in our environment.

Necessary, but both difficult and scary.

~Gina W.

Is that REALLY you, Apple Inc.?


Nothing I want to know about!

Protecting our University and community members.

As an alumna and long-time staff member, I feel a responsibility for stewardship of the University's resources so as the use of digital storage and communication continue to increase (not to mention ESR is connecting databases that didn't "talk" to each other before), I think more carefully about accessing data, the information that I share, and they ways in which that access and sharing take place - LAN, VPN, e-mail, chat, Zoom, as just a few examples. Any digital medium is capable of keeping a record of what I "upload" (whether I think of it as an upload or not), and of sending what it records to anyone or anyplace they choose. So electronic vigilance has become part of the way that I work.

My online information belongs to me.

~Mike M.

Don't Click On It, Report It!

~Justin M.

More important, now more than ever.

Long before identity theft was a catch phrase, I was the victim of my social security number being used for fraudulent activity. I was starting my life as a young adult and unable to get credit cards, purchase a car or even a house. The big three credit companies didn't believe me that someone else with a similar, but slightly different name was using my SSN. It took years and I'm not even sure I've ever completely recovered from it. In this day and age, with some many with the ability to hack into large data systems, it's imperative we watch for suspicious activity regarding our identity and credit...not just personally, but at work.


Mindful of our ever changing process.

When in doubt, hit delete button!

Today I received an email from someone at UCSD that I haven't worked with before and looked generic. Her email had an attachment asking me to review a past MarketPlace Purchase Order and to click on the attachment. I deleted her first email (she didn't come up in Blink) and then she emailed me again today. I called her said department and they wanted me to forward the email to them to look at it. I said, no, it may be spam! After reading her the email instead, it turned out it was a legitimate email! The person did not come up in Blink, because she was a graduate student. My PI used another department's approved Index and they wanted to verify receipt for a parking pass (that I picked up personally).     ~Susan M.

Protecting information now for better tomorrow.

We keep hearing about the constant hacking of personal info that somehow it becomes a non-event now unless we are personally affected. However, it is not a matter of if but when our information gets compromised. Why not try to do what we can to protect ourselves and others today to prevent future issues in the future. My father got hacked recently and didn't know how and struggled to get his name/credit cleared. It strains the system and causes unnecessary hassle not only for the victim but for the social services, such as getting a police report, to companies investigating the fraud. We as consumers and citizens end up paying for it as well.

The conservation of resources and services.

~Jennifer M.

Danger lurks BUT cyber security protects.

Working daily on the computer, we now live, play, work in a world where Danger lurks to invade our way of life. Yet Cyber Security is our Protection from a host of viruses, and calamities to trap you into items that seem so innocent. Cyber Security Stand to Protect even the innocent of web searching.     ~Jo-Ann H.

Lock screen, logout or shutdown computer.

Responsible. Cautious. Suspicious. Authentication. Authorization. Multifactor.

Protect your University, co-workers, and you.

Unfortunately, you see it on the news all the time that personal data is being exposed in data breaches. Everyone should be doing their part to protect the University, their fellow co-workers, and themselves.

Keep it secret. Keep it safe.

If we don't take cyber security seriously (keep it secret, keep it safe), the Dark Lord will wreck havoc on the world. 

Be mindful of everything you do.

We can put ourselves in danger in the cybersecurity realm when we act without thinking. This could include quickly opening a suspicious email or clicking on a link that we should not. Taking a few seconds to step back and be mindful about erring on the side of caution is always helpful in the fast-paced world we live in now. My rush to open a Facebook message that seemed odd led to my account getting hacked, so I've learned the hard way. We help everyone out when we take time to make wise decisions in our use of technology.

~Lyle M.


Think ahead, be proactive, keep informed.

It's best to think ahead and plan out what to do in case there's breaches in security. Be proactive. Keep accounts updated, and keep informed about what's new in cybersecurity.

Privacy. Comfort. Trust. Safety. Support. Independence.

Scary. Helpless. Safe. Unknown. Vulnerable. Security.

I'm always afraid using the internet because so much information is obtained and stored; afraid that someone can use it and steal my identity.     ~Enza Charles

Confidentiality, integrity, and availability of information. 


Phishing. Password1234. Nigeria. Russia. Cookies. Profit.

In my opinion, we confuse cyber security with many different other problems. There is domestic at-home cyber security and then there is large data sets and macro cyber security. I'm more concerned with the way tech and internet civilians expose themselves and their families on a daily basis, sometimes multiple times a day. By doing so they put so many of us at risk. The macro issue is a matter of profit, greed, and geopolitical cyber warfare, but that's institutional. We are asked to do so many things at home but companies and political actors are doing more damage and then selling you products as a prize for their failings.     ~Luis M.


Safety. Technology. Advancement. Defense. Protection. Information.

I picked these words because I have a friend who works in cyber security and learning about her work makes me appreciate all of the hard work that goes into keeping our systems secure. Thanks for all of your work!

Standardization. Policy. Risk. Organizational. Sensitive. Safeguard.

Cybersecurity is the standardization through policy of how an organization protects its sensitive information. Cybersecurity safeguards sensitive and personal information, so that the collective organization can operate within cyberspace while minimizing risk.

Where's my typewriter and my pencil?

~Chris J.

Prevention. Safe. Secure. Reliable. Integrity. Protection.

Prevention – because necessary precautions have to be made in order to be more proactive rather than reactive when a situation strikes.
Safe – because implementing cyber security protocols means a safer environment when you are online.
Secure – because we have to constantly be aware of new threats to our online experience in order to make everything more secure.
Reliable – because keeping up on the latest cyber security protocols means a more reliable defense against online threats.
Integrity – because keeping the integrity of our online safety means that we can feel more secure in our day to day business operations.
Protection – because we always need to be protected from outside threats.

~Sylvia V.

Knowledge. Alert. Monitor. Safeguard. Prevent. Secure.

"When you have the knowledge (or "know how") and you are alert to cyber threats, you can monitor and safeguard yourself, thus preventing and securing your institution from current and potential cyber threats."

Knowledge = information.
Alert = always aware of the potential threats.
Monitor = mindful of the when, where, & what you are doing.
Safeguard = aware of and actively pursuing safe protocols.
Prevent = do your due diligence now, means less likely to have problems later.
Secure = knowing you are doing all you can to protect yourself and your institution from any actual or potential cyber threats.

Cybersecurity: protecting privacy and the future.

Impregnability. Reassurance. Paramount. Champion. Decorum. Caretaker.

I am old enough to remember when the first Apple came out and there was just a glimmer of the idea of cybersecurity. Now days there is NO way to be without it and my words are a reflection of how grateful I am that it exists.     ~Patricia C.

Crucial. Necessary. Preventative. Safety. Protection. Tedious.

Cyber Security is important, and the University has done a great job of implementing the two-step authentication. The words listed above were chosen, because in my line of work- i rely on the safety and protection of the data. This is a crucial and necessary step in preventing any potential cyber security threats or concerns. Although, the two-step authentication can be tedious with having to complete the push notification process, it is a vital process in protecting our information.

Something smells phishy? Toss it out!

Staying a step ahead of criminals.

~Lars P.

Important. Challenging. Robots. Guarding. Information. Attacks.

Preventive protection against cyber hacker terrorists.

In these millennial world, technology has become substantial in our lives and every bit of personal information is exposed in the web. With that exposure we now have to protect ourselves from any invaders who can potentially hurt us.     ~Yadira G.

Not as secure as you think.

Secure. Safe. Identity. Trustworthy. Verified. Unique.

~Luciana X.


They get smarter we must adapt.

Working at UCSD has opened my eyes to all the ways confidential information can be hacked and hijacked. This is critical information for both work and home, and I appreciate the updates we receive about the latest techniques scammers use and what we can do to protect ourselves.

Safe? Think. Options. Postpone. Secure. Go.

~Rachel Syko

Cybersecurity is protecting against data breach.

Safety. Confidentiality. Personal. Scary. Constant. Necessary.

Two things came to mind when picking my 6 words - my work and a personal experience with a cyber attack. First, my work is sensitive in nature and my actions have a direct effect on not only the integrity of my own personal information, but that of students. I take cyber security seriously because it is important to me to protect the privacy of myself and others, and to be a good steward of University data. Personally, I once experienced an attack on my Instagram account that lasted days. An unknown entity repeatedly gained access to my account and attempted to remove my access to it. At least ten times I had to send Instagram a picture of myself with a security code to regain access. It left me feeling vulnerable and alone, as I didn't know when it would happen next or if it would stop. I felt like I was up against a team or a machine, with little resources or meaningful support. It made me reconsider my electronic fingerprint and I have since taken steps to review my privacy settings with each of my accounts. Even still, I always wonder when it will happen next, because it's not a matter of if. It's hugely influenced my appreciation of the University's efforts to educate students, staff and faculty about the importance of cyber security, as well as the steps they have been taking to fortify the safety of it's affiliates and data. Cyber security is a constantly changing field, and it's important for us to stay up to date on the trends and practices that are current.

Understand your online presence and vulnerabilities.

Understanding how you're digital presence is broadcast and how information you provide may be used against you is a core component of cyber security in my opinion.     ~Kyle P.


Beware, be cautious, and be smart.

I picked these words because I think cybersecurity is all about paying attention and being smart about what you do online, what you post, what you click on, etc.

Empty hook for the phishing trolls.

~David B.

Safe. convenience. Fast. Communication. Service. Easy.

Beware - They are watching us.

Apps and websites are accessing our info and watching what we do to create a more personalized experience. This means going through our search history and listening to our conversations to deliver targeted ads for us. So, we have to remain wary of our personal information and pay attention to what we want others to access.

Necessary. Easy. Safe. Duty. Protection. Confident.

~Cynthia D.

We create data. Does it die?

Like plastic, data needs to have a life cycle. If you forget about that upload, the data is still around to be stolen. The safest data is the one not saved -- or at least not in the cloud where the world can hack it.

Anonymity. Privacy. Protection. Freedom. Intelligence. Locked.

In the data cloud, Cybersecurity rules!

~Manisha K.

Someone is always watching me & you.

Big Brother is always watching us.

Protect against unauthorized access to data.

Whether in the home or the workplace, we all face risks of unprotected personal and business data because there are those who find reward from bringing harm and loss to others.

Trust. Accountability. Care. Caution. Privacy. Integrity.

Impregnable. Safeguard. Robust. Impenetrable. Shield. Preservation.

These words clearly define the importance of cyber security in today's world where even a slight breakage in the barrier of the security system can cause unimaginable damage.

Block the ones who are listening!

Nowadays companies are spying on your information constantly, e.g. through your browsing habits, your webcam, or your microphone, to use the data for their purposes. That has to stop.

The algorithmic panopticon is upon us.


Safe. Integrity. Phishing. Cookies. New Frontier. Future.

~Megan H.

Cybersecurity is as necessary as water.

Simply put, cybersecurity is needed to live in this world today.

Serious. Aware. Protect. Passwords. Devices. Responsibility.

Armor. Anti-breach. Non-exposed. Prepared. Spoof-blocker. Risk-elimination.

Cybersecurity at it's best safeguards our systems serving as our armor to keep our data non-exposed and blocking incoming threats.     ~Heidi C.

Trust no one. Trust email less.

E-mail is often the primary means of compromising your computer or personal security. Phishing and spear phishing can trick you into giving up personal information or your password, or lead you to click on links or attachments that will load malware on your computer or smart phone. Never trust that an email/message/call is legitimate, no matter who it's from or how official it looks or sounds, since it's easy to fake the "From" address and add other elements (logos, company info). For example, your boss requesting something out of the ordinary, a package notification attachment, or a bank or the University asking to verify your account are all examples of emails easily faked. If it seems out of the ordinary from what you've received before, better to contact the sender to verify authenticity, or contact the person/company through a known address/phone number/website.     ~Rob R.

Treat cybersecurity like home security — seriously.

Cyber crime is "faceless", and therefore many people have difficulty understanding how serious these attacks are/can be. The brain tricks us into believing that no current {present} threat ≠ no threat. While we aren't going to have to defend ourselves against a home intruder or someone stealing our mail, cyber crime is very real and has serious implications.

Privacy is an arbitrary human construct.

Insofar as one cannot make assertions about the objective reality of privacy, it falls to a human community to arrive at a generally agreed upon operational definition. Given the subjective nature of privacy, what it is and how it's preserved (or abused) will necessarily evolve as human beings define and redefine their relationships with information, technology, and one another.     ~David H.


Accountability. Care. Caution. Updates. Report. Counsel.

We're a community of data stewards.

The word community implies the need for personal responsibility which benefits the group. It also appeals to the natural human desire to belong to something greater than oneself. The word steward brings to mind the responsibility of the current generation to future generations, our beloved children.

Cybersecurity is my very own responsibility.

~Douglas S.

Being able to mitigate technological risk!

Do not mess with my bits.

~Claudio L.

Current cyber training is lost effort.

Keep up the good work, Cybertronians.

Cybertronians are fictional characters in the Transformers franchise; they are gigantic robots who are the protectors of planet Earth and are necessary to combat the evildoers known as Decepticons (whom are also robots). They are being compared to cybersecurity in my statement because both protect us from potential threats. Cybersecurity, in a nutshell, is meant to protect us from damage to overall computing systems. Cybertronians, as mentioned earlier, shields human beings from potential damage to Earth in the fictional universe surrounding Transformers.     ~Kashfe R.

Privacy. Passwords. Messaging. Email. Social media. Anonymous.

Safety. Privacy. Integrity. Confidence. Ownership. Solid foundation.

~Eberly B.

Collective awareness and systems protection agreement.

~Carol H.

Educate. Train. Prioritize. Fund. Evaluate. Proselytize.

~Luis A.

Safety. Protection. Honesty. Loyalty. Prevention. Valuable.

I have faced a number of cyber attacks in my personal life and it was not a fair circumstance. I am very careful and safe when it comes to using the internet. I value cyber security and what it stands for.

~Claudia P.


Security. Protection. Comfort. Relief. Assurance. Surety.

I chose those words because when I am sending emails or navigating the internet, I want to feel secured, protected and know that I can be comfortable conducting these activities.

No one using your credit card.

No identity stolen. Safe bank accounts.

Cooperation. Conviction. Safety. Community. Connectedness. Integrity.

~John C.

Safety. Trust. Efficient. Progress. Awareness. Information.

~Adana M.

Education. Knowledge. Prevention tactics. Awareness. Diligence. Priority.

~Sylvia T.

A cozy blanket and teddy bear.

Knowing that one is protected when online or using devices is like cuddling up with a cozy blanket and a teddy bear; you feel comfortable and protected.     ~Donna S.

Don't click on link if suspicious.

~Diana B.

Supportive. Evidence-based. Leading-edge. Required. Necessary. Standard-setting.

~Kristin W. D.

Information. Protection. Hackers. Data. Theft. Passwords.

~Matt W.

Cautious. Aware. Knowledge. Screening. Safe. Security.

~C. Stewart

Safety. Privacy. Intellect. Security. Ideas. Stop invaders.

Privacy. Safety. Protection. Accessibility. Authorization. Defense.

Cloud. Domain. Password. Firewall. Phishing. Spyware.

These words came to mind and they are used in various Cybersecurity Training.     ~Tina G.

Complicated. Disconcerting. Daunting. Alarming. Formidable. Unprepared.

Cyber Security is something I know the university tries to diminish, but it still feels like a lot goes through. Sometimes my Outlook refuses to block an e-mail address that contains phishing content because it is "within my organization" - how am I then supposed to carry on with my normal tasks while having to be extra, extra, vigilant when another e-mail comes through that can't be blocked? There also isn't a standard way to people to send out notices across the campuses from different departments. I even incorrectly reported an e-mail as suspicious because of the way someone created their notice. E-mails still make it through to me too, despite my best efforts to block e-mail addresses.     ~Lisa C.

Endless. Safe. Protection. Alarming. Tiring. Shocking.

Cybersecurity will always be an issue which means it will always need updated trainings and endless filtering which also makes it tiring. However, I understand the need to for it to keep me safe and protected. That understanding is what made me put down the word "Alarming." It's the fact that I need this protection in the first place that is so shocking and how many people out there want to harm me through my computer.     ~Sarah M.

It's us against the bad guys.

Worry less, relax, and smile more.

Better security always relieves stress.

Compromising security is not a compromise.

To keep a software/infrastructure project or task moving along, teams will often try to see how much they can get away with to get a release to customers on-time, or even earlier. This comes at the expense of ensuring the security of the application - they call it a "compromise". But is that really the case? Making accommodations now for a quick release, only creates problems not too far down the line.

Keep everything private and safe nonstop.

~Eileen S.

Trust but verify confidentiality, integrity, availability.

It's the Security Staples in a nut shell.


Don't send passwords in plain text.

~Jeff D. 

Safety. Privacy. Anonymity. Layered. Discipline. Necessary.

~Michael C.

Sharing. Copying. Redistributing. Mediums. Formats. Adapting.

~Edgar M.

Be aware. Be afraid. Question everything.

Securing the enterprise environment means vigilance.

~Veronika R.

Important. Complex. Integrated. Evolving. Layered. Focused.

Safety. Confidentiality. Espionage. Protection. Security. Privacy.

Community. Conservancy. Responsibility. Insurance. Thoughtfulness. Vigilance.

Count to six before you click.

I think that whether it is clicking on a link, accepting a phone call or hitting the "enter/return" the key to cyber-security is waiting until you are sure that what you are doing is safe, a good idea, or advisable. This certainly applies to Cyber-security yet also applies to other areas involving people and technology. ~Harrison W.


"The Cloud" is somebody else's computer.

Don't forget, anything you're storing 'in the cloud' is really being stored on a machine you don't control. Encrypt it, be mindful of your privacy, and choose your other people's computers carefully.

Great security keeps your life calm.

Too many people make poor security decisions and wind up with embarrassing, unpleasant, or expensive consequences, bringing chaos to an otherwise peaceful life. Whether it's a email/password reuse across the wrong two sites, a lost, unencrypted device which boots right up to your financial data, or a virus or malware taking your data hostage, it's easier than ever to find yourself a victim of cyber-problems. So, taking a few minutes to make yourself secure today could save you hours down the road.  ~Will S.


Secure. Safe. Alert. Identity. Peace. Protection.

SEC_RITY is not complete without U!

Watchdog. Protection. Defense. Offense. Integrity.

Protection. Security. Processes. Integrity. Offense. Defense.

~Tracy J.

There are no atheists in foxholes.

This is one of those aphorisms that exemplifies most people's attitude about cybersecurity: once digital hellfire is reigning down on you, you're a true believer in what you hope can save you.

~Paul A.

Peace of mind with security measures.

If you look at other areas in our life, we all want peace. WE should be aiming for peace in all aspects of our lives. Security is a big issue. Knowing we are practicing practical measures and what is asked of us makes sense. Some as simple as locking computer when stepping out of the office, and following all of the steps we learned in the online cybersecurity workshops will give us a Peace of Mind with Security.

A really important part of work.

We deal in a lot of personal information in fundraising and it's crucial our donors know that they can trust us with that information. We do that by keeping up on our cyber security practices.

Email. Login. HIPAA. Finances. Spam. Secure.

Password. Shield. Human. Think. Careful. Spam.

US3 a l!ne from a s0ng.

I have a hard time remembering all the different passwords I use in the course of a day, but know I need to use different ones for everything. I use lines from favorite songs and substitute some of the letters with other characters that make sense.

Responsibility. Protection. Intangible. Long-term. Safety. Important.

~Adrian P.

Secure Information. Personal Privacy. Confident Community.

Short, simple and encompasses the importance of cybersecurity across the entire UC San Diego community.     ~Autumn M.


Is this link valid and secure?

I thought it was funny that I was sent a link to this form by a coworker, and had to immediately ask myself if I thought the link would be safe. I checked the hyperlink before clicking and moving forward with my submission.

Secure. Alert. Firewall. Extort. Threat. Yield.

The first letters of the six words combined for the word


Safe. Private. Techniques. Integrity. Protection. Responsible.

Please do not click the links.

Proactively guarding important information and privacy.

It is easier to prevent a mess than it is to clean one up. It is our duty to take proactive measures to safeguard sensitive information and maintain the University's, Staff's Faculty's and most importantly our Student's privacy.

Cybersecurity equals hugs for organizational assets.

Cybersecurity needs to be a personal priority in order to be most effective, even when related to work. Creative expression and creativity are important to me so composing a reminder about the significance of cyber-safety as a poem, reminds me to take it seriously.     ~Michael G.


Mindful. Skeptical. Discerning. Bulwark. Cooperation. Lockbox.

Vigilant. Protection. Trusted. Updates. Notify. Daily.

Cyber security is our super hero!

In the day of Super Hero's from Marvel and DC Comics, our Cyber Security falls right in line with Saving Us from the possible infinity stones that could wipe out our computer. Who wants that?!  ~Jo-Ann Marie Hoye

You do not know who knows.

I chose those words because that is how I see cybersecurity. I do not know who may have access to my information and identity. At this point, many organizations and sites probably have my information. Now it is more of a matter of protecting myself to the best of my ability.     ~Abraham J. Cheung


Use strong diverse passwords for accounts!

If one password gets compromised, and you use the same password for multiple accounts, those other accounts are now in jeopardy. Use strong diverse passwords (long character count, mix of letters, numbers, and symbols) for each of your accounts. Use 2-factor authentication for your accounts when available, and consider using a VPN (virtual private network), especially when connecting to WiFi. Don't open suspicious attachments and be careful with emails from senders you don't know!

Trust. Honesty. Mindful. Respect. Grateful. Loyal.

I am grateful to be working for UC San Diego. Everyday loyal donors trust that we will respect their personal information, as I hope that someone will respect my personal information. We all work hard for ourselves and our families, let's be mindful of that. Thank you.

Always second guess before you click!

This is part of my routine when browsing the internet. Especially with a website I never visited before, or a site I often visit but looks different than before. Just by thinking twice, I have caught myself from clicking on some suspicious links.

Confidence knowing protected information isn't compromised.

Cybersecurity is essential in keeping hackers from trying to gain access into our computer systems. Knowing that there are ACL's, firewalls, ssh, https, and other means of security working for us, makes me feel more confident.     ~Micheline S.

Challenging. Ever-changing. Invisible. State-of-the-art. Crime-stopper. Defense.

~Luz M.

Phishing. Malware. Adware. Virus. Firewall. Fortinet.

I work in IT, I see these things happen all the time.

Don't trust anyone with my data!

Confidential. Safe. Aware. Mobile. Inconvenient. Locked-out.

Security doesn't ever get a vacation.

Cybersecurity is like a seat belt.

Security is free, use it generously.

K.I.S.S. mantra: Keep Information Security Simple

When in doubt, throw it out.

This refers to deleting spam and not clicking on attachments from unknown senders.

Using MFA saves me every day!

Privacy means privacy for all humans.

All human beings are entitled to privacy. Having a checking account robbed of money, being burglarized in my home, these are a couple things that emphasize the helpless of those victimized. I am committed to keeping privacy a part of my life and the lives I touch.


The best defense is common sense.

Never give security a day off.

Believe me, you need cybersecurity now!

Many people don't recognize the value of keeping their online devices safe until it's too late.

Join the conversation and share your story.