Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Dr. Seuss Does Security Too.

Would you, could you, protect my data?

Protect it now, protect it then, please protect it everywhen.

Protect my health and banking stuff,

though it can be, will be rough.

Would you, could you, protect my data?

Protect it now, protect it then, please protect it everywhen.

Protect my health and banking stuff,

though it can be, will be rough.

IT Security PoemPolicy is done, it’s in the can,

I am ready, audit man.

Use a firewall and antivirus,

Listen to experts who says “hire us”.

Set your policy, make your plan,

Advertisement. Scroll to continue reading.

Before it all just hits the fan.


Would you, could you protect my data?

Protect it here, protect it there, please protect it everywhere.

Do not forget continuity

Or we are lost in perpetuity.

Put our fears all in a thimble,

’cause security it must be nimble.

Protect my private information,

Protect it here and o’er the nation.

I just might join a security alliance,

If it helps in my compliance.


Would you, could you, protect my data?

Protect it good, protect it tight, protect in the dead of night

I’ve done all my security planning,

Firewalls on and websites banning.

Users trained in data protection,

Keep all my systems safe from infection.

Make me both secure and compliant,

On my security team I am reliant.

Cool Data found and segregated,

Systems hardened and isolated.


Would you, could you protect my data?

Protect it well, protect it good, please protect it in da hood.

It really is not much a reach,

To say I worry about a breach.

Every day I do my database backup,

But the threats they continue to stack up.

Make my data safe with encryption,

And my users have a conniption.

And when you leave, I worry more,

What all just walked right out my door?


Would you, could you, protect my data?

Protect it olde, protect it gnu, protect my data true.

I want so much to make this easy,

Security must not, can not be sleazy.

After all of this, I worry about most,

That some techno-teen of me will boast.

Before I get a permanent vacation,

I must have in place true revocation.

If only I could see like echolocation

Security, it is my lifelong vocation.


I would, if I could, yes, protect your data.

Protect it then, protect it now, protect that data all somehow.

Protect the media, wherever it sits,

Though I know it will give you fits.

Protect the apps and database,

And keep security up in your face.

Follow the standards, follow the law,

I know it will keep you just in awe.

The hardest part is not being a jerk,

And making everything all just work.

The bad part is, no matter what I do,

In the end, it’s up to you.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem