SlideShare une entreprise Scribd logo
1  sur  3
 Make sure your password is at least
8 characters long and includes a
mix of capital letters, numbers and
symbols .
 Example, you could intentionally
misspell a word - MapelLeafs81 or
trade certain letters for numbers of
symbols - M@pleLeaf$81.
 You could even use the first letters
of a phrase - “I love the Toronto
Maple Leafs, go number 81” would
become “iltTMLgn81”.
Tip #1 for password security
Use a (seemingly) complicated password
Tip # 2 for password security
 Don’t use names of spouses, children or pets.
 Don’t use phone numbers or birth dates. Don’t
use the same word as your login (often your
name or email).
 Don’t use consecutive, duplicate numbers or any
other simple keyboard pattern. “Password” –
it is consistently one of the most common
passwords used and therefore, one of the
easiest to crack.
Know what makes a bad password or what NOT to do
Tip # 3 for password security
Change your passwords regularly.
Change your password every 90
days…that is only four times a year.

Contenu connexe

En vedette

Fabula estructura organizacional
Fabula estructura organizacionalFabula estructura organizacional
Fabula estructura organizacionalCarlos Salgado
 
Tips para el éxito.
Tips para el éxito.Tips para el éxito.
Tips para el éxito.Yune Miranda
 
Dimensiones de la didactica
Dimensiones de la didacticaDimensiones de la didactica
Dimensiones de la didacticafelipecoello
 
Contenido del curso
Contenido del cursoContenido del curso
Contenido del cursoTODOBIEN1997
 
Commentary on the creed of at tahawi-part 1
Commentary on the creed of at tahawi-part 1Commentary on the creed of at tahawi-part 1
Commentary on the creed of at tahawi-part 1True Religion
 
Enfermedades periodontales computacion 8vo
Enfermedades periodontales computacion 8voEnfermedades periodontales computacion 8vo
Enfermedades periodontales computacion 8voluciana02salud
 
Tarea 7 Metodos Lógicos y Pedagógicos
Tarea 7 Metodos Lógicos y PedagógicosTarea 7 Metodos Lógicos y Pedagógicos
Tarea 7 Metodos Lógicos y PedagógicosMATALOTE5855
 
Dimenciones de la Didáctica
Dimenciones de la DidácticaDimenciones de la Didáctica
Dimenciones de la DidácticaTODOBIEN1997
 
Wise Decision Making
Wise Decision MakingWise Decision Making
Wise Decision MakingStanley Tan
 
You Can Be Great Finisher Through Christ
You Can Be Great Finisher Through ChristYou Can Be Great Finisher Through Christ
You Can Be Great Finisher Through ChristStanley Tan
 
Maternal Helath in Nepal_Mukesh Mishra
Maternal Helath in Nepal_Mukesh MishraMaternal Helath in Nepal_Mukesh Mishra
Maternal Helath in Nepal_Mukesh MishraMukesh Mishra
 
Tiger population genetics
Tiger population geneticsTiger population genetics
Tiger population geneticsPhilippe Henry
 

En vedette (17)

Fabula estructura organizacional
Fabula estructura organizacionalFabula estructura organizacional
Fabula estructura organizacional
 
Actividad de Aprendizaje 8
Actividad de Aprendizaje 8Actividad de Aprendizaje 8
Actividad de Aprendizaje 8
 
Propuesta digital v2
Propuesta digital v2Propuesta digital v2
Propuesta digital v2
 
My pc build
My pc buildMy pc build
My pc build
 
Sage's Resume
Sage's ResumeSage's Resume
Sage's Resume
 
Tips para el éxito.
Tips para el éxito.Tips para el éxito.
Tips para el éxito.
 
Dimensiones de la didactica
Dimensiones de la didacticaDimensiones de la didactica
Dimensiones de la didactica
 
Contenido del curso
Contenido del cursoContenido del curso
Contenido del curso
 
Commentary on the creed of at tahawi-part 1
Commentary on the creed of at tahawi-part 1Commentary on the creed of at tahawi-part 1
Commentary on the creed of at tahawi-part 1
 
Enfermedades periodontales computacion 8vo
Enfermedades periodontales computacion 8voEnfermedades periodontales computacion 8vo
Enfermedades periodontales computacion 8vo
 
Tarea 7 Metodos Lógicos y Pedagógicos
Tarea 7 Metodos Lógicos y PedagógicosTarea 7 Metodos Lógicos y Pedagógicos
Tarea 7 Metodos Lógicos y Pedagógicos
 
Dimenciones de la Didáctica
Dimenciones de la DidácticaDimenciones de la Didáctica
Dimenciones de la Didáctica
 
Wise Decision Making
Wise Decision MakingWise Decision Making
Wise Decision Making
 
Tesis marco teórico
Tesis  marco teórico Tesis  marco teórico
Tesis marco teórico
 
You Can Be Great Finisher Through Christ
You Can Be Great Finisher Through ChristYou Can Be Great Finisher Through Christ
You Can Be Great Finisher Through Christ
 
Maternal Helath in Nepal_Mukesh Mishra
Maternal Helath in Nepal_Mukesh MishraMaternal Helath in Nepal_Mukesh Mishra
Maternal Helath in Nepal_Mukesh Mishra
 
Tiger population genetics
Tiger population geneticsTiger population genetics
Tiger population genetics
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Dernier (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

BI&I's top 3 tips for password security.

  • 1.  Make sure your password is at least 8 characters long and includes a mix of capital letters, numbers and symbols .  Example, you could intentionally misspell a word - MapelLeafs81 or trade certain letters for numbers of symbols - M@pleLeaf$81.  You could even use the first letters of a phrase - “I love the Toronto Maple Leafs, go number 81” would become “iltTMLgn81”. Tip #1 for password security Use a (seemingly) complicated password
  • 2. Tip # 2 for password security  Don’t use names of spouses, children or pets.  Don’t use phone numbers or birth dates. Don’t use the same word as your login (often your name or email).  Don’t use consecutive, duplicate numbers or any other simple keyboard pattern. “Password” – it is consistently one of the most common passwords used and therefore, one of the easiest to crack. Know what makes a bad password or what NOT to do
  • 3. Tip # 3 for password security Change your passwords regularly. Change your password every 90 days…that is only four times a year.