SlideShare une entreprise Scribd logo
1  sur  13
10 Ways to Create a Really
Good Password
Is any password really secure?
• The answer is two-fold:
– If you’re using a plain dictionary word or words
related directly to your or your interests, then no
– If you’re using a diverse set of passwords between
different accounts and making each unique, then
yes
Your Passwords May be Insecure
• Many people don’t think twice about the
security of their passwords
• Most want an easy-to-remember password
because they will be visiting frequently and
are more concerned about getting started
than setting up
Password Tip #1 - Diversity
• Instead of trying to make very complex
passwords, try to make sure that no more than a
few users have the same passwords for each
account
• Ensure everyone’s company passwords are
diverse amongst each other - this detracts
against an attack on multiple accounts at once
• This has same effect on security as complex
passwords, but makes it easier on each user
Password Tip #2 – Account Lock Out
• Disable account access
when an invalid
password is entered
into the system more
than a few times
– Detracts against a hacker
– If it is an employee who
forgot their password,
you can manually reset
them
Password Tip #3 – Beware of the
Browser
• Beware of browsers like Firefox that automatically
store your passwords
• You can go into your internet provider’s settings
on your computer and deselect password auto-
saving
• This CNET TV video demonstrates how you can
hide passwords in Firefox by creating a master
password for the browser
Password #4 – Determine Password
Strength
• Depending on the site,
you can choose
different types of
passwords
– If setting up a password
for online banking with
sensitive data, create
complex password
– If creating a password
for a one-time online
game, it can be more
simple
Password Tip #5 – Different Passwords
for Different Sites
• If you have the same password for Twitter,
Facebook, Gmail, Flickr, YouTube, etc., and a
hacker gets onto one of them, they all could be
compromised
– This is one of the main ways hackers get in
– They try the password for one site and then all the
rest
• Diversify your passwords among sites as much as
possible
Password Tip #6 – Password Manger
Tool
• If tip #5 overwhelms you, use a password
manager tool such as KeePass to store all
passwords in a centralized place with one master
password
• KeePass (and there are many others) stores all
passwords for you and makes it easy to copy
them right into a login form
• The master password must be very complex and
never shared to make this effective
Password Tip #7 – Paper Passwords
• If you are more of a
paper and pen person
and don’t want to save
your passwords on your
computer, make sure
you:
– Hide the paper from
plain sight
– Never put the name of
the website associated
with the password on
the same sheet of paper
Password #9 – Complex Passwords
• As stated earlier, complex passwords are best if
managed well, but how do you create a complex
password?
– Don’t use dictionary words
– Use uppercase and lowercase letters within the word
– Include numbers in the password
• The more creative you can get while still making
it memorable, the better
Password Tip #9 – Analyze Accounts
• If you notice suspicious
activity on any of your sites,
change the password
immediately
– It may be hacked into or
tampered
• The more cautious and
proactive you can be, the
better
Strong Passwords + Backups =
Harmony
• Just as important as strong passwords is a
redundant backup
• Backups eliminate ultimate data loss
• If a password ever fails and you get hacked or
lose data, a backup will ensure you always
have control of your online life
• Take back control with a free or premium
Backupify social media backup account

Contenu connexe

En vedette

Glug Presents: Done is better than said.
Glug Presents: Done is better than said.Glug Presents: Done is better than said.
Glug Presents: Done is better than said.Dave Nash
 
Small group presentation
Small group presentationSmall group presentation
Small group presentationVOX Church
 
Software-defined white-space cognitive systems: implementation of the spectru...
Software-defined white-space cognitive systems: implementation of the spectru...Software-defined white-space cognitive systems: implementation of the spectru...
Software-defined white-space cognitive systems: implementation of the spectru...CSP Scarl
 
Barkloudly pitch-shelters and rescues slideshare
Barkloudly pitch-shelters and rescues slideshareBarkloudly pitch-shelters and rescues slideshare
Barkloudly pitch-shelters and rescues slideshareAnupam Kundu
 
Csp@scuola uav corso1_lez3
Csp@scuola uav corso1_lez3Csp@scuola uav corso1_lez3
Csp@scuola uav corso1_lez3CSP Scarl
 
Independent Presentation Final Sb (2)
Independent Presentation Final Sb (2)Independent Presentation Final Sb (2)
Independent Presentation Final Sb (2)Independent Ltd
 
Wilfer practica 1 y 2
Wilfer practica 1 y 2Wilfer practica 1 y 2
Wilfer practica 1 y 2gueste63a2cf
 
Agility at Vietnamworks
Agility at VietnamworksAgility at Vietnamworks
Agility at VietnamworksChris Shayan
 
Digital agency founders talk
Digital agency founders talkDigital agency founders talk
Digital agency founders talkCyber-Duck
 
Living Labs ovvero il possibile contributo delle ICT ai Presidi Territoriali ...
Living Labs ovvero il possibile contributo delle ICT ai Presidi Territoriali ...Living Labs ovvero il possibile contributo delle ICT ai Presidi Territoriali ...
Living Labs ovvero il possibile contributo delle ICT ai Presidi Territoriali ...CSP Scarl
 
Presentazione csp luglio2011 [sola lettura]
Presentazione csp luglio2011 [sola lettura]Presentazione csp luglio2011 [sola lettura]
Presentazione csp luglio2011 [sola lettura]CSP Scarl
 
Production & operation mgt
Production & operation mgtProduction & operation mgt
Production & operation mgtkitturashmikittu
 
SWUG - June 2010 - AD LDS by Andrew Cheng
SWUG - June 2010 - AD LDS by Andrew ChengSWUG - June 2010 - AD LDS by Andrew Cheng
SWUG - June 2010 - AD LDS by Andrew ChengDennis Chung
 

En vedette (19)

Glug Presents: Done is better than said.
Glug Presents: Done is better than said.Glug Presents: Done is better than said.
Glug Presents: Done is better than said.
 
Small group presentation
Small group presentationSmall group presentation
Small group presentation
 
Software-defined white-space cognitive systems: implementation of the spectru...
Software-defined white-space cognitive systems: implementation of the spectru...Software-defined white-space cognitive systems: implementation of the spectru...
Software-defined white-space cognitive systems: implementation of the spectru...
 
Rajeev_CV
Rajeev_CVRajeev_CV
Rajeev_CV
 
Barkloudly pitch-shelters and rescues slideshare
Barkloudly pitch-shelters and rescues slideshareBarkloudly pitch-shelters and rescues slideshare
Barkloudly pitch-shelters and rescues slideshare
 
Csp@scuola uav corso1_lez3
Csp@scuola uav corso1_lez3Csp@scuola uav corso1_lez3
Csp@scuola uav corso1_lez3
 
Independent Presentation Final Sb (2)
Independent Presentation Final Sb (2)Independent Presentation Final Sb (2)
Independent Presentation Final Sb (2)
 
Wilfer practica 1 y 2
Wilfer practica 1 y 2Wilfer practica 1 y 2
Wilfer practica 1 y 2
 
Agility at Vietnamworks
Agility at VietnamworksAgility at Vietnamworks
Agility at Vietnamworks
 
Get Results With Email Marketing
Get Results With Email MarketingGet Results With Email Marketing
Get Results With Email Marketing
 
Digital agency founders talk
Digital agency founders talkDigital agency founders talk
Digital agency founders talk
 
Calendario
CalendarioCalendario
Calendario
 
Living Labs ovvero il possibile contributo delle ICT ai Presidi Territoriali ...
Living Labs ovvero il possibile contributo delle ICT ai Presidi Territoriali ...Living Labs ovvero il possibile contributo delle ICT ai Presidi Territoriali ...
Living Labs ovvero il possibile contributo delle ICT ai Presidi Territoriali ...
 
Presentazione csp luglio2011 [sola lettura]
Presentazione csp luglio2011 [sola lettura]Presentazione csp luglio2011 [sola lettura]
Presentazione csp luglio2011 [sola lettura]
 
Production & operation mgt
Production & operation mgtProduction & operation mgt
Production & operation mgt
 
SWUG - June 2010 - AD LDS by Andrew Cheng
SWUG - June 2010 - AD LDS by Andrew ChengSWUG - June 2010 - AD LDS by Andrew Cheng
SWUG - June 2010 - AD LDS by Andrew Cheng
 
Scientific method
Scientific methodScientific method
Scientific method
 
amenorrhea
amenorrheaamenorrhea
amenorrhea
 
Ekta kapoor
Ekta kapoorEkta kapoor
Ekta kapoor
 

Plus de Datto

What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?Datto
 
13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data ProtectionDatto
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?Datto
 
14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your SchoolDatto
 
What's In a Cloud? Purpose-Built vs. Public
What's In a Cloud?  Purpose-Built vs. PublicWhat's In a Cloud?  Purpose-Built vs. Public
What's In a Cloud? Purpose-Built vs. PublicDatto
 
Follow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security SuccessFollow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security SuccessDatto
 
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins Datto
 
15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for EducationDatto
 
Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Datto
 
Protecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupProtecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupDatto
 
Midmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationMidmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationDatto
 
Salesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestSalesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestDatto
 
Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Datto
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyDatto
 
Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Datto
 
Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Datto
 
Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Datto
 
The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]Datto
 
13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps UserDatto
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps SecurityDatto
 

Plus de Datto (20)

What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?
 
13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 
14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School
 
What's In a Cloud? Purpose-Built vs. Public
What's In a Cloud?  Purpose-Built vs. PublicWhat's In a Cloud?  Purpose-Built vs. Public
What's In a Cloud? Purpose-Built vs. Public
 
Follow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security SuccessFollow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security Success
 
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
 
15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education
 
Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014
 
Protecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupProtecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS Backup
 
Midmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationMidmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 Presentation
 
Salesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestSalesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild West
 
Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupify
 
Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]
 
Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]
 
Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]
 
The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]
 
13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security
 

Dernier

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Dernier (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

10 Ways to Use a Safe Password

  • 1. 10 Ways to Create a Really Good Password
  • 2. Is any password really secure? • The answer is two-fold: – If you’re using a plain dictionary word or words related directly to your or your interests, then no – If you’re using a diverse set of passwords between different accounts and making each unique, then yes
  • 3. Your Passwords May be Insecure • Many people don’t think twice about the security of their passwords • Most want an easy-to-remember password because they will be visiting frequently and are more concerned about getting started than setting up
  • 4. Password Tip #1 - Diversity • Instead of trying to make very complex passwords, try to make sure that no more than a few users have the same passwords for each account • Ensure everyone’s company passwords are diverse amongst each other - this detracts against an attack on multiple accounts at once • This has same effect on security as complex passwords, but makes it easier on each user
  • 5. Password Tip #2 – Account Lock Out • Disable account access when an invalid password is entered into the system more than a few times – Detracts against a hacker – If it is an employee who forgot their password, you can manually reset them
  • 6. Password Tip #3 – Beware of the Browser • Beware of browsers like Firefox that automatically store your passwords • You can go into your internet provider’s settings on your computer and deselect password auto- saving • This CNET TV video demonstrates how you can hide passwords in Firefox by creating a master password for the browser
  • 7. Password #4 – Determine Password Strength • Depending on the site, you can choose different types of passwords – If setting up a password for online banking with sensitive data, create complex password – If creating a password for a one-time online game, it can be more simple
  • 8. Password Tip #5 – Different Passwords for Different Sites • If you have the same password for Twitter, Facebook, Gmail, Flickr, YouTube, etc., and a hacker gets onto one of them, they all could be compromised – This is one of the main ways hackers get in – They try the password for one site and then all the rest • Diversify your passwords among sites as much as possible
  • 9. Password Tip #6 – Password Manger Tool • If tip #5 overwhelms you, use a password manager tool such as KeePass to store all passwords in a centralized place with one master password • KeePass (and there are many others) stores all passwords for you and makes it easy to copy them right into a login form • The master password must be very complex and never shared to make this effective
  • 10. Password Tip #7 – Paper Passwords • If you are more of a paper and pen person and don’t want to save your passwords on your computer, make sure you: – Hide the paper from plain sight – Never put the name of the website associated with the password on the same sheet of paper
  • 11. Password #9 – Complex Passwords • As stated earlier, complex passwords are best if managed well, but how do you create a complex password? – Don’t use dictionary words – Use uppercase and lowercase letters within the word – Include numbers in the password • The more creative you can get while still making it memorable, the better
  • 12. Password Tip #9 – Analyze Accounts • If you notice suspicious activity on any of your sites, change the password immediately – It may be hacked into or tampered • The more cautious and proactive you can be, the better
  • 13. Strong Passwords + Backups = Harmony • Just as important as strong passwords is a redundant backup • Backups eliminate ultimate data loss • If a password ever fails and you get hacked or lose data, a backup will ensure you always have control of your online life • Take back control with a free or premium Backupify social media backup account