Create strong passwords

Similar documents
Password Policy Best Practices

STEAM Clown Production. Passwords. STEAM Clown & Productions Copyright 2016 STEAM Clown. Page 1 - Cyber Security Class

Why was an extra step of choosing a Security Image added to the sign-in process?

PASSWORD POLICY. Policy Statement. Reason for Policy/Purpose. Who Needs to Know This Policy. Website Address for this Policy.

TABLE OF CONTENTS. Lakehead University Password Maintenance Standard Operating Procedure

PASSWORD SECURITY GUIDELINE

Introduction to

How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords

Troubleshooting. EAP-FAST Error Messages CHAPTER

COMPUTER PASSWORDS POLICY

How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords

South Central Power Stop Scams

Identity Theft and Online Security

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Frequently Asked Questions (FAQ)

Identity Theft and Online Security

How Cyber-Criminals Steal and Profit from your Data

Employee Security Awareness Training

commtech Online Holiday Shopping Tips A Guide Presented by: CommTech Industries

Configuring Facebook for a More Secure Social Networking Experience

Security Awareness. Chapter 2 Personal Security

Configuring Facebook for a More Secure Social Networking Experience

Online Threats. This include human using them!

Using your Employer Account

Changing Your Password

INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com

How to Build a Culture of Security

Hitachi High Technologies America, Inc. Password Policy

TIPS TO AVOID PHISHING SCAMS

ANNUAL SECURITY AWARENESS TRAINING 2012

Train employees to avoid inadvertent cyber security breaches

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

Security Awareness Training June 2016

Configuring Twitter for a More Secure Social Networking Experience

Conveying Emotion. Chapter 12: Computers In Polite Society: Social Implications of IT. Improving the Effectiveness of . Problems with

FAQ. Usually appear to be sent from official address

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

Summary

Client Resources. participant guide

It pays to stop and think

ELECTRONIC BANKING & ONLINE AUTHENTICATION

Protect Yourself From. Identify Theft

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk

Online Scams. Ready to get started? Click on the green button to continue.

Cyber Security Guide. For Politicians and Political Parties

Accounts and Passwords

How to recognize phishing s

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

Evolution of Spear Phishing. White Paper

Norton Online Reputation Report: Why Millennials should manage their online footprint

Creating and Protecting Your Online Identity for Job Search. A guide for newcomers to British Columbia

FAQ: Privacy, Security, and Data Protection at Libraries

Configuring Twitter for a More Secure Social Networking Experience

SECURING YOUR HOME NETWORK

Verizon Enhanced Security Authentication

Phishing. Eugene Davis UAH Information Security Club April 11, 2013

INTERNET SAFETY IS IMPORTANT

Your security on click Jobs

EBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats.

PIN / Password Security

Consumer Banking User Guide. Getting Started

IMPORTANT SECURITY CHANGES LOGGING ON. We are replacing the existing enhanced authentication.

Sinu. Your IT Department. Oh, the humanity! The role people play in data security NYC: DC:

Virtual Product Fair. Protect your agency data protect your business

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Cyber Hygiene Guide. Politicians and Political Parties

CYBER THREATS: REAL ESTATE FRAUD ADVISORY COUNCIL

Web Cash Fraud Prevention Best Practices

Security Enhancements Sage Pastel Accounting Version 14 Build

PROTECTING YOUR BUSINESS ASSETS

Sensitive Data Security Primer

Security Awareness. Presented by OSU Institute of Technology

To learn more about Stickley on Security visit You can contact Jim Stickley at

DoD Spear-Phishing Awareness Training. Joint Task Force - Global Network Operations

Financial scams. What to look for and how to avoid them.

About Lavasoft. Contact. Key Facts:

Business Online. Senior Administrator Version First-time Login Instructions and New User Setup Steps. Quick Start Guide

CUSTOMER TIPS: HOW TO GUARD AGAINST FRAUD WHEN USING ONLINE BANKING OR ATM s

ATTACHMENTS, INSERTS, AND LINKS...

PBX Fraud Information

SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA

GOOGLE APPS. GETTING STARTED Page 02 Prerequisites What You Will Learn. INTRODUCTION Page 03 What is Google? SETTING UP AN ACCOUNT Page 03 Gmail

User Authentication. E.g., How can I tell you re you?

Best Practices Guide to Electronic Banking

Online Security and Safety Protect Your Computer - and Yourself!

2 User Guide. Contents

IT & DATA SECURITY BREACH PREVENTION

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

Webomania Solutions Pvt. Ltd. 2017

EBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organisation from Impostors, Phishers and Other Non-Malware Threats.

Protecting Your Business From Hackers

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

. Account & Google Message Center Guide. January Prepared by: Angela Mars IT Education and Training

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

Guide to credit card security

Internet and Social Networking

Bank of america report phishing

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

10/1/2015. Authentication. Outline. Authentication. Authentication Mechanisms. Authentication Mechanisms. Authentication Mechanisms

Target Breach Overview

Transcription:

Create strong passwords Passwords are the first line of defense against break-ins to your online accounts and computer, tablet, or phone. Poorly chosen passwords can render your information vulnerable to criminals, so it s important to make your passwords strong.

Create strong Passwords To help you create strong passwords, follow the same network security guidelines required of all Microsoft employees: Strong passwords are phrases (or sentences) at least eight characters long longer is better that include at least three of the following: uppercase and lowercase letters, numerals, punctuation marks, and symbols. Give passwords the thought they deserve, and make them memorable. One way is to base them on the title of a favorite song or book, or a familiar slogan or other phrase. (Don t use the examples below!) Example phrases: I love my new Xbox One Now take that phrase and turn it into a strong password: Example password: Ilove!mynewxbox1 How to recognize e-mail fraud 2

Avoid common password pitfalls Cybercriminals use sophisticated tools to rapidly crack passwords, but you can help foil their attempts. DO NOT USE: Personal identity information that could be guessed or easily discovered, like pet names, nicknames, birth date, address, or driver s license number. Dictionary words in any language (including the word password the most common password in the English language!). Words spelled backwards, abbreviations, and common misspellings (accommodate, remember). Common letter-to-symbol conversions, such as changing o to 0 or i to 1 or!. Sequences or repeated characters. Examples: 12345678, 222222, abcdefg, or adjacent letters on your keyboard (such as qwerty). How to recognize e-mail fraud 3

Secure your passwords Don t share your passwords with anyone, and don t store them on the device they re designed to protect. Never send a password in email or instant messages because they re not reliably secure. Use a unique password for each website. If someone steals a password that you use on many different sites, all the information it protects is at risk. Keep track of your passwords on a sheet of paper stored in a secret place. Change your passwords regularly, particularly those that safeguard your computer, important accounts (like email or Facebook), and sensitive information, like financial and health data. Whenever possible, change passwords immediately on accounts you suspect may have been compromised. Tip: When you re asked to give answers to security questions, give an unrelated answer. For instance, if the question is Where were you born?, you might answer Green. Answers like these can t be found by trolling Twitter or Facebook. (Just be sure they make sense to you, so you ll remember them.) How to recognize e-mail fraud 4

Don t be tricked into revealing your passwords Criminals can try to break your password, but sometimes it s easier to exploit human nature and trick you into revealing it. You may get an email message pretending to be from an online store (like ebay or Amazon) or a phone call from your bank, that tries to convince you of the legitimate need for your password (or other sensitive information). It could be a phishing scam. (You may have heard these con games referred to as social engineering.) You re most vulnerable to scams that look genuine. In general, be wary of the sender, even someone you know or a company you trust. (For example, a crook may have hijacked a friend s account and sent email to everyone in the friend s address book. Treat all unsolicited requests for sensitive information with caution. Never share your password in response to an email or phone request for example, to verify your identity even if it appears to be from a trusted company or person. How to recognize e-mail fraud 5