SlideShare a Scribd company logo
1 of 8
Strong Passwords
Sameeha Fatima
In The News…
 In the Yahoo hack from 2013, hackers had
access to users’
 Names
 Birthdays
 Phone Numbers
 Encrypted Passwords (which were then
easy to crack)
 Because most people reuse the same
passwords, these users were at a higher
risk to be hacked on other platforms
“
”
Between 31% and 55% of the people
use the same password at multiple
sites
- Center For Internet Security
Reasons To Have A Strong Password
 The most common way a person hacks
into someone’s account is by guessing
his/her password
 Treat passwords as you would your
physical keys you use to unlock your
house
 So if you have a “Strong Password”
 It’s less likely for someone else to log
into your account
 It protects your personal information
Guidelines For A Strong Password
 Do not include your name or your username
 Do not use a combination of dictionary words
 At least 8 characters long (the more the better)
 Make sure it’s something that you will remember (if you have to write it
down its not strong)
 A mixture of both uppercase and lowercase letters
 A mixture of letters and numbers
 Including at least 1 special character “@?<>{}[]()*&^%$#”
 Make sure the password is only used on one account
p@ssw0rd
12345678
abc123
easy to guess passwords
like these are too easy to
guess/hack
Storing Passwords
 Remembering a plethora of passwords can be frustrating.
 A way to deal with this is to use a password manager
 Ex: Dashlane
For the password manager to be most efficient:
 Create a “Strong Password” for accessing the manager
 Terminate out of the manager completely when you are not using it (even if it is locked)
 Use multi-factor authentication
 How do I ensure my password protection stays safe?
 Never share your passwords with others
 It is okay to make your passwords unique to you personally, but make sure it is not something that is easily guessed
 Have a different unique password for each account/site
 Change your passwords often
MULTI-FACTOR
AUTHENTICATION
In the end, hackers rely on the human
instinct to guess passwords, so it’s up to you
to be unpredictable and to protect your
precious information.
References
 https://support.google.com/accounts/answer/32040?hl=en
 https://its.lafayette.edu/policies/strongpasswords/
 https://www.angelo.edu/services/technology/it_policies/password_quality.php
 https://www.howtogeek.com/195430/how-to-create-a-strong-password-and-remember-it/
 https://www.forbes.com/sites/kateoflahertyuk/2019/02/20/password-managers-have-a-security-
flaw-heres-how-to-avoid-it/#2d49adf4e16b
 https://www.cisecurity.org/newsletter/why-strong-unique-passwords-matter/
 https://www.arcyber.army.mil/Portals/34/Fact%20Sheets/ARCYBER%20fact%20sheet%20-
%20Passwords%20and%20Securing%20Accounts%20(19April2018).pdf?ver=2018-04-19-161536-
120
 https://www.itpro.co.uk/security/34616/the-top-password-cracking-techniques-used-by-hackers

More Related Content

What's hot

TRUSTCO Profil dan Produk
TRUSTCO Profil dan ProdukTRUSTCO Profil dan Produk
TRUSTCO Profil dan ProdukIndra Kusumah
 
Self confidence and motivation
Self confidence and motivationSelf confidence and motivation
Self confidence and motivationSandeep Govindan
 
Presentation Family Members
Presentation Family MembersPresentation Family Members
Presentation Family MembersAgnes Kasih
 
Family members
Family membersFamily members
Family membersMs. Resty
 
Proposal Training Public Speaking: Speaking with Confidence
Proposal Training Public Speaking: Speaking with ConfidenceProposal Training Public Speaking: Speaking with Confidence
Proposal Training Public Speaking: Speaking with ConfidenceMAKHMUD KUNCAHYO
 
Materi Training esq, training motivasi, Training kepemimpinan - Aditya 087888...
Materi Training esq, training motivasi, Training kepemimpinan - Aditya 087888...Materi Training esq, training motivasi, Training kepemimpinan - Aditya 087888...
Materi Training esq, training motivasi, Training kepemimpinan - Aditya 087888...ESQ Leadership Center
 
साइबर जगत में सुरक्षा: विद्यालयों के लिए (CIET-NCERT) | Cyber Safety and Secu...
साइबर जगत में सुरक्षा: विद्यालयों के लिए (CIET-NCERT) | Cyber Safety and Secu...साइबर जगत में सुरक्षा: विद्यालयों के लिए (CIET-NCERT) | Cyber Safety and Secu...
साइबर जगत में सुरक्षा: विद्यालयों के लिए (CIET-NCERT) | Cyber Safety and Secu...Parveen Kumar Sharma
 
Importance of self confidence
Importance of self confidenceImportance of self confidence
Importance of self confidenceStrengthsTheatre
 
Cause and Effect.pptx
Cause and Effect.pptxCause and Effect.pptx
Cause and Effect.pptxayuismatul
 
Teknik Afirmasi Positif
Teknik Afirmasi Positif Teknik Afirmasi Positif
Teknik Afirmasi Positif Amalia Senja
 
Dukungan orangtua dan persiapan karir remaja
Dukungan orangtua dan persiapan karir remajaDukungan orangtua dan persiapan karir remaja
Dukungan orangtua dan persiapan karir remajaWiwin Hendriani
 
Less. 15 Improving Your Memory
Less. 15 Improving Your MemoryLess. 15 Improving Your Memory
Less. 15 Improving Your Memoryjimwilly
 

What's hot (20)

Rangkuman buku informatika bab 1
Rangkuman buku informatika bab 1Rangkuman buku informatika bab 1
Rangkuman buku informatika bab 1
 
TRUSTCO Profil dan Produk
TRUSTCO Profil dan ProdukTRUSTCO Profil dan Produk
TRUSTCO Profil dan Produk
 
Self confidence and motivation
Self confidence and motivationSelf confidence and motivation
Self confidence and motivation
 
Presentation Family Members
Presentation Family MembersPresentation Family Members
Presentation Family Members
 
Family members
Family membersFamily members
Family members
 
Proposal Training Public Speaking: Speaking with Confidence
Proposal Training Public Speaking: Speaking with ConfidenceProposal Training Public Speaking: Speaking with Confidence
Proposal Training Public Speaking: Speaking with Confidence
 
Materi Training esq, training motivasi, Training kepemimpinan - Aditya 087888...
Materi Training esq, training motivasi, Training kepemimpinan - Aditya 087888...Materi Training esq, training motivasi, Training kepemimpinan - Aditya 087888...
Materi Training esq, training motivasi, Training kepemimpinan - Aditya 087888...
 
Kekuatan impian
Kekuatan impianKekuatan impian
Kekuatan impian
 
Menghancurkan mental block
Menghancurkan mental blockMenghancurkan mental block
Menghancurkan mental block
 
साइबर जगत में सुरक्षा: विद्यालयों के लिए (CIET-NCERT) | Cyber Safety and Secu...
साइबर जगत में सुरक्षा: विद्यालयों के लिए (CIET-NCERT) | Cyber Safety and Secu...साइबर जगत में सुरक्षा: विद्यालयों के लिए (CIET-NCERT) | Cyber Safety and Secu...
साइबर जगत में सुरक्षा: विद्यालयों के लिए (CIET-NCERT) | Cyber Safety and Secu...
 
Importance of self confidence
Importance of self confidenceImportance of self confidence
Importance of self confidence
 
Self confidance
Self confidanceSelf confidance
Self confidance
 
Materi CMS - Blog.pptx
Materi CMS - Blog.pptxMateri CMS - Blog.pptx
Materi CMS - Blog.pptx
 
Pelatihan Membangun Karakter melalui Integritas
Pelatihan Membangun Karakter melalui IntegritasPelatihan Membangun Karakter melalui Integritas
Pelatihan Membangun Karakter melalui Integritas
 
Membuat akun gmail
Membuat akun gmailMembuat akun gmail
Membuat akun gmail
 
Ppt potensi diri
Ppt potensi diriPpt potensi diri
Ppt potensi diri
 
Cause and Effect.pptx
Cause and Effect.pptxCause and Effect.pptx
Cause and Effect.pptx
 
Teknik Afirmasi Positif
Teknik Afirmasi Positif Teknik Afirmasi Positif
Teknik Afirmasi Positif
 
Dukungan orangtua dan persiapan karir remaja
Dukungan orangtua dan persiapan karir remajaDukungan orangtua dan persiapan karir remaja
Dukungan orangtua dan persiapan karir remaja
 
Less. 15 Improving Your Memory
Less. 15 Improving Your MemoryLess. 15 Improving Your Memory
Less. 15 Improving Your Memory
 

Similar to Strong Passwords

Password Strength Policy Query
Password Strength Policy QueryPassword Strength Policy Query
Password Strength Policy QueryGloria Stoilova
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crackKlaus Drosch
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewSTO STRATEGY
 
5 tips for an unbreakable password
5 tips for an unbreakable password5 tips for an unbreakable password
5 tips for an unbreakable passwordSafeSpaceOnline
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of viewYury Chemerkin
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based SecurityRare Input
 
World Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfWorld Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfChinatu Uzuegbu
 
Yours Advance Security Hood (Yash)
Yours Advance Security Hood (Yash)Yours Advance Security Hood (Yash)
Yours Advance Security Hood (Yash)IOSR Journals
 
Heartbleed Explained & LastPass Demo
Heartbleed Explained & LastPass DemoHeartbleed Explained & LastPass Demo
Heartbleed Explained & LastPass DemoWilliam Mann
 
Network Security
Network SecurityNetwork Security
Network SecuritySOBXTECH
 
S01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong PasswordsS01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong Passwordsselcukca84
 
8 Password Hygiene Tips to Protect You and Your Company
8 Password Hygiene Tips to Protect You and Your Company 8 Password Hygiene Tips to Protect You and Your Company
8 Password Hygiene Tips to Protect You and Your Company LogRhythm
 
zaki_anwer_cryptography.pptx
zaki_anwer_cryptography.pptxzaki_anwer_cryptography.pptx
zaki_anwer_cryptography.pptxMewar University
 

Similar to Strong Passwords (20)

Password Strength Policy Query
Password Strength Policy QueryPassword Strength Policy Query
Password Strength Policy Query
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
5 tips for an unbreakable password
5 tips for an unbreakable password5 tips for an unbreakable password
5 tips for an unbreakable password
 
The strategies of password
The strategies of passwordThe strategies of password
The strategies of password
 
W make107
W make107W make107
W make107
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 
Password management
Password managementPassword management
Password management
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
World Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfWorld Password Management Day, 2023.pdf
World Password Management Day, 2023.pdf
 
Securing password
Securing passwordSecuring password
Securing password
 
Yours Advance Security Hood (Yash)
Yours Advance Security Hood (Yash)Yours Advance Security Hood (Yash)
Yours Advance Security Hood (Yash)
 
Heartbleed Explained & LastPass Demo
Heartbleed Explained & LastPass DemoHeartbleed Explained & LastPass Demo
Heartbleed Explained & LastPass Demo
 
PASSWORD BEST PRACTICES
PASSWORD BEST PRACTICESPASSWORD BEST PRACTICES
PASSWORD BEST PRACTICES
 
Network Security
Network SecurityNetwork Security
Network Security
 
S01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong PasswordsS01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong Passwords
 
Protect Your Business With Web Security
Protect Your Business With Web SecurityProtect Your Business With Web Security
Protect Your Business With Web Security
 
8 Password Hygiene Tips to Protect You and Your Company
8 Password Hygiene Tips to Protect You and Your Company 8 Password Hygiene Tips to Protect You and Your Company
8 Password Hygiene Tips to Protect You and Your Company
 
zaki_anwer_cryptography.pptx
zaki_anwer_cryptography.pptxzaki_anwer_cryptography.pptx
zaki_anwer_cryptography.pptx
 

More from North Carolina State University (8)

Biometrics in Security
Biometrics in SecurityBiometrics in Security
Biometrics in Security
 
Updating Operating Systems and Applications
Updating Operating Systems and ApplicationsUpdating Operating Systems and Applications
Updating Operating Systems and Applications
 
Ransomware and Backups
Ransomware and BackupsRansomware and Backups
Ransomware and Backups
 
Phishing
PhishingPhishing
Phishing
 
Scams
ScamsScams
Scams
 
Cookie
CookieCookie
Cookie
 
Cookie note
Cookie noteCookie note
Cookie note
 
Intimate Partner Violence
Intimate Partner ViolenceIntimate Partner Violence
Intimate Partner Violence
 

Recently uploaded

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 

Recently uploaded (20)

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 

Strong Passwords

  • 2. In The News…  In the Yahoo hack from 2013, hackers had access to users’  Names  Birthdays  Phone Numbers  Encrypted Passwords (which were then easy to crack)  Because most people reuse the same passwords, these users were at a higher risk to be hacked on other platforms
  • 3. “ ” Between 31% and 55% of the people use the same password at multiple sites - Center For Internet Security
  • 4. Reasons To Have A Strong Password  The most common way a person hacks into someone’s account is by guessing his/her password  Treat passwords as you would your physical keys you use to unlock your house  So if you have a “Strong Password”  It’s less likely for someone else to log into your account  It protects your personal information
  • 5. Guidelines For A Strong Password  Do not include your name or your username  Do not use a combination of dictionary words  At least 8 characters long (the more the better)  Make sure it’s something that you will remember (if you have to write it down its not strong)  A mixture of both uppercase and lowercase letters  A mixture of letters and numbers  Including at least 1 special character “@?<>{}[]()*&^%$#”  Make sure the password is only used on one account p@ssw0rd 12345678 abc123 easy to guess passwords like these are too easy to guess/hack
  • 6. Storing Passwords  Remembering a plethora of passwords can be frustrating.  A way to deal with this is to use a password manager  Ex: Dashlane For the password manager to be most efficient:  Create a “Strong Password” for accessing the manager  Terminate out of the manager completely when you are not using it (even if it is locked)  Use multi-factor authentication  How do I ensure my password protection stays safe?  Never share your passwords with others  It is okay to make your passwords unique to you personally, but make sure it is not something that is easily guessed  Have a different unique password for each account/site  Change your passwords often MULTI-FACTOR AUTHENTICATION
  • 7. In the end, hackers rely on the human instinct to guess passwords, so it’s up to you to be unpredictable and to protect your precious information.
  • 8. References  https://support.google.com/accounts/answer/32040?hl=en  https://its.lafayette.edu/policies/strongpasswords/  https://www.angelo.edu/services/technology/it_policies/password_quality.php  https://www.howtogeek.com/195430/how-to-create-a-strong-password-and-remember-it/  https://www.forbes.com/sites/kateoflahertyuk/2019/02/20/password-managers-have-a-security- flaw-heres-how-to-avoid-it/#2d49adf4e16b  https://www.cisecurity.org/newsletter/why-strong-unique-passwords-matter/  https://www.arcyber.army.mil/Portals/34/Fact%20Sheets/ARCYBER%20fact%20sheet%20- %20Passwords%20and%20Securing%20Accounts%20(19April2018).pdf?ver=2018-04-19-161536- 120  https://www.itpro.co.uk/security/34616/the-top-password-cracking-techniques-used-by-hackers

Editor's Notes

  1. News Article - https://www.nytimes.com/2017/10/03/technology/yahoo-hack-3-billion-users.html
  2. Quote Credit - https://www.cisecurity.org/blog/reusing-passwords-on-multiple-sites/ Pic Credit - <a href='https://www.freepik.com/photos/computer'>Computer photo created by freepik - www.freepik.com</a>