4Tips on
COMPUTERSECURITY
REMEMBER.
YOU
MUST
ALWAYS
CREATE A STRONG
PASSWORD
Tip #1.
WHATMAKESA STRONG/PERFECT
PASSWORD?
#1.
The recipe of the
PERFECT PASSWORD:
A mix of these
#1.
FOLLOW
PASSWORDGUIDELINES
Tip #2.
#2.
#2.
COMMANDMENTSOF USING
PASSWORDS6
#2.
Must be
treated as
sensitive &
confidential
information.
#1.
PASSWORDS
#2.
Must not
be shared
with or
disclosed
to anyone.
#2.
PASSWORDS
#2.
Must be
changed at
least once
every 60
days.
#3.
PASSWORDS
#2.
That are no
longer
needed must
be deleted
immediately.
#4.
PASSWORDS
#2.
PASSWORDS
Must be
changed
immediately
upon first
login.
#5.
#2.
PASSWORDS
Must not be
stored or
transmitted in
any form.
#6.
#2.
PASSWORDS
KNOW THE DIFFERENCE!
STRONG
WEAK
VS
Tip #3.
WhatIS A STRONG
PASSWORD?
#3.
A STRONG
PASSWORD…
#3.
IS MADE UP OF AT LEAST
8CHARACTERS.
#3.
HAS
UPPERCASE
LETTERS.
#3.
HAS
lowercaseLETTERS.
#3.
HAS
$pecial ch@r@cter$.
#3.
DOES NOT
CONTAIN THESE:
#3.
USER NAME
DATE OF BIRTH
PET’S NAME
YOUR
#3.
OR ANY OTHER
EASILY
DENTIFIABLE
NFORMATION.i
#3.
#3.
WhatIS A WEAK
PASSWORD?
#3.
A WEAK
PASSWORD…
CAN BE
EASILY GUESSED!
#3.
HAS LESS THAN
8
#3.
CHARACTERS.
CAN BE FOUND IN A
#3.
DictionaryAN
AMPERE
ANGSTROM
APPLE
AQUA
ANGER
ANT
ABDUCTOR
ADAPTER
RADIUM
RAN
RAT
RAM
RED
YAM
YATCH
YEAR
YAK
YAWN
OAK
ORANGE
OAR
ONION
ORDER
OFFER
OBESE
OBJECT
IS MADE UP OF WORD/NUMBER
#3.
PATTERNS.
aabb
ccddma
qwerty
nonono
‘123456’
HAS ONLY LETTERS
#3.
SPECIALch@r@cter$.
BUT NO
Tip #4.
KEEP
CALM
AND ENSURE
SOFTWARE
COMPLIANCE
WAYSYOU CAN ENSURE
SOFTWARE5
#4.
COMPLIANCE
#4.
Only use IT
approved freeware
or trial software.
#1.
#4.
Avoid using any
software owned by
the company for
personal use.
#2.
#4.
#3.
Only install
licensed
software.
#4.
Only install software
that have a
verified publisher.
#4.
#4.
Before installing any
software, go through
its reviews and
ratings.
#5.
ROUGHTTOYOU
BY

4 Computer Security Tips you Must Always Remember