SlideShare a Scribd company logo
1 of 11
How to Create (and use)
Strong & Unique
Passwords
Larry Magid
Co-director
ConnectSafely.org
Passwords should be:
• At least 8 characters long
• Contain at least one number
• Contain at least one capital letter
• Contain at least one symbol (like #, %, &)
• Not be a real word, name or anything that would be relatively easy to
guess
Go to next slide for suggestions
Think of a phrase you can remember
Come up with a phrase and use a character from each word. Use
capitals where appropriate
Example
“I met Susan Morris at Lincoln High School in 1991”
The password could be: ImSMaLHSi#91
An easy way to make each password
unique
• Add a letter or two to the password based on the name of the site
you’re logging into. For example
• Amazon: aImSMaLHSi#91z (added an A to beginning and a z to end)
• Google: gImSMaLHSi#91
• Twitter: tImSMaLHSi#91r
Change your passwords if & when:
• There has been any type of security breach on the site or your system
• You have lost a device that has the password stored
• Someone else gets hold of your password
• And even if none of this happens, change them every few months
Consider 2-Factor Authentication
• A growing number of sites allow you to use two-factor
authentication: Something you know & something you
have.
• Typically, the site will send a code to your phone that you
type in along with your username and password. Anyone
trying to access your site without your phone is out-of-
luck.
• Some sites (like Google) only require it if you’re on a new
device. Others require it each time.
• Downsides are it’s a little inconvenient and a hassle if you
don’t have your phone
• Upside: It’s a lot more secure (but not 100% secure)
Be wary of tricks to get your password
Avoid phishing: Never enter a password based on a link in an email
unless you’re absolutely sure it’s legitimate. It’s safer to type in the web
address of your bank or other company rather than clicking on a link.
Don’t’ give our password over phone: Be skeptical If you get a call
from a service you use or your company’s network support department
asking for a password. Tell them you’ll call them back and find out if it’s
legitimate.
Consider using a password manager
• Password managers store and enter passwords for you. You can
create really strong passwords (or let them generate random ones)
and all you need to remember is the password manager’s password
• Examples:
Lastpass
Roboform
Kaspersky Password Manager
DataVault Password Manager (iPhone)
mSecure Password Manger (Android)
Use a very strong passwords for:
• Email:
• Many sites will send your password to your email address so it’s important
that it be very secure
• Social network sites
• Your reputation can be affected if someone posts negative and abuse material
in your name
• Banking
• Pretty much goes without saying that you want a strong lock on your bank
account
• E-commerce sites
• Don’t let anyone go on a shopping free with your money
Never share your passwords
Sharing a password is not a sign of being a good friend. Even if you
really trust that person:
• A friend can become an ex-friend
• Your friend might not be as careful as you are
• Your friend might use the password on a machine that’s not all that secure
• Possible exceptions are kids sharing with parents or spouses sharing with
each other
For more on strong passwords:
passwords.connectsafely.org
Larry Magid
Co-director
ConnectSafely.org
larry@ConnectSafely.org

More Related Content

What's hot

Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
mjtheman
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
joycruiser
 

What's hot (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Password Attack
Password Attack Password Attack
Password Attack
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber security
Cyber securityCyber security
Cyber security
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 

Viewers also liked

Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
ConnectSafely
 
Step6 troubleshooting
Step6   troubleshootingStep6   troubleshooting
Step6 troubleshooting
richarddxd
 
Internet Safety Presentation For Parent Night
Internet Safety Presentation For Parent NightInternet Safety Presentation For Parent Night
Internet Safety Presentation For Parent Night
Allen Martin
 
8 passwordsecurity
8 passwordsecurity8 passwordsecurity
8 passwordsecurity
richarddxd
 
Bullying Presentation
Bullying PresentationBullying Presentation
Bullying Presentation
dreamingmoi
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying Powerpoint
Prissykrissy
 
Anti-bullying Presentation #1
Anti-bullying Presentation #1Anti-bullying Presentation #1
Anti-bullying Presentation #1
itunaschool
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 

Viewers also liked (19)

3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
 
Step6 troubleshooting
Step6   troubleshootingStep6   troubleshooting
Step6 troubleshooting
 
Internet Safety Presentation For Parent Night
Internet Safety Presentation For Parent NightInternet Safety Presentation For Parent Night
Internet Safety Presentation For Parent Night
 
Critical thinking for fe
Critical thinking for feCritical thinking for fe
Critical thinking for fe
 
Harvard referencing for fe
Harvard referencing for feHarvard referencing for fe
Harvard referencing for fe
 
8 passwordsecurity
8 passwordsecurity8 passwordsecurity
8 passwordsecurity
 
phishing
phishingphishing
phishing
 
Making Information Security Fun
Making Information Security FunMaking Information Security Fun
Making Information Security Fun
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)security
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Bullying Presentation
Bullying PresentationBullying Presentation
Bullying Presentation
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying Powerpoint
 
Anti-bullying Presentation #1
Anti-bullying Presentation #1Anti-bullying Presentation #1
Anti-bullying Presentation #1
 
Bully Powerpoint
Bully PowerpointBully Powerpoint
Bully Powerpoint
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 

Similar to How to Create (use use) Strong & Unique Passwords

Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
STO STRATEGY
 

Similar to How to Create (use use) Strong & Unique Passwords (20)

How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
Password management
Password managementPassword management
Password management
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)
 
Staying Safe Online
Staying Safe OnlineStaying Safe Online
Staying Safe Online
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - Passwords
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
5 tips for an unbreakable password
5 tips for an unbreakable password5 tips for an unbreakable password
5 tips for an unbreakable password
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
Don't Forget Your (Virtual) Keys: Creating and Using Strong PasswordsDon't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
 
FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptx
 
Digital security for Sri Lankan activists
Digital security for Sri Lankan activistsDigital security for Sri Lankan activists
Digital security for Sri Lankan activists
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home
 

More from ConnectSafely

Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenship
ConnectSafely
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely
 

More from ConnectSafely (13)

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook Privacy
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
App Privacy
App PrivacyApp Privacy
App Privacy
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some Context
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenship
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenship
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 

How to Create (use use) Strong & Unique Passwords

  • 1. How to Create (and use) Strong & Unique Passwords Larry Magid Co-director ConnectSafely.org
  • 2. Passwords should be: • At least 8 characters long • Contain at least one number • Contain at least one capital letter • Contain at least one symbol (like #, %, &) • Not be a real word, name or anything that would be relatively easy to guess Go to next slide for suggestions
  • 3. Think of a phrase you can remember Come up with a phrase and use a character from each word. Use capitals where appropriate Example “I met Susan Morris at Lincoln High School in 1991” The password could be: ImSMaLHSi#91
  • 4. An easy way to make each password unique • Add a letter or two to the password based on the name of the site you’re logging into. For example • Amazon: aImSMaLHSi#91z (added an A to beginning and a z to end) • Google: gImSMaLHSi#91 • Twitter: tImSMaLHSi#91r
  • 5. Change your passwords if & when: • There has been any type of security breach on the site or your system • You have lost a device that has the password stored • Someone else gets hold of your password • And even if none of this happens, change them every few months
  • 6. Consider 2-Factor Authentication • A growing number of sites allow you to use two-factor authentication: Something you know & something you have. • Typically, the site will send a code to your phone that you type in along with your username and password. Anyone trying to access your site without your phone is out-of- luck. • Some sites (like Google) only require it if you’re on a new device. Others require it each time. • Downsides are it’s a little inconvenient and a hassle if you don’t have your phone • Upside: It’s a lot more secure (but not 100% secure)
  • 7. Be wary of tricks to get your password Avoid phishing: Never enter a password based on a link in an email unless you’re absolutely sure it’s legitimate. It’s safer to type in the web address of your bank or other company rather than clicking on a link. Don’t’ give our password over phone: Be skeptical If you get a call from a service you use or your company’s network support department asking for a password. Tell them you’ll call them back and find out if it’s legitimate.
  • 8. Consider using a password manager • Password managers store and enter passwords for you. You can create really strong passwords (or let them generate random ones) and all you need to remember is the password manager’s password • Examples: Lastpass Roboform Kaspersky Password Manager DataVault Password Manager (iPhone) mSecure Password Manger (Android)
  • 9. Use a very strong passwords for: • Email: • Many sites will send your password to your email address so it’s important that it be very secure • Social network sites • Your reputation can be affected if someone posts negative and abuse material in your name • Banking • Pretty much goes without saying that you want a strong lock on your bank account • E-commerce sites • Don’t let anyone go on a shopping free with your money
  • 10. Never share your passwords Sharing a password is not a sign of being a good friend. Even if you really trust that person: • A friend can become an ex-friend • Your friend might not be as careful as you are • Your friend might use the password on a machine that’s not all that secure • Possible exceptions are kids sharing with parents or spouses sharing with each other
  • 11. For more on strong passwords: passwords.connectsafely.org Larry Magid Co-director ConnectSafely.org larry@ConnectSafely.org