SlideShare a Scribd company logo
1 of 11
How to Create (and use)
Strong & Unique
Passwords
Larry Magid
Co-director
ConnectSafely.org
Passwords should be:
• At least 8 characters long
• Contain at least one number
• Contain at least one capital letter
• Contain at least one symbol (like #, %, &)
• Not be a real word, name or anything that would be relatively easy to
guess
Go to next slide for suggestions
Think of a phrase you can remember
Come up with a phrase and use a character from each word. Use
capitals where appropriate
Example
“I met Susan Morris at Lincoln High School in 1991”
The password could be: ImSMaLHSi#91
An easy way to make each password
unique
• Add a letter or two to the password based on the name of the site
you’re logging into. For example
• Amazon: aImSMaLHSi#91z (added an A to beginning and a z to end)
• Google: gImSMaLHSi#91
• Twitter: tImSMaLHSi#91r
Change your passwords if & when:
• There has been any type of security breach on the site or your system
• You have lost a device that has the password stored
• Someone else gets hold of your password
• And even if none of this happens, change them every few months
Consider 2-Factor Authentication
• A growing number of sites allow you to use two-factor
authentication: Something you know & something you
have.
• Typically, the site will send a code to your phone that you
type in along with your username and password. Anyone
trying to access your site without your phone is out-of-
luck.
• Some sites (like Google) only require it if you’re on a new
device. Others require it each time.
• Downsides are it’s a little inconvenient and a hassle if you
don’t have your phone
• Upside: It’s a lot more secure (but not 100% secure)
Be wary of tricks to get your password
Avoid phishing: Never enter a password based on a link in an email
unless you’re absolutely sure it’s legitimate. It’s safer to type in the web
address of your bank or other company rather than clicking on a link.
Don’t’ give our password over phone: Be skeptical If you get a call
from a service you use or your company’s network support department
asking for a password. Tell them you’ll call them back and find out if it’s
legitimate.
Consider using a password manager
• Password managers store and enter passwords for you. You can
create really strong passwords (or let them generate random ones)
and all you need to remember is the password manager’s password
• Examples:
Lastpass
Roboform
Kaspersky Password Manager
DataVault Password Manager (iPhone)
mSecure Password Manger (Android)
Use a very strong passwords for:
• Email:
• Many sites will send your password to your email address so it’s important
that it be very secure
• Social network sites
• Your reputation can be affected if someone posts negative and abuse material
in your name
• Banking
• Pretty much goes without saying that you want a strong lock on your bank
account
• E-commerce sites
• Don’t let anyone go on a shopping free with your money
Never share your passwords
Sharing a password is not a sign of being a good friend. Even if you
really trust that person:
• A friend can become an ex-friend
• Your friend might not be as careful as you are
• Your friend might use the password on a machine that’s not all that secure
• Possible exceptions are kids sharing with parents or spouses sharing with
each other
For more on strong passwords:
passwords.connectsafely.org
Larry Magid
Co-director
ConnectSafely.org
larry@ConnectSafely.org

More Related Content

What's hot

Security Awareness & Training
Security Awareness & TrainingSecurity Awareness & Training
Security Awareness & Trainingnovemberchild
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Password management for you
Password management for youPassword management for you
Password management for youChit Ko Ko Win
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018jubke
 

What's hot (20)

Security Awareness & Training
Security Awareness & TrainingSecurity Awareness & Training
Security Awareness & Training
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Password management for you
Password management for youPassword management for you
Password management for you
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018
 

Viewers also liked

3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship RedefinedConnectSafely
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidConnectSafely
 
Step6 troubleshooting
Step6   troubleshootingStep6   troubleshooting
Step6 troubleshootingricharddxd
 
Internet Safety Presentation For Parent Night
Internet Safety Presentation For Parent NightInternet Safety Presentation For Parent Night
Internet Safety Presentation For Parent NightAllen Martin
 
Critical thinking for fe
Critical thinking for feCritical thinking for fe
Critical thinking for feJustine Sissons
 
Harvard referencing for fe
Harvard referencing for feHarvard referencing for fe
Harvard referencing for feJustine Sissons
 
8 passwordsecurity
8 passwordsecurity8 passwordsecurity
8 passwordsecurityricharddxd
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)securityEnrico Zimuel
 
Bullying Presentation
Bullying PresentationBullying Presentation
Bullying Presentationdreamingmoi
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying PowerpointPrissykrissy
 
Anti-bullying Presentation #1
Anti-bullying Presentation #1Anti-bullying Presentation #1
Anti-bullying Presentation #1itunaschool
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 

Viewers also liked (19)

3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
 
Step6 troubleshooting
Step6   troubleshootingStep6   troubleshooting
Step6 troubleshooting
 
Internet Safety Presentation For Parent Night
Internet Safety Presentation For Parent NightInternet Safety Presentation For Parent Night
Internet Safety Presentation For Parent Night
 
Critical thinking for fe
Critical thinking for feCritical thinking for fe
Critical thinking for fe
 
Harvard referencing for fe
Harvard referencing for feHarvard referencing for fe
Harvard referencing for fe
 
8 passwordsecurity
8 passwordsecurity8 passwordsecurity
8 passwordsecurity
 
phishing
phishingphishing
phishing
 
Making Information Security Fun
Making Information Security FunMaking Information Security Fun
Making Information Security Fun
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)security
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Bullying Presentation
Bullying PresentationBullying Presentation
Bullying Presentation
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying Powerpoint
 
Anti-bullying Presentation #1
Anti-bullying Presentation #1Anti-bullying Presentation #1
Anti-bullying Presentation #1
 
Bully Powerpoint
Bully PowerpointBully Powerpoint
Bully Powerpoint
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 

Similar to How to Create (use use) Strong & Unique Passwords

How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawConnectSafely
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crackKlaus Drosch
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)David Herrington
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of viewYury Chemerkin
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - PasswordsBarry Caplin
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereBlake Carver
 
5 tips for an unbreakable password
5 tips for an unbreakable password5 tips for an unbreakable password
5 tips for an unbreakable passwordSafeSpaceOnline
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewSTO STRATEGY
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based SecurityRare Input
 
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
Don't Forget Your (Virtual) Keys: Creating and Using Strong PasswordsDon't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwordsrmortiz66
 
FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxLaurieAnnFrazier
 
Digital security for Sri Lankan activists
Digital security for Sri Lankan activistsDigital security for Sri Lankan activists
Digital security for Sri Lankan activistsSanjana Hattotuwa
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activitiesYumonomics
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersRajesh Soundararajan
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Homezaimorkai
 

Similar to How to Create (use use) Strong & Unique Passwords (20)

How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
Password management
Password managementPassword management
Password management
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)Be Cyber Smart! (DLH 10/25/2019)
Be Cyber Smart! (DLH 10/25/2019)
 
Staying Safe Online
Staying Safe OnlineStaying Safe Online
Staying Safe Online
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - Passwords
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
5 tips for an unbreakable password
5 tips for an unbreakable password5 tips for an unbreakable password
5 tips for an unbreakable password
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
Don't Forget Your (Virtual) Keys: Creating and Using Strong PasswordsDon't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
 
FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptx
 
Digital security for Sri Lankan activists
Digital security for Sri Lankan activistsDigital security for Sri Lankan activists
Digital security for Sri Lankan activists
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
WordPress Security
WordPress SecurityWordPress Security
WordPress Security
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home11 Commandments of Cyber Security for the Home
11 Commandments of Cyber Security for the Home
 

More from ConnectSafely

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for SeniorsConnectSafely
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyConnectSafely
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentConnectSafely
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safetyConnectSafely
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some ContextConnectSafely
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenshipConnectSafely
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenshipConnectSafely
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, brieflyConnectSafely
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspectiveConnectSafely
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely
 

More from ConnectSafely (13)

Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
 
A Brief Guide to Facebook Privacy
A Brief Guide to Facebook PrivacyA Brief Guide to Facebook Privacy
A Brief Guide to Facebook Privacy
 
Online Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to EmpowermentOnline Safety 3.0: From Fear to Empowerment
Online Safety 3.0: From Fear to Empowerment
 
App Privacy
App PrivacyApp Privacy
App Privacy
 
A (very) brief history of Internet safety
A (very) brief history of Internet safetyA (very) brief history of Internet safety
A (very) brief history of Internet safety
 
Internet Safety: Some Context
Internet Safety: Some ContextInternet Safety: Some Context
Internet Safety: Some Context
 
Digital literacy, digital citizenship
Digital literacy, digital citizenshipDigital literacy, digital citizenship
Digital literacy, digital citizenship
 
Digital reputations
Digital reputationsDigital reputations
Digital reputations
 
Making the case for digital citizenship
Making the case for digital citizenshipMaking the case for digital citizenship
Making the case for digital citizenship
 
Digital citizenship, briefly
Digital citizenship, brieflyDigital citizenship, briefly
Digital citizenship, briefly
 
Putting online risks into perspective
Putting online risks into perspectivePutting online risks into perspective
Putting online risks into perspective
 
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...ConnectSafely Slide Show for Ministry of Communications and Information Techn...
ConnectSafely Slide Show for Ministry of Communications and Information Techn...
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

How to Create (use use) Strong & Unique Passwords

  • 1. How to Create (and use) Strong & Unique Passwords Larry Magid Co-director ConnectSafely.org
  • 2. Passwords should be: • At least 8 characters long • Contain at least one number • Contain at least one capital letter • Contain at least one symbol (like #, %, &) • Not be a real word, name or anything that would be relatively easy to guess Go to next slide for suggestions
  • 3. Think of a phrase you can remember Come up with a phrase and use a character from each word. Use capitals where appropriate Example “I met Susan Morris at Lincoln High School in 1991” The password could be: ImSMaLHSi#91
  • 4. An easy way to make each password unique • Add a letter or two to the password based on the name of the site you’re logging into. For example • Amazon: aImSMaLHSi#91z (added an A to beginning and a z to end) • Google: gImSMaLHSi#91 • Twitter: tImSMaLHSi#91r
  • 5. Change your passwords if & when: • There has been any type of security breach on the site or your system • You have lost a device that has the password stored • Someone else gets hold of your password • And even if none of this happens, change them every few months
  • 6. Consider 2-Factor Authentication • A growing number of sites allow you to use two-factor authentication: Something you know & something you have. • Typically, the site will send a code to your phone that you type in along with your username and password. Anyone trying to access your site without your phone is out-of- luck. • Some sites (like Google) only require it if you’re on a new device. Others require it each time. • Downsides are it’s a little inconvenient and a hassle if you don’t have your phone • Upside: It’s a lot more secure (but not 100% secure)
  • 7. Be wary of tricks to get your password Avoid phishing: Never enter a password based on a link in an email unless you’re absolutely sure it’s legitimate. It’s safer to type in the web address of your bank or other company rather than clicking on a link. Don’t’ give our password over phone: Be skeptical If you get a call from a service you use or your company’s network support department asking for a password. Tell them you’ll call them back and find out if it’s legitimate.
  • 8. Consider using a password manager • Password managers store and enter passwords for you. You can create really strong passwords (or let them generate random ones) and all you need to remember is the password manager’s password • Examples: Lastpass Roboform Kaspersky Password Manager DataVault Password Manager (iPhone) mSecure Password Manger (Android)
  • 9. Use a very strong passwords for: • Email: • Many sites will send your password to your email address so it’s important that it be very secure • Social network sites • Your reputation can be affected if someone posts negative and abuse material in your name • Banking • Pretty much goes without saying that you want a strong lock on your bank account • E-commerce sites • Don’t let anyone go on a shopping free with your money
  • 10. Never share your passwords Sharing a password is not a sign of being a good friend. Even if you really trust that person: • A friend can become an ex-friend • Your friend might not be as careful as you are • Your friend might use the password on a machine that’s not all that secure • Possible exceptions are kids sharing with parents or spouses sharing with each other
  • 11. For more on strong passwords: passwords.connectsafely.org Larry Magid Co-director ConnectSafely.org larry@ConnectSafely.org