2
1. Managing your password THE 12 BEST PRACTICES OF CYBERSECURITY A SMART WAY TO GUARD AGAINST… Identity theft if one of your passwords is stolen or revealed. The theft of your data. Data or computer systems being damaged or destroyed because of malicious actions taken by someone using your permissions. ~ 890 000 Passwords are stolen every day. (source: Hasso Plattner Institute) 10 milliseconds The amount of time it takes to break a password of six lower-case letters. (source: howsecureismypassword.net) FOOD FOR THOUGHT YOU SAVED MY LIFE! IF NOT, I WOULD NEVER HAVE BEEN ABLE TO OPEN AN IMPORTANT FILE! THE ONE WHERE I SAVED ALL MY PASSWORDS… BEST PRACTICE on the back …here is the example not to be followed… OH NO! WHAT A DISASTER… I CAN’T REMEMBER MY PASSWORD! TRY YOUR NAME OR DATE OF BIRTH! REALLY? THAT’S IT!!!! IT WORKS!! This story is a parody, any resemblance to people or situations that exist or have existed would be purely coincidental. C 7

1. Managing your password - Infosec

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 1. Managing your password - Infosec

1. Managingyour password

THE 12 BEST PRACTICES OF CYBERSECURITY

A SMART WAY TO GUARD AGAINST…• Identity theft if one of your passwords is

stolen or revealed.

• The theft of your data.

• Data or computer systems being damaged or destroyed because of malicious actions taken by someone using your permissions.

~ 890 000Passwords are stolen every day.

(source: Hasso Plattner Institute)

10 millisecondsThe amount of time it takes to break a password of six lower-case letters.

(source: howsecureismypassword.net)

FOOD FOR THOUGHT

YOU SAVED MY LIFE! IF NOT, I WOULD NEVER HAVE BEEN ABLE TO OPEN AN IMPORTANT FILE!

THE ONE WHERE I SAVED ALL MY PASSWORDS…

BEST PRACTICEon the back

…here is the examplenot to be followed…

OH NO! WHAT A DISASTER…

I CAN’T REMEMBER MY PASSWORD!

TRY YOUR NAME OR DATE OF BIRTH!

REALLY?

THAT’S IT!!!!

ITWORKS!!

This story is a parody, any resemblance to people or situations that exist or have existed would be purely coincidental.

C 7

Page 2: 1. Managing your password - Infosec

Use strong passwords that are different for each account. Store them in a password managerto ensure they remain confidential.

1. Managing your passwords

THE 12 BEST PRACTICES OF CYBERSECURITY

IN YOUR DAILY ROUTINECREATE A STRONG PASSWORD• Composed of at least 12 characters.• Avoid choosing a password derived from information that is

publicly available on social media.• Prevent access to your smartphone with a PIN of at least 6

digits, even if you use Touch ID or Face ID.

CHOOSE A DIFFERENT PASSWORD FOR EACH SERVICE YOU USE• That will prevent cybercriminals from accessing the other

services you use during a cyberattack.• In particular, do not use the same passwords at work that you

use at home.

PROTECT YOUR PASSWORDS• Store your passwords in KeePass, the password storage

software recommended by Total. Don’t record your passwords anywhere else.

• Do not share your passwords with anyone.• Change your passwords immediately if you think they may have

been compromised.• Never disclose the “secret” questions and answers that can be

used to reset your account, either on social media or elsewhere.

USEFUL LINKS

VIDEO

CYBERSECURITY MOMENTWhat’s your password ?

KeePass helps you create strong passwords and keep them private.

More about using KeePass

--Learn more about managing your

authentication methods.

See the Infosec pageIs

sued

by D

SI/R

MC

–se

pt. 2

019