Passwords

Password

Passwords

Having a strong password is increasingly important. Weak passwords can be "guessed" or "cracked" using free software available online, allowing unauthorized access that can result in identity crimes, extortion, or damage to reputation through the disclosure of sensitive or private information (yours and RIT's). Choosing a strong password and changing it regularly are two of the most important things you can do to protect yourself online.  Follow the password standard and subscribe to our social media outlets for password tips and tricks!

Password Standard

Documented Standard

  • Current Password
  • ... ...

Creating Strong Passwords

Is your password easy to crack?

What is a secure password?

A secure password should be virtually impossible for others to guess. It should not contain or be based on personal information, and it should not be written down or given out to anybody.

RIT Information Security recommends:

  • Minimum 15 characters (at least 8 required)
  • Mixed upper and lower case letters
  • At least one number and at least one symbol

Minimum requirements for passwords can be found at: https://www.rit.edu/security/content/password

What should I avoid?

There are many ways people... ...

Limited User Accounts

Limiting account privileges provides simple but effective protection when working online. Limited accounts (sometimes called standard accounts) allow you to do most daily activities but do not allow you to install software or make certain changes to the computer.  Only accounts with administrative privileges can install software on the computer.

Many attacks take advantage of the fact that an administrator account is created by default (the “Owner” account) and that most people neglect to make any additional accounts on their computer.  In general, when malicious attachments or links are clicked, any malware is downloaded and executed in the background.  When... ...

Better Passwords for Optimal Mobile Security

Smartphones open a back door into your life.  In the event that a hacker tries to remotely steal your information or your mobile device is lost or stolen, the first step of defense is locking it with secure passwords.  No matter the device you are using, there are improved guidelines to follow in order to keep your data safe.

A common mistake is using passwords like 123456 and password. These, and others like them, are easily cracked by hackers.  A key tip is to always remember that the longer the password, the better

An effective method of creating a... ...

Using LinkedIn’s New Two-Factor Authentication

Using LinkedIn’s New Two-Factor Authentication

The growing trend in sites adding two-factor authentication to their log in process has many feeling more secure in their social media and other online interactions.

With passwords being easy to compromise with phishing attacks, many users have been hoping for something more secure.  Two-factor authentication gives a double protection on your account, requiring you to know something (your password), and have something in your... ...