Passwords

Creating Strong Passwords

Is your password easy to crack?

What is a secure password?

A secure password should be virtually impossible for others to guess. It should not contain or be based on personal information, and it should not be written down or given out to anybody.

RIT Information Security recommends:

  • Minimum 15 characters (at least 8 required)
  • Mixed upper and lower case letters
  • At least one number and at least one symbol

Minimum requirements for passwords can be found at: https://www.rit.edu/security/content/password

What should I avoid?

There are many ways people try... ...

Multi-Factor Authentication

Enabling multi-factor authentication is one of the best things you can do to make sure your account information is not compromised.  Passwords alone will not always protect you, but using two or more steps to verify you are the account holder will help keep your accounts secure.

Common actions that lead to your password being stolen are:

  • Using the same password on multiple websites.
  • Downloading software from the Internet without verifying its legitimacy.
  • Clicking on links in phishing email messages.

The following is an example of multi-factor authentication on Google.

... ...

Better Passwords for Optimal Mobile Security

Smartphones open a back door into your life.  In the event that a hacker tries to remotely steal your information or your mobile device is lost or stolen, the first step of defense is locking it with secure passwords.  No matter the device you are using, there are improved guidelines to follow in order to keep your data safe.

A common mistake is using passwords like 123456 and password. These, and others like them, are easily cracked by hackers.  A key tip is to always remember that the longer the password, the better

An effective method of creating a... ...

Limited User Accounts

Limiting account privileges provides simple but effective protection when working online. Limited accounts (sometimes called standard accounts) allow you to do most daily activities but do not allow you to install software or make certain changes to the computer.  Only accounts with administrative privileges can install software on the computer.

Many attacks take advantage of the fact that an administrator account is created by default (the “Owner” account) and that most people neglect to make any additional accounts on their computer.  In general, when malicious attachments or links are clicked, any malware is downloaded and executed in the background.  When... ...

Using LinkedIn’s New Two-Factor Authentication

Using LinkedIn’s New Two-Factor Authentication

The growing trend in sites adding two-factor authentication to their log in process has many feeling more secure in their social media and other online interactions.

With passwords being easy to compromise with phishing attacks, many users have been hoping for something more secure.  Two-factor authentication gives a double protection on your account, requiring you to know something (your password), and have something in your... ...