Passwords

Password

Passwords

Having a strong password is increasingly important. Weak passwords can be "guessed" or "cracked" using free software available online, allowing unauthorized access that can result in identity crimes, extortion, or damage to reputation through the disclosure of sensitive or private information (yours and RIT's). Choosing a strong password and changing it regularly are two of the most important things you can do to protect yourself online.  Follow the password standard and subscribe to our social media outlets for password tips and tricks!

Password Standard

Documented Standard

  • Current Password
  • ... ...

Creating Strong Passwords

Creating Strong Passwords

What is a secure password?

A secure password should be virtually impossible for others to guess. It should not contain or be based on personal information, and it should not be written down or given out to anybody.

RIT Information Security recommends:

  • Minimum of 12 characters (8 are required)
  • Mixed upper and lower case letters
  • At least one number and at least one symbol

Minimum requirements for passwords can be found at: https://www.rit.edu/security/content/password.

The passwords standards can be found here: https://www.rit.edu/security/sites/rit.edu.security/files/Password_2014.pdf

... ...

Limited User Accounts

Limiting account privileges provides simple but effective protection when working online. Limited accounts (sometimes called standard accounts) allow you to do most daily activities but do not allow you to install software or make certain changes to the computer.  Only accounts with administrative privileges can install software on the computer.

Many attacks take advantage of the fact that an administrator account is created by default (the “Owner” account) and that most people neglect to make any additional accounts on their computer.  In general, when malicious attachments or links are clicked, any malware is downloaded and executed in the background.  When... ...

Choose a Secure Lock Screen

Choose a Secure Lock Screen

Smartphones contain a wealth of your personal information, ranging from personal messages and photos, to bank information. In the event of your mobile device being lost or stolen, the first line of defense is locking it securely. Smartphones offer several locking options including pins, passwords and biometric methods.

Pattern

  • Uncheck the "make pattern visible" option in the settings. This makes it more difficult for people around you to see your pattern.
  • Use six or more nodes.
  • Don't use a simple or common pattern. 40% of patterns start in the top left corner, and 77% start
  • ... ...

Using LinkedIn’s New Two-Factor Authentication

Using LinkedIn’s New Two-Factor Authentication

The growing trend in sites adding two-factor authentication to their log in process has many feeling more secure in their social media and other online interactions.

With passwords being easy to compromise with phishing attacks, many users have been hoping for something more secure.  Two-factor authentication gives a double protection on your account, requiring you to know something (your password), and have something in your... ...