creating complex, secure passwords you can remember · can easily be found with an internet search...

14
CREATING COMPLEX, SECURE PASSWORDS YOU CAN REMEMBER

Upload: others

Post on 25-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CREATING COMPLEX, SECURE PASSWORDS YOU CAN REMEMBER · can easily be found with an internet search or by looking at your Facebook page! Cyber criminals stalk their victims and learn

CREATING COMPLEX, SECURE PASSWORDSYOU CAN REMEMBER

Page 2: CREATING COMPLEX, SECURE PASSWORDS YOU CAN REMEMBER · can easily be found with an internet search or by looking at your Facebook page! Cyber criminals stalk their victims and learn

Our network’s security is only as strong as the

weakest user password!

Page 3: CREATING COMPLEX, SECURE PASSWORDS YOU CAN REMEMBER · can easily be found with an internet search or by looking at your Facebook page! Cyber criminals stalk their victims and learn

NO-NO’S• Written passwords. We work in a very public building where access to offices

is relatively easy to achieve. Can someone walk up to your computer and find your password? If so, you might as well have no password.

• Keeping a document saved on your computer with your passwords. If your computer is hacked or infected with malware, the attacker could get their hands on all your information!

• Using words found in the dictionary. These are easily cracked.• Adding a number to the end of a word (Password1).• Keeping the same word or name in your password, but adding the next number

to the end (going from Robert1 to Robert2).

Page 4: CREATING COMPLEX, SECURE PASSWORDS YOU CAN REMEMBER · can easily be found with an internet search or by looking at your Facebook page! Cyber criminals stalk their victims and learn
Page 5: CREATING COMPLEX, SECURE PASSWORDS YOU CAN REMEMBER · can easily be found with an internet search or by looking at your Facebook page! Cyber criminals stalk their victims and learn

NO-NO’S

• Passwords containing the names of your children, significant other, pet, birthday or favorite sports team – These are sometimes public records that can easily be found with an internet search or by looking at your Facebook page! Cyber criminals stalk their victims and learn about their lives and habits before they attack!

• Using the same passwords for multiple accounts. If a hacker gets your Facebook password, do they also now have your banking password?

• “Remembering” your passwords in your internet browser. Anyone who walks up to your computer can then access your accounts.

Page 6: CREATING COMPLEX, SECURE PASSWORDS YOU CAN REMEMBER · can easily be found with an internet search or by looking at your Facebook page! Cyber criminals stalk their victims and learn
Page 7: CREATING COMPLEX, SECURE PASSWORDS YOU CAN REMEMBER · can easily be found with an internet search or by looking at your Facebook page! Cyber criminals stalk their victims and learn

You CAN create complex passwords that

you CAN rememberwhen you use

the right tricks!

Page 8: CREATING COMPLEX, SECURE PASSWORDS YOU CAN REMEMBER · can easily be found with an internet search or by looking at your Facebook page! Cyber criminals stalk their victims and learn

CREATE A PATTERNThink of a pattern that you can remember to use as a cypher for your own custom secret code!

I’ll use the below pattern throughout this presentation. You’re welcome to use it, tweak it however you like or come up with your own!

ConsonantsVowels

1st Time Used 2nd Time Used 3rd Time UsedThe second consonant in a word is capitalized

(the first letter is too obvious).@ A a3 E e! I i0

(zero)O o

^(the caret is on

the “6” key)

U u

Page 9: CREATING COMPLEX, SECURE PASSWORDS YOU CAN REMEMBER · can easily be found with an internet search or by looking at your Facebook page! Cyber criminals stalk their victims and learn

PICK 2 WORDS

I keep a list of positive words posted at my desk. When I need to reset my password, I pick two words from the list and apply my pattern. My list can be found by clicking here. It’s also useful for writing delightful, inventive, stupendously refreshing password tips!

• Active Bliss = @cT!v3bLIss

• Coconuts Grapes = c0COn^tsgR@p3s

• Tulip Daisy = t^L!pd@Isy

Page 10: CREATING COMPLEX, SECURE PASSWORDS YOU CAN REMEMBER · can easily be found with an internet search or by looking at your Facebook page! Cyber criminals stalk their victims and learn

SONG, BOOK OR MOVIE TITLES

• Purple Haze = p^Rpl3h@zE

• Strawberry Fields Forever = sTr@wb3rryf!Elds

• Rocky Mountain High = r0CkymO^Nt@!nhIGh

• The Catcher in the Rye = c@Tch3rrYE

• The Sword in the Stone = sW0rdsTOn3

• Forrest Gump = f0Rr3stg^Mp

Page 11: CREATING COMPLEX, SECURE PASSWORDS YOU CAN REMEMBER · can easily be found with an internet search or by looking at your Facebook page! Cyber criminals stalk their victims and learn

FUN PICTURES ON YOUR WALL CAN BE YOUR PASSWORD CLUE!

= !s@IDAtRIm!!

Airplane Spoon= @!rPlAnEsP0On

Page 12: CREATING COMPLEX, SECURE PASSWORDS YOU CAN REMEMBER · can easily be found with an internet search or by looking at your Facebook page! Cyber criminals stalk their victims and learn

PICTURES WITH NO WORDS OR ALL WORDS

Hamster Broccoli= h@Mst3rbR0ccOl!

Just use the first letters of the words for long quotes:

= !mNbPbP0m!PA

Page 13: CREATING COMPLEX, SECURE PASSWORDS YOU CAN REMEMBER · can easily be found with an internet search or by looking at your Facebook page! Cyber criminals stalk their victims and learn

That’s not so bad, is it? It can be kind of fun and a great brain exercise.

With a little practice, you can be a password wizard!

Page 14: CREATING COMPLEX, SECURE PASSWORDS YOU CAN REMEMBER · can easily be found with an internet search or by looking at your Facebook page! Cyber criminals stalk their victims and learn

DID YOU KNOW…• The only computer that can’t be hacked is one that has:

• Has never touched the internet• Has never had a flash drive or external hard drive plugged into it• Has never been used to charge a cell phone• Has never had a Bluetooth receiver activated

• Smartphones are computers, too!• Be just as careful with what you do on these devices as you are with your computer.• Be sure you have a good antivirus application.

• Plugging devices into your computer is a FANTASTIC way to spread viruses and malware! If you device is infected, it will spread to your computer and if that computer is on our network, it could spread to everyone else’s computers as well! This includes:

• Cell Phones (plug them into the wall to charge!)• USB Flash Drives• External Hard Drives