LastPass Password Management

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
(you must put the “s” in https to access)
Using a Password Manager Are your passwords safe? Ryan Leavitt DoIT Security.
Cloud File Structures A RM Y OURSELF W ITH I NFORMATION Presented by: Russell Greenwald.
1 Authentication CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 11, 2004.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Password Best Practices.  Never share your login ids and/or passwords  Remember: you are responsible for any activities associated with your login and.
August 15 click! 1 Basics Kitsap Regional Library.
How to Login into SSA ?. Home Page Click on My Profile.
Passwords and You CREATING AND MAINTAINING SECURE PASSWORDS.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
To navigate through this slideshow, use the arrow keys on your keyboard to go forward or backward.  or  Use your mouse to click to the next step within.
Keeping Your Online Presence Safe and Professional November 8, 2013.
Adrian Ellison Assistant Director, IT Services Wednesday 23 November 2011.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology January 17,
(Down 6) 14. sunshine (Up 1) 15. master (Down 1) (Up 4) 17. welcome (New) 18. shadow (Up 1) 19. ashley (Down 3) 20. football.
User Management: Passwords cs3353. Passwords Policy: “Choose a password you can’t remember and don’t write it down”
Trinity Washington University 1 . Trinity –You get a free Google Mail account i.e.,
Digital Citizenship Project. Netiquette Do’s -Read before you post messages. -Try to keep your postings brief and easy to read. -Be kind when others make.
Demo of Account Activation Pg.0. Click here to activate the account E-Procurement Pilot Programme Pg.1.
25/10/ Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook.
INTERNET SAFETY FOR KIDS
Good strong passwords are key to keeping your access and data safe.
A CLOUD FOR FLIPPED CLASSROOMS A “Cloud” for Flipped Classrooms NCCE 3/1/13 Pamela Livingston.
Using LastPass. Great password management is impossible w/o a great tool Auto-fill (hands-free login) will save you approximately one hour per month You.
Password Security Review Your password is the last line of defense. Keep your data safe with good password practices. Mikio Olin Kevin Matteson.
To get started you will need to click “Join Now”. The Join Now link will take you to the page below:
Managing Users CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
How to Join IIT Indore Active Directory. 1. Please note that these steps will create a new user in your computer. 2. You can use both user accounts or.
Effective Password Management Neil Kownacki. Passwords we use today PINs, smartphone unlock codes, computer accounts, websites Passwords are used to protect.
How to Enable Account Key Sign Instead Of Password In Yahoo? For more details:
PASSWORD SECURITY A Melbourne Athenaeum Library
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
INFORMATION TECHNOLOGY NEW USER ORIENTATION
Training Objectives About D2F Download Installation Configuration
# 66.
System Access Authentication
Ways to protect yourself against hackers
Password Management Limit login attempts Encrypt your passwords
To the ETS – Password Reset Online Training Course
Registration of Arcot Soft Token in Client Connection
Passwords.
Multifactor Authentication & First Time Login
October is National Cyber Security Awareness Month
Passwords.
Lesson 2: Epic Security Considerations
Installation & User Guide
Registration for Atrezzo Connect Provider Portal
INFORMATION TECHNOLOGY NEW USER ORIENTATION
Epic Introduction Basics
INFORMATION TECHNOLOGY NEW USER ORIENTATION
Protecting Your Password
Lesson 2: Epic Security Considerations
start to finish – November 20181
Module 2 OBJECTIVE 14: Compare various security mechanisms.
To the ETS – Password Reset Online Training Course
Registration for Atrezzo Connect Provider Portal
Authentication Chapter 2.
Process flow Kindly note: This presentation is automated – please do not click any of your mouse buttons or keyboard keys.
Passwords Why all the bother?.
Modeling Text-Based Requirements and their Relationship to Design
Keeping your passwords safe
Getting Started With LastPass Enterprise
Presentation transcript:

LastPass Password Management Presented by: Russell Greenwald, Vice President, Director of Technology Consulting Practice January 2016 Copyright © 2016 Insource Services, Inc. All Rights Reserved.

Give you tools and information to: Objectives Give you tools and information to: Know what a good password looks like. Password best practices Understand what LastPass offers

Do you keep passwords on a post-it note? Poll Poll Question Do you keep passwords on a post-it note?

Types of Weak Passwords Based on common dictionary words (including dictionary words that have been altered) Based on common names Based on user/account identifier Short (under 8 characters) Based on keyboard patterns 1qa2ws Difficult to remember

Types of Strong Passwords Minimum 8 characters Do not contain a complete word Contain at least one of: digit, letter, and punctuation Based on a verse or phrase meaningful to you Randomly generated and stored in a vault

Password Best Practices Never recycled Never recorded unencrypted Different password for every system Passwords change frequently Multifactor authentication when available

What is multifactor? When more than one method of authentication is required to verify login. i.e. text messages, Google authenticator, key fob.

LastPass Secure password manager One master password with access to vault Securely share website credentials Strong encryption

LastPass Demo

Questions

Russell Greenwald, Vice President, Contact Information Russell Greenwald, Vice President, Director of Technology Consulting Practice rgreenwald@insourceservices.com 781-374-5116 www.insourceservices.com

Please join our mailing list to receive our newsletters and updates! Text INSOURCESERVICES  to 22828