Passwords.

Slides:



Advertisements
Similar presentations
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Advertisements

You are responsible for security of your internet banking transactions ONLINE.
Employee Self Service (ESS) Registration
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Frictionless Commerce
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Do Now: Banking Basics By the end of this block you should have an understanding of personal banking services and how they can benefit you.
Online banking Using the internet for your banking.
How to Create (and use) Strong & Unique Passwords Larry Magid Co-director ConnectSafely.org.
Threats to I.T Internet security By Cameron Mundy.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
ESCCO Data Security Training David Dixon September 2014.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Protecting Your Personal Information November 15, 2013.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Scenarios Grab your headphones to listen. Press F5 to play.
Consumer Protection Shop Safely and Guard Your Financial Information.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
How to set up an account- Non-Technical Aimee Lilley.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
BuckeyePass Multi-Factor Authentication. 2 What is Multi-Factor Authentication? Adds a 2 nd layer of security Combines something you know with something.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
Internet Safety.
Protecting Your Assets By Preventing Identity Theft
The Parent Portal Version 3.0 Last Updated on 14/10/2016.
HIPAA Privacy and Security
How to stay safe using the internet & App’s
IT Security Awareness Day October 19, 2016
What this activity will show you
Attention Identity theft Definition
HRA Employee Guide This brochure is designed to give you only the highlights of your HRA Plan with OCA. For a complete description of the terms and conditions,
Information Security.
Ways to protect yourself against hackers
How to use the internet safely and How to protect my personal data?
Multi-Factor Authentication
Cyber Security By: Pratik Gandhi.
Multifactor Authentication
Protecting your personal information and privacy
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Registration of Arcot Soft Token in Client Connection
Cybersecurity Awareness
How Can I Create A Gmail Account
Information Security Awareness 101
Computer Security Password Management.
Information Technology Services Education and Awareness Team
Multifactor Authentication & First Time Login
Setting up an online account
Digital $$ Quiz Test your knowledge.
The Nelson Medical Practice Privacy Notice
Introduction to Computers
HOW DO I KEEP MY COMPUTER SAFE?
Internet Safety – Social Media

Information Technology Services Education and Awareness Team
Multi-Factor Authentication
Multi-Factor Authentication
Getting Started With LastPass Enterprise
Employee Self-Service (ESS) Portal
Presentation transcript:

Passwords

Passwords

What are Passwords? Passwords are keys to your accounts that protect your data and prevent illegitimate access to systems. You use passwords for many online services such as: Email Bank Accounts Netflix Facebook

Why Do They Want Yours? When someone has your passwords they can: Impersonate you to request information Transfer your bank balance to their account Read your email for sensitive information Access healthcare details Use your email to send phishing mail Download your pictures If a hacker manages to get hold of health records they have names, dates of birth, insurance policy numbers and diagnoses codes that can be used to buy equipment drugs or simply to get expensive health care.

What Can You Do? Use a strong password Use a unique password for each service Don’t share your password Change your passwords Record your password in a secure location

What Is A Strong Password? Long and complex At least 8 characters (longer is better) Mix of upper and lower case characters Include numbers and special characters Unique (not used for other services) Does not use personal references (pet names, birthdates, etc.) Does not follow a pattern or sequence

Recording Passwords Record passwords in a secure location Use a password wallet/manager Encrypt passwords Store passwords for each system/web site Generate strong random passwords Access all passwords from your phone or computer KeePass LastPass

Multi-Factor Authentication Some services now offer two-step authentication (may be opt-in) When you log in, you may: Receive a text message with a code to enter Receive an automated phone call (press a button to confirm) Get a application pop-up on your mobile device where the app was provided by the service Must carry your phone with you whenever you are accessing service

Security Awareness Campaign https://brocku.ca/information-technology/security/

Video

Questions