Password Best Practices.  Never share your login ids and/or passwords  Remember: you are responsible for any activities associated with your login and.

Slides:



Advertisements
Similar presentations
Cyber-Safety Instructors: Connie Hutchison & Christopher McCoy.
Advertisements

Password Security An overview. We need your help The IT department uses the latest technology and techniques to maintain the highest level of security.
PowerChart Basics Session 1 June Goal: To acquaint the user with the basics of PowerChart patient information security. Objective: 1.State the importance.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Need your MyMathLab card with your access code (behind the ‘pull off’ tab) Need a Valid Address Need to know Purdue’s zip code is and your.
Need your MyMathLab card with your access code (behind the ‘pull off’ tab) Need a Valid Address Need to know Purdue’s zip code is and your.
Do Loops A Do..Loop terminates based on a condition that is specified Execution of a Do..Loop continues while a condition is True or until a condition.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
How to Login into SSA ?. Home Page Click on My Profile.
Creating STRONGCreating STRONGPasswords. CREATING STRONG PASSWORDSCREATING STRONG PASSWORDS A strong password is an important part of keeping your information.
Password Management PA Turnpike Commission
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Hacking Phishing Passwords Sourendu Gupta (TIFR).
Staying Safe Online Keep your Information Secure.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
©Holm Publications Security Awareness Presentation.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
Common Sense Media Unit 3 – Lesson 1 Category: Privacy & Security.
MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.
A New Way to Work For the New Century. As a result of several years’ work by you and your co-workers, we have...
Passwords Internet Safety for grades Introduction to Passwords Become part of our everyday life –Bank cards, , chat programs, on- line banking,
Security Compact.  Only authorized security administrators shall be allowed to create a user account for the PowerSchool application.  The LEA security.
HOW TO AVOID PASSWORD HACKING. Have you ever being HACKED ?
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
INTERNET SAFETY FOR KIDS
Unit 4 Day 1 FOCS – Introduction to Programming. Journal Entry: Unit #4 Entry #1 How do you think programs like Microsoft Word, Internet Explorer, and.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Changing Your Password General Lesson 3. Objectives Following completion of this lesson you will be able to:. Define how often a password must be changed.
NC Wise Security & Passwords Revised: July 29, 2008 Developed by: Jennifer Jenkins, Cabarrus County Schools.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Small Office Home Office
Government Agency’s Name April  At the end of this course, the learner will be able to: ◦ Define personally identifiable information ◦ List examples.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Understanding Security Policies Lesson 3. Objectives.
CREATING A STRONG PASSWORD. PASSWORD DON’TS Single dictionary words (skydiving) Less than 8 characters (rj1977) Personal words/dates (samantha, ,
How to Enable Account Key Sign Instead Of Password In Yahoo? For more details:
2.4 Cyber-Safety.
LastPass Password Management
What is Information Security?
Understanding Security Policies
To access your you will need: address Password
Key words: Secure | Password | Character
Understanding The Computer Login Account
Dove science academy Cyber Club
Protecting What’s Yours: Your Identity
Information Systems Desktop Support
Technology for Tomorrow
Lesson 1: Epic Advanced Appointment Scheduling
Things To Avoid: 1-Never your password to anyone.
Windows 94
DOVE SCIENCE ACADEMY CYBER CLUB
Registering on the SITE is a MULTI-STEP process:
PowerChart New User Tutorial
Strong Passwords.
Passwords.
2.4 Cyber-Safety.
Lesson 2: Epic Security Considerations
Dos and Don’ts.
Epic Introduction Basics
Lesson 1: Epic Advanced Appointment Scheduling
Top Ten Cyber Security Hygiene Tips
Epic Introduction Basics
Lesson 1: Epic Advanced Appointment Scheduling
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
start to finish – November 20181
Student Quick Start Guide
Keeping Our Data Secure
Presentation transcript:

Password Best Practices

 Never share your login ids and/or passwords  Remember: you are responsible for any activities associated with your login and password.  Use strong passwords Be creative: use a hobby: Watching Sci Fi: SciFicTV Better variation: Sc2F3c&TV ; longer = better Use acronyms rather than dictionary words: EGBDF, which means for music students “Every Good Boy Does Fine” Use 6 to 16 characters – a minimum of 8 is best – that includes at least one number and one special character, such as % or &.

Password Best Practices  Always change the password provided by a vendor or other system provider  Change your password frequently – at least once every three to six months  If you think your password has been compromised, change it immediately  Protect your security codes and passwords by keeping them secret. Do not write them down or store them on your computer!

Other Recommended Practices  Lock your computer when you leave your desk.  View Microsoft Security Videos for other helpful tips: