Choosing a Safe Password
- Date: 2007-01-20 - Word Count: 302
Share This!
A password is like a key to your home. If someone steals it, there are chances he will use it to steal something else. We use passwords everywhere in our life, but the life of an Internet user is absolutely impossible without passwords: e-mail, online discussion groups, e-bank, commercial websites - all of them use password-based authentication.
We use our "virtual keys" everywhere and all the time. We are so accustomed to passwords, that we don't pay any attention to them until someone steals it ...
For protection of our "virtual keys" we can choose a safe password. That makes a "job" for thieves much more difficult. It's not as hard as we can imagine!!!
In nowadays there are special information security awareness trainings, but here are only some simple rules that we need to notice choosing our "virtual keys"!!!
* The password must be at least 8 characters long. The longer-the better.
* It must not contain any part of username.
* The password must not be word that can be found in glossary.
* It must not be based on anything that some other person can easily guess or find with the use of personal data (e.g. name, telephone number, birth date, etc.).
* The password must contain a mixture of upper- and lower-case characters, numbers, punctuation marks and special characters.
* The password must not be composed from:
o Sequence of identical symbols;
o Groups of numbers or capital/small letters only;
o Sequence of letters or numbers (e.g. "abc", "123");
o Sequence of letters on the keyboard (e.g. "qwert").
* It must be meaningless (Hint: use the first letters of a sentence which you know well).
* If a password is hard to remember, it is also hard to guess.
* Change your password at least every two months.
And if we notice that, our passwords will be safe and protect!!!
Article source: infosecuritylab
We use our "virtual keys" everywhere and all the time. We are so accustomed to passwords, that we don't pay any attention to them until someone steals it ...
For protection of our "virtual keys" we can choose a safe password. That makes a "job" for thieves much more difficult. It's not as hard as we can imagine!!!
In nowadays there are special information security awareness trainings, but here are only some simple rules that we need to notice choosing our "virtual keys"!!!
* The password must be at least 8 characters long. The longer-the better.
* It must not contain any part of username.
* The password must not be word that can be found in glossary.
* It must not be based on anything that some other person can easily guess or find with the use of personal data (e.g. name, telephone number, birth date, etc.).
* The password must contain a mixture of upper- and lower-case characters, numbers, punctuation marks and special characters.
* The password must not be composed from:
o Sequence of identical symbols;
o Groups of numbers or capital/small letters only;
o Sequence of letters or numbers (e.g. "abc", "123");
o Sequence of letters on the keyboard (e.g. "qwert").
* It must be meaningless (Hint: use the first letters of a sentence which you know well).
* If a password is hard to remember, it is also hard to guess.
* Change your password at least every two months.
And if we notice that, our passwords will be safe and protect!!!
Article source: infosecuritylab
Related Tags: information security awareness, infosecuritylab, information security awareness training, choosing a safe password
Your Article Search Directory : Find in Articles
Recent articles in this category:
- Improper Way Of Marketing Reflects Poorly On A Company.
New business, product or service everything requires visibility, awareness in order to come into the - Replacing Paper Prints With Online Versions
Nowadays saving out on resources and being additionally informative are both aspects that are in. In - Stop Smoking Effectively
If I told you of a way that you could stop smoking harmful tobacco would you believe it? Most people - What Is Runtime Error 182? And How To Fix It
Are you finding an effective way to fix runtime error 182? Do you think fixing runtime error 182 is - Do You Know How To Fix Runtime Error 87 In Minutes?
Are you finding an effective way to fix runtime error 87? Do you think fixing runtime error 87 is to - Knowledge About Avi, Avi Player, Avi Converter On Mac
Knowledge about AVI, AVI player, AVI Converter on MacWhat is an AVI?AVI, an acronym for Audio Video - Buy Your Highly Successful Email Survey Software Today
Email Survey Software- Boost Your Business and Increase ProfitsAn email survey software could be one - Xrm - The Anything Relationship Management Solution
I recently attended the Microsoft Dynamics West Region FY11 Sales Planning Retreat. This year's meet - What Are The Benefits Of Working With Electronic Medical Records
Recording medical information is a vital part of health care services. These records are necessary f - Basic Factor To Make Website Business Oriented
Internet is home for millions of websites. The online business is becoming more and more competitive
Most viewed articles in this category:
- Parental Control Software
Parental control software is software that can help parents protect their children when they are onl - Digital Asset Management Software
Managing and organizing your organization's documents is a critical component to your business's suc - AdobeRGB vs. sRGB
Understanding color spaces I'll try to explain it very simplified, but understandable for everyone - Confessions of a Prankster
I wanted to get a jump on April Fool's Day, partially because of the long, cold winter blues, and pa - Malicious Thoughts About The Spyware Ills Of My PC
Who would think I was capable of such revengeful thoughts about the parties responsible for inflicti - Recover File and Recover Deleted File Tools
Data recovery software is a very effective way of retrieving data from a worn or damaged hard disk d - Life without Windows
Ubuntu, a user-friendly version of Linux, has been running so nicely on my home PC that I decided to - What Benefit Does an Online Software Download Site Offer You?
Are you having a problem that where you find a good softeware when you consider to have a try or wan - Maintaining A Website
There was an era when people were talking about how to create a website using html coding or some ea - Benefits Of Proper Time Tracking
Have you ever written down time when you have started and finished your work? Maybe you have had mul