Beyond Simple Passwords: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
 
(111 intermediate revisions by 2 users not shown)
Line 1: Line 1:
= List of Websites about Creating Strong Passwords =
{| class="wikitable" style="width: 100%; background-color: transparent;"
 
| style="width: 50%; vertical-align: top;" | [[File:ACT_BeyondSimplePasswords_Icon.svg|35px|left|link=Beyond_Simple_Passwords]]<big>'''Beyond Simple Passwords'''</big>
This is a curated list of websites that provide valuable information and guidelines on how to create strong and secure passwords. Protecting your online accounts with strong passwords is crucial for maintaining digital security and privacy.
| style="width: 50%; vertical-align: top;" | [[File:Rhinos.png|100px|right|link=Enhanced_Protection]]
 
<strong>Cybersecurity Tools</strong>
== 1. StaySafeOnline - Creating a Strong Password ==
{{#categorytree:Passwords|mode=collapsed}}
StaySafeOnline offers comprehensive guidance on creating '''strong passwords''' to safeguard your online presence. (https://staysafeonline.org/stay-safe-online/identity-theft-fraud-cybercrime/creating-a-strong-password/)
|}
 
{| class="wikitable" style="width: 100%; background-color: transparent; border: none;"
== 2. Norton - Tips for Creating Strong Passwords ==
! style="text-align:center; background-color: transparent; border: none;" | [[File:Lock.png|30px|frameless|link=Beyond_Simple_Passwords]] Strong Passwords
'''Norton''' provides valuable tips and insights into crafting strong passwords to enhance your cybersecurity. (https://www.nortonlifelock.com/cybersecurity/center/tips-for-creating-passwords.html)
! style="text-align:center; background-color: transparent; border: none;" | [[File:two_factor.png|45px|frameless|link=Beyond_Simple_Passwords]] Two Factor Authentication
 
! style="text-align:center; background-color: transparent; border: none;" | [[File:password_manager.png|60px|frameless|link=Beyond_Simple_Passwords]] Password Managers
== 3. Wired - How to Create a Strong Password (and Remember It) ==
|-
'''Wired''' offers practical advice on creating robust passwords and techniques to remember them securely. (https://www.wired.com/story/how-to-create-strong-password/)
| style="vertical-align: top; border: none;" |
 
<span id="strong_passwords"></span>
== 4. PCMag - How to Create a Strong Password ==
* Length: A strong password should be at least 12-16 characters long, increasing resistance to brute-force attacks.
'''PCMag''' presents a step-by-step guide on crafting strong passwords to protect your digital assets. (https://www.pcmag.com/how-to/how-to-create-a-strong-password)
* Complexity: Strong passwords include uppercase, lowercase, numbers, and special symbols (!, @, #, $, %) for resilience.
 
* Unpredictability: Avoid common, easily guessable words or patterns like "123456"; create unique, unrelated passwords.
== 5. Cybersecurity & Infrastructure Security Agency (CISA) - Creating a Password Tip Card ==
* Uniqueness: Use different passwords for each account, preventing a breach in one from affecting others. Password managers help manage
'''CISA''' provides a downloadable tip card with essential information on creating strong and secure passwords. (https://www.cisa.gov/sites/default/files/publications/CISA_MS-ISAC_Password-Tip-Card_508.pdf)
| style="vertical-align: top; border: none;" |
 
<span id="two_factor"></span>
== 6. Lifehacker - How to Create a Strong Password ==
* Select an Authenticator App: Download a mobile authenticator app like Google Authenticator or Authy.
'''Lifehacker''' offers practical tips and strategies for generating strong passwords. (https://lifehacker.com/how-to-create-a-strong-password-1797681064)
* Enable 2FA: In your account settings, activate Two-Factor Authentication (2FA) under the "security" section.
 
* Scan QR Code: Open the app and scan the account's QR code to link it.
== 7. Kaspersky - How to Create Strong Passwords ==
* Enter Verification Code: Input the app-generated code in the account's verification field.
'''Kaspersky''' provides insights into the importance of strong passwords and tips for creating them. (https://www.kaspersky.com/resource-center/threats/how-to-create-a-strong-password)
* Save Backup Codes: Keep provided backup codes for account recovery if your device is lost.
 
* Utilize Biometrics: Some services support biometric authentication (e.g., fingerprint or facial recognition) as a second factor.
== 8. LastPass - How to Create a Strong Password ==
| style="vertical-align: top; border: none;" |
'''LastPass''' offers a password generator tool to help users create strong and unique passwords. (https://www.lastpass.com/password-generator)
<span id="manage_passwords"></span>
 
* Password Manager: Use trusted password managers to create, store, and autofill complex passwords. They aid in organization and regular password updates.
== 9. Microsoft - Create a Strong Password ==
* Regular Password Updates: Change passwords routinely, especially for critical accounts. Establish a schedule and avoid reusing old passwords.
'''Microsoft''' offers guidance on creating strong passwords for their accounts. (https://support.microsoft.com/en-us/help/4026923/microsoft-account-create-a-strong-password)
* Secure Storage: Keep sensitive information safe. Avoid writing down passwords or sharing them via insecure channels like email or messaging apps.
 
* Security Questions: Be cautious with security questions; answers can be easily guessed. Consider unique, personal answers only you understand.
== 10. Cybersecurity & Infrastructure Security Agency (CISA) - Tips for Strong, Secure Passwords ==
* Beware of Phishing: Stay vigilant against phishing attempts. Always verify the authenticity of websites and emails before entering login details.
'''CISA''' provides additional tips and recommendations for maintaining strong and secure passwords. (https://www.cisa.gov/tips-for-strong-secure-passwords)
* Stay Informed: Stay updated on current cybersecurity threats and best practices for safeguarding your digital identity.
 
|}
= List of Websites about Two-Factor Authentication (2FA) =
 
This is a curated list of websites that provide information and guidance on implementing two-factor authentication (2FA) for added online security.
 
== 1. Duo - What is Two-Factor Authentication (2FA)? ==
'''Duo''' explains the concept of 2FA and how it enhances your online security. (https://duo.com/learn/what-is-two-factor-authentication-2fa)
 
== 2. Google - Set up 2-Step Verification ==
'''Google''' offers a comprehensive guide on setting up 2-Step Verification to protect your Google account. (https://support.google.com/accounts/answer/185839?hl=en)
 
== 3. Authy - What is Two-Factor Authentication (2FA)? ==
'''Authy''' provides an overview of 2FA and why it's essential for securing your accounts. (https://authy.com/what-is-2fa/)
 
== 4. LastPass - Two-Factor Authentication (2FA) Guide ==
'''LastPass''' explains how to enable 2FA for your LastPass account, adding an extra layer of security. (https://www.lastpass.com/how-lastpass-works/multifactor-authentication)
 
== 5. Microsoft - Two-Step Verification ==
'''Microsoft''' walks you through the process of setting up two-step verification for your Microsoft account. (https://support.microsoft.com/en-us/help/12408/microsoft-account-about-two-step-verification)
 
== 6. Auth0 - Two-Factor Authentication (2FA) Explained ==
'''Auth0''' provides insights into the benefits and implementation of 2FA for application security. (https://auth0.com/docs/mfa)
 
== 7. Okta - What is Two-Factor Authentication (2FA)? ==
'''Okta''' explains the fundamentals of 2FA and its role in securing access to applications. (https://www.okta.com/identity-101/two-factor-authentication/)
 
== 8. Twilio - Two-Factor Authentication (2FA) Guide ==
'''Twilio''' offers a guide on implementing 2FA in your applications using their platform. (https://www.twilio.com/docs/verify/quickstarts/two-factor-authentication)
 
== 9. Duo - Two-Factor Authentication (2FA) Best Practices ==
'''Duo''' outlines best practices for deploying 2FA effectively in your organization. (https://duo.com/learn/two-factor-authentication-best-practices)
 
== 10. Yubico - Two-Factor Authentication (2FA) with YubiKey ==
'''Yubico''' explains how to use YubiKey for strong 2FA protection across various services. (https://www.yubico.com/solutions/two-factor-authentication/)
 
= List of Password Manager Websites =
 
This is a curated list of websites that offer password management services to help you securely store and manage your passwords.
 
== 1. LastPass ==
'''LastPass''' provides a comprehensive password management solution with secure storage and automatic password filling. (https://www.lastpass.com/)
 
== 2. Dashlane ==
'''Dashlane''' offers a user-friendly password manager with features like password generation and secure storage. (https://www.dashlane.com/)
 
== 3. 1Password ==
'''1Password''' is a trusted password manager that keeps your credentials safe and accessible. (https://1password.com/)
 
== 4. Bitwarden ==
'''Bitwarden''' is an open-source password manager with robust security features and cross-platform compatibility. (https://bitwarden.com/)
 
== 5. Keeper Security ==
'''Keeper Security''' provides secure password storage and protection for individuals and businesses. (https://www.keepersecurity.com/)
 
== 6. NordPass ==
'''NordPass''' offers secure password management with the added benefit of integration with NordVPN. (https://nordpass.com/)
 
== 7. RoboForm ==
'''RoboForm''' is a password manager that simplifies online login and form filling. (https://www.roboform.com/)
 
== 8. Sticky Password ==
'''Sticky Password''' offers strong password management with biometric authentication options. (https://www.stickypassword.com/)
 
== 9. Zoho Vault ==
'''Zoho Vault''' provides secure password storage and access management for businesses. (https://www.zoho.com/vault/)
 
== 10. Bitwarden Password Manager (Open Source) ==
'''Bitwarden (Open Source)''' is the open-source version of Bitwarden, offering self-hosting options. (https://bitwarden.com/open-source/)
 
These password manager websites can help you securely store, organize, and access your passwords, enhancing your overall online security.

Latest revision as of 19:06, 30 October 2023

ACT BeyondSimplePasswords Icon.svg
Beyond Simple Passwords
Rhinos.png

Cybersecurity Tools

Lock.png Strong Passwords Two factor.png Two Factor Authentication Password manager.png Password Managers

  • Length: A strong password should be at least 12-16 characters long, increasing resistance to brute-force attacks.
  • Complexity: Strong passwords include uppercase, lowercase, numbers, and special symbols (!, @, #, $, %) for resilience.
  • Unpredictability: Avoid common, easily guessable words or patterns like "123456"; create unique, unrelated passwords.
  • Uniqueness: Use different passwords for each account, preventing a breach in one from affecting others. Password managers help manage

  • Select an Authenticator App: Download a mobile authenticator app like Google Authenticator or Authy.
  • Enable 2FA: In your account settings, activate Two-Factor Authentication (2FA) under the "security" section.
  • Scan QR Code: Open the app and scan the account's QR code to link it.
  • Enter Verification Code: Input the app-generated code in the account's verification field.
  • Save Backup Codes: Keep provided backup codes for account recovery if your device is lost.
  • Utilize Biometrics: Some services support biometric authentication (e.g., fingerprint or facial recognition) as a second factor.

  • Password Manager: Use trusted password managers to create, store, and autofill complex passwords. They aid in organization and regular password updates.
  • Regular Password Updates: Change passwords routinely, especially for critical accounts. Establish a schedule and avoid reusing old passwords.
  • Secure Storage: Keep sensitive information safe. Avoid writing down passwords or sharing them via insecure channels like email or messaging apps.
  • Security Questions: Be cautious with security questions; answers can be easily guessed. Consider unique, personal answers only you understand.
  • Beware of Phishing: Stay vigilant against phishing attempts. Always verify the authenticity of websites and emails before entering login details.
  • Stay Informed: Stay updated on current cybersecurity threats and best practices for safeguarding your digital identity.