Beyond Simple Passwords: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
 
(13 intermediate revisions by 2 users not shown)
Line 1: Line 1:
{| class="wikitable" style="width: 100%;"  
{| class="wikitable" style="width: 100%; background-color: transparent;"
|+
| style="width: 50%; vertical-align: top;" | [[File:ACT_BeyondSimplePasswords_Icon.svg|35px|left|link=Beyond_Simple_Passwords]]<big>'''Beyond Simple Passwords'''</big>
| colspan="2" | [[File:ACT_BeyondSimplePasswords_Icon.svg|100px|left]]  
| style="width: 50%; vertical-align: top;" | [[File:Rhinos.png|100px|right|link=Enhanced_Protection]]
 
<strong>Cybersecurity Tools</strong>
 
{{#categorytree:Passwords|mode=collapsed}}
    <big>'''Beyond Simple Passwords'''</big>
| [[File:Rhinos.png|100px|center|link=Enhanced_Protection]]
|-
| [[File:Lock.png|60px|frame|caption|center|Strong Passwords|link=#strong_passwords]]
| [[File:two_factor.png|90px|frame|caption|center|Two Factor Authentication|link=#two_factor]]
| [[File:password_manager.png|120px|frame|caption|center|Password Managers|link=#manage_passwords]]
|}
|}
 
{| class="wikitable" style="width: 100%; background-color: transparent; border: none;"  
{| class="wikitable" style="width: 100%;"  
! style="text-align:center; background-color: transparent; border: none;" | [[File:Lock.png|30px|frameless|link=Beyond_Simple_Passwords]] Strong Passwords
! style="text-align:center;" | Strong Passwords multiple unique passwords.
! style="text-align:center; background-color: transparent; border: none;" | [[File:two_factor.png|45px|frameless|link=Beyond_Simple_Passwords]] Two Factor Authentication
! style="text-align:center;" | Two Factor Authentication
! style="text-align:center; background-color: transparent; border: none;" | [[File:password_manager.png|60px|frameless|link=Beyond_Simple_Passwords]] Password Managers
! style="text-align:center;" | Password Managers
|-
|-
|<span id="strong_passwords"></span>  
| style="vertical-align: top; border: none;" |
<span id="strong_passwords"></span>
* Length: A strong password should be at least 12-16 characters long, increasing resistance to brute-force attacks.
* Length: A strong password should be at least 12-16 characters long, increasing resistance to brute-force attacks.
* Complexity: Strong passwords include uppercase, lowercase, numbers, and special symbols (!, @, #, $, %) for resilience.
* Complexity: Strong passwords include uppercase, lowercase, numbers, and special symbols (!, @, #, $, %) for resilience.
* Unpredictability: Avoid common, easily guessable words or patterns like "123456"; create unique, unrelated passwords.
* Unpredictability: Avoid common, easily guessable words or patterns like "123456"; create unique, unrelated passwords.
* Uniqueness: Use different passwords for each account, preventing a breach in one from affecting others. Password managers help manage
* Uniqueness: Use different passwords for each account, preventing a breach in one from affecting others. Password managers help manage
|<span id="two_factor"></span>
| style="vertical-align: top; border: none;" |
<span id="two_factor"></span>
* Select an Authenticator App: Download a mobile authenticator app like Google Authenticator or Authy.
* Select an Authenticator App: Download a mobile authenticator app like Google Authenticator or Authy.
* Enable 2FA: In your account settings, activate Two-Factor Authentication (2FA) under the "security" section.
* Enable 2FA: In your account settings, activate Two-Factor Authentication (2FA) under the "security" section.
Line 29: Line 24:
* Save Backup Codes: Keep provided backup codes for account recovery if your device is lost.
* Save Backup Codes: Keep provided backup codes for account recovery if your device is lost.
* Utilize Biometrics: Some services support biometric authentication (e.g., fingerprint or facial recognition) as a second factor.
* Utilize Biometrics: Some services support biometric authentication (e.g., fingerprint or facial recognition) as a second factor.
| <span id="manage_passwords"></span>
| style="vertical-align: top; border: none;" |
<span id="manage_passwords"></span>
* Password Manager: Use trusted password managers to create, store, and autofill complex passwords. They aid in organization and regular password updates.
* Password Manager: Use trusted password managers to create, store, and autofill complex passwords. They aid in organization and regular password updates.
* Regular Password Updates: Change passwords routinely, especially for critical accounts. Establish a schedule and avoid reusing old passwords.
* Regular Password Updates: Change passwords routinely, especially for critical accounts. Establish a schedule and avoid reusing old passwords.
Line 37: Line 33:
* Stay Informed: Stay updated on current cybersecurity threats and best practices for safeguarding your digital identity.
* Stay Informed: Stay updated on current cybersecurity threats and best practices for safeguarding your digital identity.
|}
|}
By adhering to these guidelines, individuals can significantly reduce the risk of unauthorized access to their accounts and personal information, contributing to a safer online experience. Remember that cybersecurity is an ongoing process, and proactive measures are essential to stay protected.

Latest revision as of 19:06, 30 October 2023

ACT BeyondSimplePasswords Icon.svg
Beyond Simple Passwords
Rhinos.png

Cybersecurity Tools

Lock.png Strong Passwords Two factor.png Two Factor Authentication Password manager.png Password Managers

  • Length: A strong password should be at least 12-16 characters long, increasing resistance to brute-force attacks.
  • Complexity: Strong passwords include uppercase, lowercase, numbers, and special symbols (!, @, #, $, %) for resilience.
  • Unpredictability: Avoid common, easily guessable words or patterns like "123456"; create unique, unrelated passwords.
  • Uniqueness: Use different passwords for each account, preventing a breach in one from affecting others. Password managers help manage

  • Select an Authenticator App: Download a mobile authenticator app like Google Authenticator or Authy.
  • Enable 2FA: In your account settings, activate Two-Factor Authentication (2FA) under the "security" section.
  • Scan QR Code: Open the app and scan the account's QR code to link it.
  • Enter Verification Code: Input the app-generated code in the account's verification field.
  • Save Backup Codes: Keep provided backup codes for account recovery if your device is lost.
  • Utilize Biometrics: Some services support biometric authentication (e.g., fingerprint or facial recognition) as a second factor.

  • Password Manager: Use trusted password managers to create, store, and autofill complex passwords. They aid in organization and regular password updates.
  • Regular Password Updates: Change passwords routinely, especially for critical accounts. Establish a schedule and avoid reusing old passwords.
  • Secure Storage: Keep sensitive information safe. Avoid writing down passwords or sharing them via insecure channels like email or messaging apps.
  • Security Questions: Be cautious with security questions; answers can be easily guessed. Consider unique, personal answers only you understand.
  • Beware of Phishing: Stay vigilant against phishing attempts. Always verify the authenticity of websites and emails before entering login details.
  • Stay Informed: Stay updated on current cybersecurity threats and best practices for safeguarding your digital identity.