Beyond Simple Passwords: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
(7 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
{| class="wikitable" style="width: 100%;" | {| class="wikitable" style="width: 100%; background-color: transparent;" | ||
| | | style="width: 50%; vertical-align: top;" | [[File:ACT_BeyondSimplePasswords_Icon.svg|35px|left|link=Beyond_Simple_Passwords]]<big>'''Beyond Simple Passwords'''</big> | ||
| style="width: 50%; vertical-align: top;" | [[File:Rhinos.png|100px|right|link=Enhanced_Protection]] | |||
<strong>Cybersecurity Tools</strong> | |||
{{#categorytree:Passwords|mode=collapsed}} | |||
| [[File:Rhinos.png|100px| | |||
|} | |} | ||
{| class="wikitable" style="width: 100%; background-color: transparent; border: none;" | |||
{| class="wikitable" style="width: 100%;" | ! style="text-align:center; background-color: transparent; border: none;" | [[File:Lock.png|30px|frameless|link=Beyond_Simple_Passwords]] Strong Passwords | ||
! style="text-align:center;" | Strong Passwords | ! style="text-align:center; background-color: transparent; border: none;" | [[File:two_factor.png|45px|frameless|link=Beyond_Simple_Passwords]] Two Factor Authentication | ||
! style="text-align:center;" | Two Factor Authentication | ! style="text-align:center; background-color: transparent; border: none;" | [[File:password_manager.png|60px|frameless|link=Beyond_Simple_Passwords]] Password Managers | ||
! style="text-align:center;" | Password Managers | |||
|- | |- | ||
|<span id="strong_passwords"></span> | | style="vertical-align: top; border: none;" | | ||
<span id="strong_passwords"></span> | |||
* Length: A strong password should be at least 12-16 characters long, increasing resistance to brute-force attacks. | * Length: A strong password should be at least 12-16 characters long, increasing resistance to brute-force attacks. | ||
* Complexity: Strong passwords include uppercase, lowercase, numbers, and special symbols (!, @, #, $, %) for resilience. | * Complexity: Strong passwords include uppercase, lowercase, numbers, and special symbols (!, @, #, $, %) for resilience. | ||
* Unpredictability: Avoid common, easily guessable words or patterns like "123456"; create unique, unrelated passwords. | * Unpredictability: Avoid common, easily guessable words or patterns like "123456"; create unique, unrelated passwords. | ||
* Uniqueness: Use different passwords for each account, preventing a breach in one from affecting others. Password managers help manage | * Uniqueness: Use different passwords for each account, preventing a breach in one from affecting others. Password managers help manage | ||
|<span id="two_factor"></span> | | style="vertical-align: top; border: none;" | | ||
<span id="two_factor"></span> | |||
* Select an Authenticator App: Download a mobile authenticator app like Google Authenticator or Authy. | * Select an Authenticator App: Download a mobile authenticator app like Google Authenticator or Authy. | ||
* Enable 2FA: In your account settings, activate Two-Factor Authentication (2FA) under the "security" section. | * Enable 2FA: In your account settings, activate Two-Factor Authentication (2FA) under the "security" section. | ||
Line 29: | Line 24: | ||
* Save Backup Codes: Keep provided backup codes for account recovery if your device is lost. | * Save Backup Codes: Keep provided backup codes for account recovery if your device is lost. | ||
* Utilize Biometrics: Some services support biometric authentication (e.g., fingerprint or facial recognition) as a second factor. | * Utilize Biometrics: Some services support biometric authentication (e.g., fingerprint or facial recognition) as a second factor. | ||
| <span id="manage_passwords"></span> | | style="vertical-align: top; border: none;" | | ||
<span id="manage_passwords"></span> | |||
* Password Manager: Use trusted password managers to create, store, and autofill complex passwords. They aid in organization and regular password updates. | * Password Manager: Use trusted password managers to create, store, and autofill complex passwords. They aid in organization and regular password updates. | ||
* Regular Password Updates: Change passwords routinely, especially for critical accounts. Establish a schedule and avoid reusing old passwords. | * Regular Password Updates: Change passwords routinely, especially for critical accounts. Establish a schedule and avoid reusing old passwords. | ||
Line 37: | Line 33: | ||
* Stay Informed: Stay updated on current cybersecurity threats and best practices for safeguarding your digital identity. | * Stay Informed: Stay updated on current cybersecurity threats and best practices for safeguarding your digital identity. | ||
|} | |} | ||
Latest revision as of 19:06, 30 October 2023
Beyond Simple Passwords |
Cybersecurity Tools |