Beyond Simple Passwords: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
Tag: Reverted
Line 10: Line 10:
| [[File:two_factor.png|90px|frame|caption|center|Two Factor Authentication|link=#two_factor]]
| [[File:two_factor.png|90px|frame|caption|center|Two Factor Authentication|link=#two_factor]]
| [[File:password_manager.png|120px|frame|caption|center|Password Managers|link=#manage_passwords]]
| [[File:password_manager.png|120px|frame|caption|center|Password Managers|link=#manage_passwords]]
|}


{| class="wikitable" style="width: 100%;"
! style="text-align:center;" | Strong Passwords multiple unique passwords.
! style="text-align:center;" | Strong Passwords multiple unique passwords.
! style="text-align:center;" | Two Factor Authentication
! style="text-align:center;" | Two Factor Authentication

Revision as of 11:13, 16 October 2023

ACT BeyondSimplePasswords Icon.svg


    Beyond Simple Passwords
Rhinos.png
Strong Passwords
Two Factor Authentication
Password Managers
Strong Passwords multiple unique passwords. Two Factor Authentication Password Managers
  • Length: A strong password should be at least 12-16 characters long, increasing resistance to brute-force attacks.
  • Complexity: Strong passwords include uppercase, lowercase, numbers, and special symbols (!, @, #, $, %) for resilience.
  • Unpredictability: Avoid common, easily guessable words or patterns like "123456"; create unique, unrelated passwords.
  • Uniqueness: Use different passwords for each account, preventing a breach in one from affecting others. Password managers help manage
  • Select an Authenticator App: Download a mobile authenticator app like Google Authenticator or Authy.
  • Enable 2FA: In your account settings, activate Two-Factor Authentication (2FA) under the "security" section.
  • Scan QR Code: Open the app and scan the account's QR code to link it.
  • Enter Verification Code: Input the app-generated code in the account's verification field.
  • Save Backup Codes: Keep provided backup codes for account recovery if your device is lost.
  • Utilize Biometrics: Some services support biometric authentication (e.g., fingerprint or facial recognition) as a second factor.
  • Password Manager: Use trusted password managers to create, store, and autofill complex passwords. They aid in organization and regular password updates.
  • Regular Password Updates: Change passwords routinely, especially for critical accounts. Establish a schedule and avoid reusing old passwords.
  • Secure Storage: Keep sensitive information safe. Avoid writing down passwords or sharing them via insecure channels like email or messaging apps.
  • Security Questions: Be cautious with security questions; answers can be easily guessed. Consider unique, personal answers only you understand.
  • Beware of Phishing: Stay vigilant against phishing attempts. Always verify the authenticity of websites and emails before entering login details.
  • Stay Informed: Stay updated on current cybersecurity threats and best practices for safeguarding your digital identity.


By adhering to these guidelines, individuals can significantly reduce the risk of unauthorized access to their accounts and personal information, contributing to a safer online experience. Remember that cybersecurity is an ongoing process, and proactive measures are essential to stay protected.