73% of users have the same password for multiple sites, 33% use the same password every time! Every extra character in your password increases the difficulty for hackers to crack it!Multi-factor authentication adds an extra layer of security that is difficult for hackers to crack!Secure passwords are part of HIPAA privacy compliance! |
|
|
What can happen to my password if it is stolen? Once an attack has happened and the criminal has your data, he or she likely runs through the following steps, which we like to call, “A Hacker’s Post Breach Checklist:”The hacker will: | ||
|
||
|
||
|
||
|
||
|
||
How to Create Strong Passwords | ||
Why are strong passwords needed? | ||
Good computer security includes the use of strong passwords for all your accounts. Passwords can be the weakest link in a computer security scheme. Strong passwords are important because password cracking tools continue to improve and the computers used to crack passwords are more powerful. Network passwords that once took weeks to break can now be broken in hours. | ||
Password cracking software uses one of three approaches: intelligent guessing, dictionary attacks, and automation that tries every possible combination of characters. Given enough time, the automated method can crack any password. However, it still can take months to crack a strong password. | ||
For a password to be strong and hard to break, it should: Contain 6 or more characters Contain characters from each of the following three groups: Letters (uppercase and lowercase) A, B, C,...; a, b, c,... Numerals 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 Symbols (all characters not defined as letters or numerals) ` ~ ! @ # $ % ^ & * ( ) _ + - = { } | [ ] \ : " ; ' < > ? , . / Have at least one symbol character in the second through sixth positions. Be significantly different from prior passwords. |
||
Try to change your password(s) every 6 months. | ||
When typing in your password, make sure no one is watching you type. Ask anyone around you to kindly look away. | ||
Mark Laliberte - WatchGuard’s own Information Security Threat Analyst says: “Hackers will often start by selling data on military or government accounts,”People are also bad at choosing passwords for individual services and often reuse passwords, which lets hackers try those passwords on the other websites their victims use.” |
||
Password reuse, like what Marc is describing above, can create opportunities for more breaches. For example, Dropbox was breached in 2012 because a Dropbox employee’s Expedia password was stolen in a separate data breach and they reused that password for their work account. |
||
A strong password policy doesn’t need to be the only line of defense to your systems and network. Adding multi-factor authentication creates multiple layers of security to protect users and resources. |
||
What can you do to protect yourself? |
||
Good passwords are critical to information security. Lack of thought in creating password policies increases the chances of unauthorized access or compromised data. The SANS institute recommends that strong password policy include the following characteristics: |
||
|
||
The easiest solution - use a password safe |
||
Password safes save your passwords securely, allowing you to save the information on your personal computer without opening yourself up to giving away private information advertently. They can also generate random passwords for each of your accounts. These password safes store all of your passwords in a single account, which has a master password you need to remember. This allows you to use truly random combinations in all of your other passwords, making them much harder for malicious users or bots to crack. Two examples of such services are: LastPass and Password Gorilla. |
||
Change your Passwords Regularly! | ||
The RIT Password Standard requires passwords to be changed annually. . In addition, passwords should be changed:
Whenever a malicious program such as a virus is detected or a machine is compromised insome way.
If there is a job change (job is completed, job is terminated, or a job transfer changes the need for access).
From any default passwords.If they are shared with anyone other than the authorized user(s)
|
||
Don't Use your username or any part thereof: | ||
These are the don'ts! | ||
Name(s) of yourself, family, friends, pets, or co-workers Computer terms and names, commands, sites, companies, hardware, or software Birthdays or other personal information such as addresses or phone numbers A set of characters in alphabetic or numeric order (ex. abcdef), in a row on a keyboard (ex. qwerty), or a simple pattern (ex. 123123) Words that can be found in a dictionary Your UCLA ID number, a bank account PIN, credit card number, etc. Any of the above spelled backwards Any of the above preceded or followed by a digit (ex. qwerty1, 1qwerty) |
||
DON’T Reuse passwords. If you do, a hacker who gets just one of your accounts will own them all. (Some systems will not let you reuse passwords.) | ||
DON’T Use a dictionary word as your password. If you must, then string several together into a pass phrase. | ||
DON’T Use standard number substitutions. Think “P455w0rd” is a good password? N0p3! Cracking tools now have those built in. | ||
DON’T Use a short password—no matter how weird. Today’s processing speeds mean that even passwords like “h6!r$q” are quickly crackable. Your best defense is the longest possible password. | ||