0% found this document useful (0 votes)
85 views5 pages

Cyber-Security Awareness News Letter Read

A password protects computer systems and files by only allowing authorized users to access them. An ideal password is difficult for others to guess but easy for the authorized user to remember. Strong passwords are at least 12 characters long, include a combination of uppercase letters, lowercase letters, numbers, and symbols, and are unique and different from previous passwords. Users should avoid sharing passwords with others, writing passwords down in insecure locations, or reusing the same password across multiple accounts. Creating robust passwords that even supercomputers would find difficult to crack in a short time is important for security.

Uploaded by

tanaka gwitira
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views5 pages

Cyber-Security Awareness News Letter Read

A password protects computer systems and files by only allowing authorized users to access them. An ideal password is difficult for others to guess but easy for the authorized user to remember. Strong passwords are at least 12 characters long, include a combination of uppercase letters, lowercase letters, numbers, and symbols, and are unique and different from previous passwords. Users should avoid sharing passwords with others, writing passwords down in insecure locations, or reusing the same password across multiple accounts. Creating robust passwords that even supercomputers would find difficult to crack in a short time is important for security.

Uploaded by

tanaka gwitira
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Cyber-Security Awareness

news letter
#THINK_BEFORE_YOU_CLICK

Afdis
IT Department
WHAT IS A PASSWORD AND
WHY DO WE NEED IT?
A password is secret series of characters that enables a user to access
a file, computer, or program. On multi-user systems, each user must
enter his or her password before the computer will respond to
commands. The password helps ensure that unauthorized users do
not access the computer. In addition, data files and programs may
require a password.

Ideally, the password should be something that nobody could guess.


In practice, most people choose a password that is easy to remember,
such as their name, their initials or simple words. These are “weak”
passwords. This is one reason it is relatively easy to break into most
computer systems.
Strong Passwords
What makes up a Password security starts with creating a strong password. A strong password is:

Strong password ?  at least 12 characters long but 14 or more is better.


 a combination of uppercase letters, lowercase letters, numbers, and symbols (also
known as special characters).
 not a word that can be found in a dictionary or the name of a person, character,
product, or organization.
 significantly different from your previous passwords.
Afdis Acceptable use policy and Information  easy for you to remember but difficult for others to guess. Consider using a
Security policy outlines how we enforce and memorable phrase like "6MonkeysRLooking^".
use strong Passwords Some Tips
**You can and should use the ‘Space’ character in your passwords**
• Minimum password length is 12 characters
• It must contain at least 3 types of characters: **Take advantage of your other languages while still avoiding
• Caps, smalls, numbers, special- common dictionary word
characters *If you want to create a password that is inline with your department
• Our systems will not allow you to use any of
/ what you do, you can decide on complicating it and making it long with mixed
the last 12 passwords that you previously
used (SAP, Windows login etc) characters… EG
C0n7igu@+10n@aFd1$
Secure your passwords
Passwords are only kept safe if we:
• Don’t share a password with anyone. Not even a friend
or family member.
• Never send a password by email, instant message, or
any other means of communication that is not reliably
secure.
• Use a unique password for each website. If crooks steal
your account information from one site, they'll try to use
those credentials on hundreds of other well-known
websites, such as banking, social media, or online
shopping, hoping you've reused the password
elsewhere. That's called a "Credential stuffing attack"
and it's extremely common.
• If you don’t want to memorize multiple passwords,
consider using a password manager. The best password
managers will automatically update stored passwords,
keep them encrypted, and require multi-factor
authentication for access. Microsoft Edge can remember
your passwords for you and automatically fill them in
for you when needed. See 
Save or forget passwords in Microsoft Edge.
• It's ok to write your passwords down, as long as you
keep them secure. Don't write them on sticky notes or
cards that you keep near the thing computer that the
password protects, even if you think they're well-
hidden.
• Use Applications like Bit warden , Vault , My Password
Manager to store and encrypt passwords.
DID YOU KNOW It takes 5 Seconds for a super computer to break a
password with 10 numbers…1736429060
How complex should your password
be ?

• Imagine if !?
It takes 152 000 Years to break a password with 16
• A hacker cracks your laptop password and opens Characters – 1 Upper case, 1 special character , at
chrome so that he can view your recent page least 1 number.. Ch1y3dz@m-#1738!!
history and “ Password Manager” section where
Microsoft Edge , Chrome and Opera Auto save
our Passwords and your last activity was opening
your Online Banking Portal ?
Most people think an 8 letter character password is
Conclusion : It all begins with creating a very robust more secure!. But it only takes 3
password to which even a super computer with a big
processing unit finds difficult cracking within a short
period of time

You might also like