1 / 12

Password Protection

Learn how to protect yourself from hackers and identity theft

guest82619
Download Presentation

Password Protection

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Don’t Get Hacked:Why Good Passwords Matter

  2. Hackers are Lurking • Hackers can gain access to your computer in a number of harmful ways • There are hackers who tap into email systems with low security • Ie: Yahoo, ComCast, and AOL email systems are most prone to hacks • Hackers have found means to manipulate areas with free WiFi to gain access to your personal information • There are hacker who take advantage of your unattended computer system. • By simply leaving your computer unattended to take a bathroom break at a coffee shop provides the perfect opportunity for a hacker to quickly download a harmful software onto your computer • And many more! Hackers are always seeking the most creative, unexpected way to steal your personal data

  3. Hacking Happens • Recently, there’s been an upswing of breaches in online security systems. Lots of secure companies can suddenly become victims of a hacking attack • Source: Forbes.com • While companies are working to compensate for the rare instances that their security systems are hacked, sometimes a sincle

  4. Methods of Hacking • There are many means by which software works to hack into your system. It’s important to be aware of these means as you log your personal information into an internet database. • Source: microsoft.com/business

  5. Brute Force • The most time-consuming method. • A program tries every combination of letters, numbers, and keyboard characters to guess your password. • It starts with trying every character, then tries two-character combinations, and so on.

  6. Custom Dictionaries • Custom dictionary software is also worth considering when creating a password • These dictionaries are filled with words and names, but also number and letter combinations, such as 11111 and abc123. • Simple passwords such as "duke" or "ilovemydog" can easily be guessed.

  7. Social Engineering • This involves someone with criminal intent soliciting a password directly from a user. • Many people divulge their passwords to co-workers and strangers without even realizing it; thus, exposing their personal information and leaving their accounts vulnerable to attack

  8. Keeping Your Password Safe

  9. Unique Passwords are KEY • You must have a unique password for every service you use. • If you reuse the same password, and a hacker cracks one account, he or she will be able to access the rest of your accounts. • Source: HowTo.Cnet.com

  10. Eight Characters or More! • Short passwords enhance your risk of getting hacked. The longer the better. • The longer the password, the less likely it is that a custom dictionary will hack into your account! • Source: Thegeekstuff.com

  11. Change Your Password Often! • At the very least, you should change your password every three months! • This is an annoying task, but it’s a sure way to protect your personal information from getting hacked! • Source: Wisegeek.org

  12. Wacky Passwords Work Best • We’re basically suggesting that you mix different character types. • Use some uppercase letters along with lowercase letters, numbers and even special characters such as '&' or '%‘ • Ie: instead of using “hamandcheese” as your password, use “H4m&Ch33s3” • Source: Netsecurity.about.com

More Related