![]() The routine changing of passwords is not recommended, unless the accounts to which they apply have been hacked, in which case they should be changed immediately.Don’t enter your password when others can see what you are typing.If you think that someone else knows your password, change it immediately. Never disclose your passwords to anyone else.When choosing numerical passcodes or PINs, do not use ascending or descending numbers (for example 4321 or 12345), duplicated numbers (such as 1111) or easily recognisable keypad patterns (such as 14789 or 2580).A single commonplace dictionary word, which could be cracked by common hacking programs.Favourite football or F1 team or other words easy to work out with a little background knowledge.Your username, actual name or business name.Pick a phrase known to you, for example ‘Tramps like us, baby we were born to run'” and take the first character from each word to get ‘tlu,bwwbtr’.Someone else’s mother’s maiden name (not your own mother’s maiden name).A line of a song that other people would not associate with you.Also remember that changing letters to numbers (for example E to 3 and i to 1) are techniques well-known to criminals. However, be aware that some of these punctuation marks may be difficult to enter on foreign keyboards. (for example – a variation of spiderman, with letters, numbers, upper and lower case). Choose a password with at least eight characters (more if you can, as longer passwords are harder for criminals to guess or break), a combination of upper and lower case letters, numbers and keyboard symbols such as # $ % ^ & * ( ) _ +.There are alternatives, with no hard and fast rules, but you could consider the following suggestions:.Numbers, symbols and combinations of upper and lower case can be used if you feel you need to create a stronger password, or the account you are creating a password for requires more than just letters. To create a strong password, simply choose three random words.Use a strong, separate password for your email account.Accessing the private information held on your computer.Impersonating you on social networking and dating sites. ![]() Purchasing items online with your money.People impersonating you to commit fraud and other crimes, including:.The risk of using weak passwords and not having a separate password for your email account In some cases you will also be asked to enter only certain characters of your password, for additional security. However, on secure sites they may also be used alongside other methods of identification such as a separate PIN and/or memorable information. Passwords are commonly used in conjunction with your username. Business Continuity & Disaster Recovery. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |