0% found this document useful (0 votes)
15 views1 page

Password Handout 2019-01-30

The document provides guidance on managing passwords and emphasizes the importance of strong passwords for cybersecurity. It introduces key concepts such as authentication methods, two-factor authentication, and the use of password managers. Additionally, it offers practical tips for creating secure passwords and highlights common mistakes to avoid.

Uploaded by

fartman69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views1 page

Password Handout 2019-01-30

The document provides guidance on managing passwords and emphasizes the importance of strong passwords for cybersecurity. It introduces key concepts such as authentication methods, two-factor authentication, and the use of password managers. Additionally, it offers practical tips for creating secure passwords and highlights common mistakes to avoid.

Uploaded by

fartman69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Passwords Cheat Sheet

www.LMGsecurity.com

Do you hate passwords? Have trouble remembering them? You’re not alone! Passwords are both incredibly
important and challenging to manage. Strong passwords are the foundation of cybersecurity, and may be the
difference between a client data breach and just another day at the office.
Good news: there are simple steps you can take to make your passwords strong and stress-free.

Important Terms
Here are a few important terms to understand regarding password and login security:
Authentication - A method for verifying a person's identity. For example, I might tell my computer that I am
“sdavidoff,” and I prove my identity by typing in a password.

There are three different ways that you can verify that you are who you say you are:
• Something you know (for example, a password).
• Something you have (for example, a key).
• Something you are (for example, a fingerprint).

Two-factor Authentication - Verifying a person's identity using two methods combined.

Password managers:
A smart way to remember strong passwords is to not remember them at all! A password manager is secure software
that stores your passwords in an encrypted vault on your computer, or in the cloud.

Video Tutorials
Here are some video tutorials for setting up and using password managers and two-factor authentication:

https://www.LMGsecurity.com/passwords

Tips for Strong Passwords and Login Security


DO:
1. Use Two-Factor Authentication! It’s easy to set up with many providers, such as Office365 and Google.
2. Pick Strong Passwords - Choose a password that is long- at least 14 characters or more. Use a passphrase
(a sentence fragment, song lyrics, etc.) to help you remember it.
3. Use a Password Manager Program to store your passwords securely, so you don’t have to remember them
all. Popular options include LastPass and KeePass.

DON’T

1. DON’T Share Your Password with anyone-- not friends, co-workers, vendors, or even IT staff.
2. DON’T Re-use Important Passwords. Avoid using the same password for multiple different websites or
services. Never re-use personal passwords for work, or vice versa.
3. DON’T Write Your Password Down on Paper, unless it’s secured in a locked location.
4. DON’T Store Passwords in Files on Your Computer, such as Word documents or spreadsheets. Instead,
use a secure password manager.

Questions? www.LMGsecurity.com | info@LMGsecurity.com | Twitter: @LMGsecurity

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy