Cyber Security: Best Practices for Creating Passwords

Tuesday, March 30, 2021

A Message from Patrick Criss, Director, Information Security Operations

The most important first step to your online security is to have strong passwords, but the challenge is to create distinct passwords that you can actually remember or else you may fall into the bad habit of using the same login credentials for multiple accounts.

The longer the password, the harder it is to crack. Using two-factor or multi-factor authentication (MFA) with a strong password is a good practice. MFA is a security system that verifies a user’s identity with a second credential beyond a user’s password.

Additionally, we recommend using a password manager that you may download to personal devices to securely save, remember and auto-fill your passwords.

The links below provide some tips for creating strong passwords and a review of password manager applications.

If your department is interested in obtaining a password manager for your team, contact the Office of Information Technology help desk to learn about the available options. Submit a request for the OIT help desk online, via email or by phone at 407-299-5000, extension 5555.

Leave a Reply

Your email address will not be published.

Related Posts

    Fraud Alert: Students Receiving Fraudulent Emails From...

    Monday, April 26, 2021 A Message from Patrick Criss, Director, Information Security Operations The Office of Information Technology (OIT) has been made aware that some college students are receiving fraudulent emails from people impersonating employees of the United Nations International Children’s Emergency Fund (UNICEF). In these emails, students are being asked for personal information, including […]

    Learn to Protect Yourself From Phishing Attacks

    Monday, April 26, 2021 A Message from Patrick Criss, Director, Information Security Operations Email phishing attacks and similar methods that use text messaging and other communication technologies usually attempt to trick users into divulging sensitive, personal, professional or financial information, or to click on links that contain malware. Many phishing attacks take a “quantity over […]