Cybersecurity: Personal computer health check: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 30: | Line 30: | ||
- I create unique passwords for accessing Internet services and record them in a text file, sticky notes, etc. | - I create unique passwords for accessing Internet services and record them in a text file, sticky notes, etc. | ||
||It’s generally not a good idea to record passwords in a text file or sticky notes as others may be able to read your passwords. If you really need to drop something down for memorizing your passwords, try writing password hints that only make sense to yourself. | ||It’s generally not a good idea to record passwords in a text file or sticky notes as others may be able to read your passwords. If you really need to drop something down for memorizing your passwords, try writing password hints that only make sense to yourself. | ||
- I create unique passphrases for accessing Internet services. | |||
||Good job! Passphrases have a good length and make it difficult to break. | ||Good job! Passphrases have a good length and make it difficult to break. | ||
+ I use a reputable password manager to create, store and change my passwords regularly. | + I use a reputable password manager to create, store and change my passwords regularly. |
Revision as of 13:06, 4 October 2022
Health Check
The following questions are designed to assess the cybersecurity posture of your computer. Let’s answer the questions to check whether your computer is secured.