Cybersecurity for your personal computer: Difference between revisions

Jump to navigation Jump to search
no edit summary
No edit summary
No edit summary
 
Line 43: Line 43:


= Password hygiene habits = <!--T:17-->
= Password hygiene habits = <!--T:17-->
Despite many solutions that protect information and systems, stolen usernames and passwords (credentials) are still the most common way attackers gain unauthorized access.  This is frequently the result of weak, guessable passwords and re-used credentials that have been exposed.
Despite many solutions that protect information and systems, stolen usernames and passwords (credentials) are still the most common way attackers gain unauthorized access.  This is frequently the result of weak, guessable passwords and reused credentials that have been exposed.


<!--T:18-->
<!--T:18-->
Line 63: Line 63:
** Regardless if you choose one that is standalone or integrated into your web browser, open source or commercial product/service, a password manager is essential when it comes to all the other steps below.  
** Regardless if you choose one that is standalone or integrated into your web browser, open source or commercial product/service, a password manager is essential when it comes to all the other steps below.  
* Use a different password for everything: every service, every system;  
* Use a different password for everything: every service, every system;  
** This is quite easy, if you’re using a password manager.  
** This is quite easy if you’re using a password manager.  
* Make it long - 15 characters or longer is a good size;  
* Make it long - 15 characters or longer is a good size;  
** Again, easy with a password manager when you allow it to generate the passwords for you. Using passwords with 20 to 32 characters is not a problem since you don’t need to remember them anyway.  
** Again, easy with a password manager when you allow it to generate the passwords for you. Using passwords with 20 to 32 characters is not a problem since you don’t need to remember them anyway.  
Line 69: Line 69:
** Your credentials belong to you, they identify you. Sharing them not only compromises your identity but is also usually a violation of the policies of the service or system they are used to access.  
** Your credentials belong to you, they identify you. Sharing them not only compromises your identity but is also usually a violation of the policies of the service or system they are used to access.  
* Change them only if there is a reason.   
* Change them only if there is a reason.   
** If you believe the password may have been compromised, may be reused, or is weak, you should change it. There is no good reason to change passwords based on a time schedule, which may still be required by some organizations.
** If you believe the password may have been compromised, may be reused, or is weak, you should change it. There is no good reason to change passwords based on a specific schedule, which may still be required by some organizations.


<!--T:23-->
<!--T:23-->
rsnt_translations
56,430

edits

Navigation menu