尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
YOUR BIRTHDAY
LOCK THEM OUT
datahops.com
CYBER SECURITY AWARENESS
IS NOT
A PASSWORD
Passphrase
3 random words add
Numbers, letters,
special characters
and jumble them up
MFA
Multi Factor Authentication
Secure login with:
What you have
What you know
Who you are
Password managers
They store your
passwords securely
and can generate new
and unique ones for you
Login Securely
Cybersecurity awareness training datahops.com
MFA
What you have
Multi Factor Authentication
An added layer of protection
What you know
Who you are
Password
Use IT
Cybersecurity awareness training datahops.com
Secure your information
Choose a password that cannot be guessed.
Choose a password you can remember.
Choose different passwords for different services
Choose complex passwords you can remember
Cybersecurity awareness training datahops.com
Password Healthcheck!.
Don’t share passwords
Don’t reuse passwords
Don’t write them down
Don’t use common words
Don’t make them easy
Cybersecurity awareness training datahops.com
Protect your information.
Never reuse passwords!
Each login should be unique
Use 2-factor authentication
for added security
Don’t share passwords
with other people
Don’t leave passwords
written down
passwords must be strong
$3&!GbR@-njRUTdfd12_
Cybersecurity awareness training datahops.com
USE STRONG PASSWORDS
Protect your information!
Cybersecurity awareness training datahops.com
Downloading……
Lock them out!
ACCESS DENIED
Keep security in mind!
● Use a password manager to store strong unique
passwords for all of your accounts.
● They can also generate new strong passwords for
you
● They can enter your credentials automatically
Safe
Storage
Password Manager
Cybersecurity awareness training datahops.com
GOOD
PASSWORDS
MUST BE:
Cybersecurity awareness training datahops.com
Y0um^$M@k3Y0*r?aSsw0%D$$t&0nG
STRONG
UNIQUE
COMPLEX
USE STRONG PASSWORDS
Protect your information!
Cybersecurity awareness training datahops.com
Downloading……
Don’t let them get away with IT
MAKE YOUR PASSWORDS
STRONG
M@k3Y0*r?aSsw0%D$$t&0nG
● 12 or more characters
● Letters , Numbers,Characters
Protect yourself and your Information
Cybersecurity awareness training datahops.com
Use a separate password for your work
account in case it gets compromised!
Use
STRONG Passwords
Cybersecurity awareness training datahops.com

More Related Content

Similar to A4 Cyber Security Awareness Posters-Password Security part 4

Securing password
Securing passwordSecuring password
Securing password
splendorcollege
 
FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptx
LaurieAnnFrazier
 
World Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfWorld Password Management Day, 2023.pdf
World Password Management Day, 2023.pdf
Chinatu Uzuegbu
 
Safety And Security Of Data 1
Safety And Security Of Data 1Safety And Security Of Data 1
Safety And Security Of Data 1
Wynthorpe
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
Thycotic
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - Passwords
Barry Caplin
 
Network Security
Network SecurityNetwork Security
Network Security
SOBXTECH
 
The strategies of password
The strategies of passwordThe strategies of password
The strategies of password
MohammedAlhamoodi
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
STO STRATEGY
 
Cyber Security for Everybody
Cyber Security for EverybodyCyber Security for Everybody
Cyber Security for Everybody
avahe
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
Wizer - Cyber Security Awareness
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
Host It Smart
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
Rare Input
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
AljunMisa
 
Six steps to protect your password from hackers
Six steps to protect your password from hackersSix steps to protect your password from hackers
Six steps to protect your password from hackers
niraj joshi
 
5 Major Cyber Security Tips - Secure Tech (2).pdf
5 Major Cyber Security Tips - Secure Tech (2).pdf5 Major Cyber Security Tips - Secure Tech (2).pdf
5 Major Cyber Security Tips - Secure Tech (2).pdf
Secure Tech
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
- Mark - Fullbright
 
Password Management
Password ManagementPassword Management
Password Management
Davon Smart
 
Personal cyber security tips remote work
Personal cyber security tips remote workPersonal cyber security tips remote work
Personal cyber security tips remote work
Chinmayee Behera
 

Similar to A4 Cyber Security Awareness Posters-Password Security part 4 (20)

Securing password
Securing passwordSecuring password
Securing password
 
FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptx
 
World Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfWorld Password Management Day, 2023.pdf
World Password Management Day, 2023.pdf
 
Safety And Security Of Data 1
Safety And Security Of Data 1Safety And Security Of Data 1
Safety And Security Of Data 1
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - Passwords
 
Network Security
Network SecurityNetwork Security
Network Security
 
The strategies of password
The strategies of passwordThe strategies of password
The strategies of password
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
Cyber Security for Everybody
Cyber Security for EverybodyCyber Security for Everybody
Cyber Security for Everybody
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
 
Improving Password Based Security
Improving Password Based SecurityImproving Password Based Security
Improving Password Based Security
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
Six steps to protect your password from hackers
Six steps to protect your password from hackersSix steps to protect your password from hackers
Six steps to protect your password from hackers
 
5 Major Cyber Security Tips - Secure Tech (2).pdf
5 Major Cyber Security Tips - Secure Tech (2).pdf5 Major Cyber Security Tips - Secure Tech (2).pdf
5 Major Cyber Security Tips - Secure Tech (2).pdf
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
Password Management
Password ManagementPassword Management
Password Management
 
Personal cyber security tips remote work
Personal cyber security tips remote workPersonal cyber security tips remote work
Personal cyber security tips remote work
 

More from Data Hops

FREE A4 Cyber Security Awareness Posters-Phishing part 1
FREE A4 Cyber Security Awareness Posters-Phishing part 1FREE A4 Cyber Security Awareness Posters-Phishing part 1
FREE A4 Cyber Security Awareness Posters-Phishing part 1
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Phishing part 2
FREE A4 Cyber Security Awareness  Posters-Phishing part 2FREE A4 Cyber Security Awareness  Posters-Phishing part 2
FREE A4 Cyber Security Awareness Posters-Phishing part 2
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
FREE Cyber Security Awareness Posters-Social Engineering part 2
FREE Cyber Security Awareness  Posters-Social Engineering part 2FREE Cyber Security Awareness  Posters-Social Engineering part 2
FREE Cyber Security Awareness Posters-Social Engineering part 2
Data Hops
 
Free A4 Cyber Security Awareness Posters-Social Engineering part 1
Free A4 Cyber Security Awareness Posters-Social Engineering part 1Free A4 Cyber Security Awareness Posters-Social Engineering part 1
Free A4 Cyber Security Awareness Posters-Social Engineering part 1
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Password Security part 3
FREE A4 Cyber Security Awareness Posters-Password Security part 3FREE A4 Cyber Security Awareness Posters-Password Security part 3
FREE A4 Cyber Security Awareness Posters-Password Security part 3
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Password Security part 2
FREE A4 Cyber Security Awareness Posters-Password Security part 2FREE A4 Cyber Security Awareness Posters-Password Security part 2
FREE A4 Cyber Security Awareness Posters-Password Security part 2
Data Hops
 
FREE A4 Data Security GDPR Posters-Data Protection part 5
FREE A4 Data Security GDPR Posters-Data Protection part 5FREE A4 Data Security GDPR Posters-Data Protection part 5
FREE A4 Data Security GDPR Posters-Data Protection part 5
Data Hops
 
FREE A4 Data Security GDPR Posters-Data Protection part 4
FREE A4 Data Security GDPR Posters-Data Protection part 4FREE A4 Data Security GDPR Posters-Data Protection part 4
FREE A4 Data Security GDPR Posters-Data Protection part 4
Data Hops
 
FREE A4 Data Security GDPR Posters-Data Protection part 3
FREE A4 Data  Security GDPR Posters-Data Protection part 3FREE A4 Data  Security GDPR Posters-Data Protection part 3
FREE A4 Data Security GDPR Posters-Data Protection part 3
Data Hops
 
FREE A4 Data Security GDPR Posters-Data Protection part 2
FREE A4 Data Security GDPR Posters-Data Protection part 2FREE A4 Data Security GDPR Posters-Data Protection part 2
FREE A4 Data Security GDPR Posters-Data Protection part 2
Data Hops
 
E A4 Data Security GDPR Posters-Data Protection part1FRE
E A4 Data Security GDPR Posters-Data Protection part1FREE A4 Data Security GDPR Posters-Data Protection part1FRE
E A4 Data Security GDPR Posters-Data Protection part1FRE
Data Hops
 
FREE A4 Security Awareness Posters- GDPR Do's Data Protection Ninja
FREE A4 Security  Awareness Posters- GDPR Do's Data Protection NinjaFREE A4 Security  Awareness Posters- GDPR Do's Data Protection Ninja
FREE A4 Security Awareness Posters- GDPR Do's Data Protection Ninja
Data Hops
 
FREE A4 cyber Security awareness Posters-Data Protection -GDPR
FREE A4 cyber Security awareness  Posters-Data Protection -GDPRFREE A4 cyber Security awareness  Posters-Data Protection -GDPR
FREE A4 cyber Security awareness Posters-Data Protection -GDPR
Data Hops
 
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPRFREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
Data Hops
 
FREE A4 Cyber Security Posters-Data Protection-GDPR
FREE A4 Cyber Security Posters-Data Protection-GDPRFREE A4 Cyber Security Posters-Data Protection-GDPR
FREE A4 Cyber Security Posters-Data Protection-GDPR
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Removable Device
FREE A4  Cyber Security Awareness Posters-Removable DeviceFREE A4  Cyber Security Awareness Posters-Removable Device
FREE A4 Cyber Security Awareness Posters-Removable Device
Data Hops
 
Free Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-MalwareFree Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-Malware
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-PhishingFREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-Phishing
Data Hops
 
FREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social EngineeringFREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social Engineering
Data Hops
 

More from Data Hops (20)

FREE A4 Cyber Security Awareness Posters-Phishing part 1
FREE A4 Cyber Security Awareness Posters-Phishing part 1FREE A4 Cyber Security Awareness Posters-Phishing part 1
FREE A4 Cyber Security Awareness Posters-Phishing part 1
 
FREE A4 Cyber Security Awareness Posters-Phishing part 2
FREE A4 Cyber Security Awareness  Posters-Phishing part 2FREE A4 Cyber Security Awareness  Posters-Phishing part 2
FREE A4 Cyber Security Awareness Posters-Phishing part 2
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
FREE Cyber Security Awareness Posters-Social Engineering part 2
FREE Cyber Security Awareness  Posters-Social Engineering part 2FREE Cyber Security Awareness  Posters-Social Engineering part 2
FREE Cyber Security Awareness Posters-Social Engineering part 2
 
Free A4 Cyber Security Awareness Posters-Social Engineering part 1
Free A4 Cyber Security Awareness Posters-Social Engineering part 1Free A4 Cyber Security Awareness Posters-Social Engineering part 1
Free A4 Cyber Security Awareness Posters-Social Engineering part 1
 
FREE A4 Cyber Security Awareness Posters-Password Security part 3
FREE A4 Cyber Security Awareness Posters-Password Security part 3FREE A4 Cyber Security Awareness Posters-Password Security part 3
FREE A4 Cyber Security Awareness Posters-Password Security part 3
 
FREE A4 Cyber Security Awareness Posters-Password Security part 2
FREE A4 Cyber Security Awareness Posters-Password Security part 2FREE A4 Cyber Security Awareness Posters-Password Security part 2
FREE A4 Cyber Security Awareness Posters-Password Security part 2
 
FREE A4 Data Security GDPR Posters-Data Protection part 5
FREE A4 Data Security GDPR Posters-Data Protection part 5FREE A4 Data Security GDPR Posters-Data Protection part 5
FREE A4 Data Security GDPR Posters-Data Protection part 5
 
FREE A4 Data Security GDPR Posters-Data Protection part 4
FREE A4 Data Security GDPR Posters-Data Protection part 4FREE A4 Data Security GDPR Posters-Data Protection part 4
FREE A4 Data Security GDPR Posters-Data Protection part 4
 
FREE A4 Data Security GDPR Posters-Data Protection part 3
FREE A4 Data  Security GDPR Posters-Data Protection part 3FREE A4 Data  Security GDPR Posters-Data Protection part 3
FREE A4 Data Security GDPR Posters-Data Protection part 3
 
FREE A4 Data Security GDPR Posters-Data Protection part 2
FREE A4 Data Security GDPR Posters-Data Protection part 2FREE A4 Data Security GDPR Posters-Data Protection part 2
FREE A4 Data Security GDPR Posters-Data Protection part 2
 
E A4 Data Security GDPR Posters-Data Protection part1FRE
E A4 Data Security GDPR Posters-Data Protection part1FREE A4 Data Security GDPR Posters-Data Protection part1FRE
E A4 Data Security GDPR Posters-Data Protection part1FRE
 
FREE A4 Security Awareness Posters- GDPR Do's Data Protection Ninja
FREE A4 Security  Awareness Posters- GDPR Do's Data Protection NinjaFREE A4 Security  Awareness Posters- GDPR Do's Data Protection Ninja
FREE A4 Security Awareness Posters- GDPR Do's Data Protection Ninja
 
FREE A4 cyber Security awareness Posters-Data Protection -GDPR
FREE A4 cyber Security awareness  Posters-Data Protection -GDPRFREE A4 cyber Security awareness  Posters-Data Protection -GDPR
FREE A4 cyber Security awareness Posters-Data Protection -GDPR
 
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPRFREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
FREE A4 Cyber Security awareness- Posters-Data Protection -GDPR
 
FREE A4 Cyber Security Posters-Data Protection-GDPR
FREE A4 Cyber Security Posters-Data Protection-GDPRFREE A4 Cyber Security Posters-Data Protection-GDPR
FREE A4 Cyber Security Posters-Data Protection-GDPR
 
FREE A4 Cyber Security Awareness Posters-Removable Device
FREE A4  Cyber Security Awareness Posters-Removable DeviceFREE A4  Cyber Security Awareness Posters-Removable Device
FREE A4 Cyber Security Awareness Posters-Removable Device
 
Free Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-MalwareFree Printable A4 Cyber Security Awareness Posters-Malware
Free Printable A4 Cyber Security Awareness Posters-Malware
 
FREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-PhishingFREE A4 Cyber Security Awareness Posters-Phishing
FREE A4 Cyber Security Awareness Posters-Phishing
 
FREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social EngineeringFREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social Engineering
 

Recently uploaded

Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
ScyllaDB
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
Databarracks
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
ScyllaDB
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
ScyllaDB
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
ThousandEyes
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
anilsa9823
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB
 
Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
UiPathCommunity
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
UmmeSalmaM1
 
From NCSA to the National Research Platform
From NCSA to the National Research PlatformFrom NCSA to the National Research Platform
From NCSA to the National Research Platform
Larry Smarr
 
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
Mydbops
 

Recently uploaded (20)

Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
 
Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
 
Guidelines for Effective Data Visualization
Guidelines for Effective Data VisualizationGuidelines for Effective Data Visualization
Guidelines for Effective Data Visualization
 
From NCSA to the National Research Platform
From NCSA to the National Research PlatformFrom NCSA to the National Research Platform
From NCSA to the National Research Platform
 
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
 

A4 Cyber Security Awareness Posters-Password Security part 4

  • 1. YOUR BIRTHDAY LOCK THEM OUT datahops.com CYBER SECURITY AWARENESS IS NOT A PASSWORD
  • 2. Passphrase 3 random words add Numbers, letters, special characters and jumble them up MFA Multi Factor Authentication Secure login with: What you have What you know Who you are Password managers They store your passwords securely and can generate new and unique ones for you Login Securely Cybersecurity awareness training datahops.com
  • 3. MFA What you have Multi Factor Authentication An added layer of protection What you know Who you are Password Use IT Cybersecurity awareness training datahops.com
  • 4. Secure your information Choose a password that cannot be guessed. Choose a password you can remember. Choose different passwords for different services Choose complex passwords you can remember Cybersecurity awareness training datahops.com
  • 5. Password Healthcheck!. Don’t share passwords Don’t reuse passwords Don’t write them down Don’t use common words Don’t make them easy Cybersecurity awareness training datahops.com
  • 6. Protect your information. Never reuse passwords! Each login should be unique Use 2-factor authentication for added security Don’t share passwords with other people Don’t leave passwords written down passwords must be strong $3&!GbR@-njRUTdfd12_ Cybersecurity awareness training datahops.com
  • 7. USE STRONG PASSWORDS Protect your information! Cybersecurity awareness training datahops.com Downloading…… Lock them out! ACCESS DENIED
  • 8. Keep security in mind! ● Use a password manager to store strong unique passwords for all of your accounts. ● They can also generate new strong passwords for you ● They can enter your credentials automatically Safe Storage Password Manager Cybersecurity awareness training datahops.com
  • 9. GOOD PASSWORDS MUST BE: Cybersecurity awareness training datahops.com Y0um^$M@k3Y0*r?aSsw0%D$$t&0nG STRONG UNIQUE COMPLEX
  • 10. USE STRONG PASSWORDS Protect your information! Cybersecurity awareness training datahops.com Downloading…… Don’t let them get away with IT
  • 11. MAKE YOUR PASSWORDS STRONG M@k3Y0*r?aSsw0%D$$t&0nG ● 12 or more characters ● Letters , Numbers,Characters Protect yourself and your Information Cybersecurity awareness training datahops.com
  • 12. Use a separate password for your work account in case it gets compromised! Use STRONG Passwords Cybersecurity awareness training datahops.com
  翻译: