SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Tips and Tricks September 2017
David Shinkfield
Computer Learning Center at Ewing
September 2017
Program
Why we need better passwords
Ways to create better passwords
Using a Password Manager
The Threats to Internet
Security
 Every second, 8 new users are joining the internet
 Every year, 2 billion records lost or stolen
 Every day,
 250,000 new pieces of malware
 30,000 new infected web sites. 80% for small businesses
 Where is all this coming from
 80% from organized and ultra sophisticated international
gangs
 One of the largest illegal economies in the World - $445
billion – larger than the GDP of 160 nations
James Lyne and Caleb Barlow
What Protection do we have?
Passwords
• We need strong passwords
• We need different
passwords for each site we
visit
A Great TED Talk
 James Lyne: Everyday cybercrime --
and what you can do about it
https://youtu.be/fSErHToV8IU
The 25 most common
passwords in 2016
 123456
 123456789
 qwerty
 12345678
 111111
 1234567890
 1234567
 password
 123123
 987654321
 qwertyuiop
 mynoob
 123321
 666666
 18atcskd2w
 7777777
 1q2w3e4r
 654321
 555555
 3rjs1la7q
 google
 1q2w3e4r5t
 123qwe
 zxcvbnm
 1q2w3e
Program
Why we need better passwords
Ways to create better passwords
Using a Password Manager
NIST Recommendations
 The National Institute of Standards and Technology is
about to make all of our lives much easier. The
organization recently revised its guidelines for creating
passwords, and the new advice sharply diverges from
previous rules.
 NIST suggests keeping passwords simple, long and
memorable. Phrases, lowercase letters and typical English
words work well. If you can picture it in your head, and no
one else could, that's a good password.
 Changing passwords every 90 days unnecessary
NIST Recommendations
correcthorsebatterystaple
An Alternative Approach
Create a phrase in your head, that no one
else can, that's a good password.
Eg.
I am an Eagles fan, and I go to all the games
IaaEf,aIgtatg
Creating a (Bad)Password
Creating a (Bad) Password
Creating a (Good) Password
Creating a (Good) Password
How to Pick a Password
 Don't re-use passwords. One ultra-secure one won't be
any good if someone finds it
 While combining upper and lower case passwords with
numbers to alter a memorable word is often advised,
these are more easily cracked than you might think
 Good advice is to make a long but memorable
"passphrase". String a few words together that you can
remember with a visual. "puffineatingbanana" is easy to
remember but would take millions of years for a
computer to crack
How to Pick a Password
 Alternatively, you can use a password manager such as
LastPass or KeePass, which can generate secure
passwords and store them online
 The best way to protect yourself is to use two-factor
authentication, which will send a text with a code or use
an app to verify your log-in
Program
Why we need better passwords
Ways to create better passwords
Using a Password Manager
What is Last Pass and KeePass
The password manager lives in your
browser and acts a digital gatekeeper,
filling in your login info when you need to
get on a certain site. You just have to
remember one (very secure!) master
password for the manager itself, and
everything else is taken care of for you.
KeePass
KeePass
Installing LastPass - Chrome
Installing LastPass - Chrome
Installing LastPass - Chrome
Installing LastPass - Chrome
LastPass
LastPass
LastPass-Where are my
passwords now?
Your Passwords are in your browser
Your Passwords are stored in a file on
your computer or in the Cloud
You’ve written down your passwords in a
notebook
LastPass – How to get
Passwords into LastPass
 Import /Export. This is the easiest way by far to get
started
 As you Browse. Just go about your business normally, and
when you get the chance to enter a password online,
your manager will pop up and ask if you want to save it.
However: if you’re perma-logged in to lots of accounts,
you’ll need to log out and log back in to upload your
passwords this way.
 Enter Manually. Each password manager has a clear way
to enter new credentials. Get copying.
clcewing.org
clcewing.org

Weitere ähnliche Inhalte

Ähnlich wie Passwords, Passwords and more Passwords

Password Management
Password ManagementPassword Management
Password ManagementDavon Smart
 
Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Mike Barker
 
5 tips for an unbreakable password
5 tips for an unbreakable password5 tips for an unbreakable password
5 tips for an unbreakable passwordSafeSpaceOnline
 
Best Practices for Password Creation
Best Practices for Password CreationBest Practices for Password Creation
Best Practices for Password CreationnFront Security
 
Heartbleed Explained & LastPass Demo
Heartbleed Explained & LastPass DemoHeartbleed Explained & LastPass Demo
Heartbleed Explained & LastPass DemoWilliam Mann
 
Sept 2014 cloud security presentation
Sept 2014   cloud security presentationSept 2014   cloud security presentation
Sept 2014 cloud security presentationJoan Dembowski
 
West Chester Staff Technology Training - Website,LastPass and Tips!
West Chester Staff Technology Training   - Website,LastPass and Tips!West Chester Staff Technology Training   - Website,LastPass and Tips!
West Chester Staff Technology Training - Website,LastPass and Tips!William Mann
 
Lesson Presentation Powerful Passwords.pptx
Lesson Presentation Powerful Passwords.pptxLesson Presentation Powerful Passwords.pptx
Lesson Presentation Powerful Passwords.pptxAllanGuevarra1
 
Honeywords - BSides London 2014
Honeywords - BSides London 2014Honeywords - BSides London 2014
Honeywords - BSides London 2014Gavin Holt
 
WordCamp Nashville: Clean Code for WordPress
WordCamp Nashville: Clean Code for WordPressWordCamp Nashville: Clean Code for WordPress
WordCamp Nashville: Clean Code for WordPressmtoppa
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreWilliam Mann
 
Personal Internet Security System
Personal Internet Security SystemPersonal Internet Security System
Personal Internet Security SystemMatthew Bricker
 
Greater Wheeling AITP Web Security
Greater Wheeling AITP Web SecurityGreater Wheeling AITP Web Security
Greater Wheeling AITP Web SecurityJohn Parkinson
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of viewYury Chemerkin
 

Ähnlich wie Passwords, Passwords and more Passwords (20)

Password Management
Password ManagementPassword Management
Password Management
 
Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.
 
5 tips for an unbreakable password
5 tips for an unbreakable password5 tips for an unbreakable password
5 tips for an unbreakable password
 
Best Practices for Password Creation
Best Practices for Password CreationBest Practices for Password Creation
Best Practices for Password Creation
 
Protect Your Business With Web Security
Protect Your Business With Web SecurityProtect Your Business With Web Security
Protect Your Business With Web Security
 
Heartbleed Explained & LastPass Demo
Heartbleed Explained & LastPass DemoHeartbleed Explained & LastPass Demo
Heartbleed Explained & LastPass Demo
 
issue15
issue15issue15
issue15
 
Sept 2014 cloud security presentation
Sept 2014   cloud security presentationSept 2014   cloud security presentation
Sept 2014 cloud security presentation
 
West Chester Staff Technology Training - Website,LastPass and Tips!
West Chester Staff Technology Training   - Website,LastPass and Tips!West Chester Staff Technology Training   - Website,LastPass and Tips!
West Chester Staff Technology Training - Website,LastPass and Tips!
 
Lesson Presentation Powerful Passwords.pptx
Lesson Presentation Powerful Passwords.pptxLesson Presentation Powerful Passwords.pptx
Lesson Presentation Powerful Passwords.pptx
 
Honeywords - BSides London 2014
Honeywords - BSides London 2014Honeywords - BSides London 2014
Honeywords - BSides London 2014
 
WordCamp Nashville: Clean Code for WordPress
WordCamp Nashville: Clean Code for WordPressWordCamp Nashville: Clean Code for WordPress
WordCamp Nashville: Clean Code for WordPress
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Personal Internet Security System
Personal Internet Security SystemPersonal Internet Security System
Personal Internet Security System
 
Site Man Pro
Site Man ProSite Man Pro
Site Man Pro
 
Greater Wheeling AITP Web Security
Greater Wheeling AITP Web SecurityGreater Wheeling AITP Web Security
Greater Wheeling AITP Web Security
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
Appy hour - Password presentation
Appy hour - Password presentationAppy hour - Password presentation
Appy hour - Password presentation
 
WordPress Security Guide
WordPress Security GuideWordPress Security Guide
WordPress Security Guide
 
W make107
W make107W make107
W make107
 

Mehr von clcewing

How to buy a pc
How to buy a pcHow to buy a pc
How to buy a pcclcewing
 
Windows 10
Windows 10Windows 10
Windows 10clcewing
 
Installing windows 10
Installing windows 10Installing windows 10
Installing windows 10clcewing
 
Connecting your tv to the internet chromecast
Connecting your tv to the internet chromecastConnecting your tv to the internet chromecast
Connecting your tv to the internet chromecastclcewing
 
Understanding your Home network and keeping it secure
Understanding your Home network and keeping it secureUnderstanding your Home network and keeping it secure
Understanding your Home network and keeping it secureclcewing
 
Backing up your digital life - PC, Mac or Android
Backing up your digital life - PC, Mac or AndroidBacking up your digital life - PC, Mac or Android
Backing up your digital life - PC, Mac or Androidclcewing
 
The future-of-personal-computing
The future-of-personal-computingThe future-of-personal-computing
The future-of-personal-computingclcewing
 
Websites you don’t know about
Websites you don’t know aboutWebsites you don’t know about
Websites you don’t know aboutclcewing
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home networkclcewing
 
Backing up your computer
Backing up your computerBacking up your computer
Backing up your computerclcewing
 
30tipstricks 090708071707-phpapp02
30tipstricks 090708071707-phpapp0230tipstricks 090708071707-phpapp02
30tipstricks 090708071707-phpapp02clcewing
 
Virtual machines
Virtual machinesVirtual machines
Virtual machinesclcewing
 
Android Tablets
Android TabletsAndroid Tablets
Android Tabletsclcewing
 
Anniversary intro
Anniversary introAnniversary intro
Anniversary introclcewing
 
Programs you need!
Programs you need!Programs you need!
Programs you need!clcewing
 

Mehr von clcewing (15)

How to buy a pc
How to buy a pcHow to buy a pc
How to buy a pc
 
Windows 10
Windows 10Windows 10
Windows 10
 
Installing windows 10
Installing windows 10Installing windows 10
Installing windows 10
 
Connecting your tv to the internet chromecast
Connecting your tv to the internet chromecastConnecting your tv to the internet chromecast
Connecting your tv to the internet chromecast
 
Understanding your Home network and keeping it secure
Understanding your Home network and keeping it secureUnderstanding your Home network and keeping it secure
Understanding your Home network and keeping it secure
 
Backing up your digital life - PC, Mac or Android
Backing up your digital life - PC, Mac or AndroidBacking up your digital life - PC, Mac or Android
Backing up your digital life - PC, Mac or Android
 
The future-of-personal-computing
The future-of-personal-computingThe future-of-personal-computing
The future-of-personal-computing
 
Websites you don’t know about
Websites you don’t know aboutWebsites you don’t know about
Websites you don’t know about
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home network
 
Backing up your computer
Backing up your computerBacking up your computer
Backing up your computer
 
30tipstricks 090708071707-phpapp02
30tipstricks 090708071707-phpapp0230tipstricks 090708071707-phpapp02
30tipstricks 090708071707-phpapp02
 
Virtual machines
Virtual machinesVirtual machines
Virtual machines
 
Android Tablets
Android TabletsAndroid Tablets
Android Tablets
 
Anniversary intro
Anniversary introAnniversary intro
Anniversary intro
 
Programs you need!
Programs you need!Programs you need!
Programs you need!
 

Kürzlich hochgeladen

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Kürzlich hochgeladen (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Passwords, Passwords and more Passwords

  • 1. Tips and Tricks September 2017
  • 2. David Shinkfield Computer Learning Center at Ewing September 2017
  • 3. Program Why we need better passwords Ways to create better passwords Using a Password Manager
  • 4. The Threats to Internet Security  Every second, 8 new users are joining the internet  Every year, 2 billion records lost or stolen  Every day,  250,000 new pieces of malware  30,000 new infected web sites. 80% for small businesses  Where is all this coming from  80% from organized and ultra sophisticated international gangs  One of the largest illegal economies in the World - $445 billion – larger than the GDP of 160 nations James Lyne and Caleb Barlow
  • 5. What Protection do we have? Passwords • We need strong passwords • We need different passwords for each site we visit
  • 6. A Great TED Talk  James Lyne: Everyday cybercrime -- and what you can do about it https://youtu.be/fSErHToV8IU
  • 7. The 25 most common passwords in 2016  123456  123456789  qwerty  12345678  111111  1234567890  1234567  password  123123  987654321  qwertyuiop  mynoob  123321  666666  18atcskd2w  7777777  1q2w3e4r  654321  555555  3rjs1la7q  google  1q2w3e4r5t  123qwe  zxcvbnm  1q2w3e
  • 8. Program Why we need better passwords Ways to create better passwords Using a Password Manager
  • 9. NIST Recommendations  The National Institute of Standards and Technology is about to make all of our lives much easier. The organization recently revised its guidelines for creating passwords, and the new advice sharply diverges from previous rules.  NIST suggests keeping passwords simple, long and memorable. Phrases, lowercase letters and typical English words work well. If you can picture it in your head, and no one else could, that's a good password.  Changing passwords every 90 days unnecessary
  • 11. An Alternative Approach Create a phrase in your head, that no one else can, that's a good password. Eg. I am an Eagles fan, and I go to all the games IaaEf,aIgtatg
  • 13. Creating a (Bad) Password
  • 14. Creating a (Good) Password
  • 15. Creating a (Good) Password
  • 16. How to Pick a Password  Don't re-use passwords. One ultra-secure one won't be any good if someone finds it  While combining upper and lower case passwords with numbers to alter a memorable word is often advised, these are more easily cracked than you might think  Good advice is to make a long but memorable "passphrase". String a few words together that you can remember with a visual. "puffineatingbanana" is easy to remember but would take millions of years for a computer to crack
  • 17. How to Pick a Password  Alternatively, you can use a password manager such as LastPass or KeePass, which can generate secure passwords and store them online  The best way to protect yourself is to use two-factor authentication, which will send a text with a code or use an app to verify your log-in
  • 18. Program Why we need better passwords Ways to create better passwords Using a Password Manager
  • 19. What is Last Pass and KeePass The password manager lives in your browser and acts a digital gatekeeper, filling in your login info when you need to get on a certain site. You just have to remember one (very secure!) master password for the manager itself, and everything else is taken care of for you.
  • 28. LastPass-Where are my passwords now? Your Passwords are in your browser Your Passwords are stored in a file on your computer or in the Cloud You’ve written down your passwords in a notebook
  • 29. LastPass – How to get Passwords into LastPass  Import /Export. This is the easiest way by far to get started  As you Browse. Just go about your business normally, and when you get the chance to enter a password online, your manager will pop up and ask if you want to save it. However: if you’re perma-logged in to lots of accounts, you’ll need to log out and log back in to upload your passwords this way.  Enter Manually. Each password manager has a clear way to enter new credentials. Get copying.