Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 16 Next »

🎓 Purpose

Unique user names and secure passwords are used by systems to distinguish between authorized users and unauthorized individuals. Weak passwords can be cracked by a threat actor within a matter of seconds or minutes, merely delaying their access to your systems and data, rather than preventing it.

👥 Audience

FACULTY RESEARCHERS ADMIN STAFF IT STAFF STUDENTS


🔖 Contents


(question) Initial considerations

Do NOT share your password with anyone, regardless of their stated intent. Your supervisor, manager, colleague, nor IT staff should ask you to provide it.

🛡️ Follow the University’s safe password practices when protecting institutional accounts and systems.


\uD83D\uDCD8 What can I do?

*️⃣ Consider the following principles when choosing a password.

Unique

  • For every account you have, you should use a unique password to help limit the exposure caused by a breach or theft to just one account.

Long

  • Create a password with 14 or more characters.

  • Brute-force attacks, wherein all character combinations are attempted in order to guess a password, are most successful for short passwords.

    • Whereas a password made up of 8 characters could take only hours to crack, passwords over 14 characters would take centuries.

Random

  • Avoid common phrases, words associated with your identity (e.g.; name, username, job, family members, hobbies, interest) and other easily guessable words or strings of characters.

Complex

  • Use a combination of uppercase and lowercase letters, numbers, and special characters.

📱 Enroll in the University’s multi-factor authentication (MFA), if you haven’t done so already.

🔓 Use a password manager to help prevent password reuse.

  • When passwords are reused across multiple accounts, a single data breach or successful phishing attempt could result in malicious individuals gaining access to the various accounts where that password was used.

🔐 Where possible, use passkeys over passwords.

🎣 Be aware of known phishing attempts and report suspicious emails to help protect your and others credentials.


  • No labels