4Tips onCOMPUTER SECURITY
REMEMBER.YOU
MUST
ALWAYS
CREATE A STRONG
PASSWORD
Tip #1.
WHAT MAKES A STRONG/PERFECT
PASSWORD?
#1.
The recipe of thePERFECT PASSWORD:
A mix of these
#1.
FOLLOW
PASSWORDGUIDELINES
Tip #2.
COMMANDMENTS OF USING
PASSWORDS6
#2.
Must be
treated as
sensitive &
confidential
information.
#1.
PASSWORDS
#2.
Must not
be shared
with or
disclosed
to anyone.
#2.
PASSWORDS
#2.
Must be
changed at
least once
every 60
days.
#3.
PASSWORDS
#2.
That are no
longer
needed must
be deleted
immediately.
#4.
PASSWORDS
#2.
PASSWORDSMust be
changed
immediately
upon first
login.
#5.
#2.
PASSWORDSMust not be
stored or
transmitted in
any form.
#6.
#2.
PASSWORDS
KNOW THE DIFFERENCE!
STRONGWEAK
VS
Tip #3.
What IS A STRONG
PASSWORD?
#3.
A STRONG
PASSWORD…
#3.
IS MADE UP OF AT LEAST
8CHARACTERS.
#3.
HAS
UPPERCASELETTERS.
#3.
HAS
lowercase LETTERS.
#3.
HAS
$pecial ch@r@cter$.
#3.
DOES NOT
CONTAIN THESE:
#3.
USER NAMEDATE OF BIRTHPET’S NAME
YOUR
#3.
OR ANY OTHER
EASILY
DENTIFIABLENFORMATION.i
#3.
#3.
What IS A WEAK
PASSWORD?
#3.
A WEAK
PASSWORD…
CAN BE
EASILY GUESSED!
#3.
HAS LESS THAN
8
#3.
CHARACTERS.
CAN BE FOUND IN A
#3.
DictionaryANAMPEREANGSTROMAPPLEAQUA ANGERANTABDUCTORADAPTER
RADIUMRANRATRAMRED
YAMYATCHYEARYAKYAWN
OAKORANGEOARONIONORDEROFFEROBESEOBJECT
IS MADE UP OF WORD/NUMBER
#3.
PATTERNS. aabbccddmaqwertynonono
‘123456’
HAS ONLY LETTERS
#3.
SPECIALch@r@cter$.
BUT NO
Tip #4.
KEEP
CALM
AND ENSURE
SOFTWARE
COMPLIANCE
WAYSYOU CAN ENSURE
SOFTWARE5
#4.
COMPLIANCE
#4.
Only use IT
approved freeware
or trial software.
#1.
#4.
Avoid using any
software owned by
the company for
personal use.
#2.
#4.
#3.
Only install
licensed
software.
#4.
Only install software
that have a
verified publisher.
#4.
#4.
Before installing any
software, go through
its reviews and
ratings.
#5.