Tag Archives: Best practice

  • 0

Simplifying Password Complexity

Category:Information Security,Infosec Communicator,password,Uncategorized Tags : 

T y p e w r i t e r ⏎Let’s be honest. Passwords are a pain. We all know that it’s important to have different passwords for different places and we all know that they need to be fairly complex. We also know that remembering numerous passwords, especially strong passwords, can be a challenge. So what’s the best strategy?

In this article, I’ll talk about how to create memorable (but strong) passwords and suggest a tool that will make constructing and remembering strong passwords easier.

In general, the strength of a password depends on two factors: length and complexity. Although there’s some disagreement, length is more important than complexity. (For a humorous illustration of password complexity, read the XKCD comic at https://xkcd.com/936/)

Increased complexity makes it more difficult to create a password that you can remember.  The idea of a long complex password may be overwhelming. However, increasing password length alone can result in a password that’s memorable and stronger. Because of the way Windows stores some passwords, the “magic number” is 15 characters or more. A traditional complex password of 15 characters might look like this: “qV0m$$#owc2h0X5”. I don’t know about you, but there’s no way I’m going to remember a password like that. You COULD write it down and store it securely, but it’s not the easiest password to enter on a keyboard, and storing passwords in a browser or in a desktop application is insecure.

Here are a couple of strategies for strong passwords.

Read More

  • 1

  • 1

A Lightning Fast Introduction to Digital Self Defense

Category:Higher Education,Information Security,Infosec Communicator,Uncategorized Tags : 

Each year at the Rochester Institute of Technology we introduce the concepts of Digital Self Defense to incoming students. We’ve tried a variety of presentation types and venues, ranging from several sets of co-presenters talking with “smaller” groups of students to one presenter in front of the 2000+ students at our Gordon Field House.

We kicked off our activities this year at New Student Move-in Day with our table of resource materials and a guest appearance by Phishy. Phishy provides a visual reminder for students to watch out for phishing attempts. Quite a few students posed with Phishy for photos.

Our New Student Orientation activities will conclude on Saturday, Sept 1, as we deliver a series of Lightning Talks on the subject of Digital Self Defense. We’ll cover online reputation management, safer social networking, avoiding online identity theft, security requirements at RIT, and illegal file sharing.

Because we’ll have captionists and ASL (American Sign Language)  interpreters, we’ve added 3 seconds to each slide. As in other Lightning Talks, the slides will advance automatically, every 18 seconds. I’m the only one of the presenters who’s done a Lightning Talk, and I’m looking forward to seeing how each presenter deals with the challenge of a very large (~2500) audience and a slide deck they don’t control.

Five presenters. Five different styles. Huge audience. Should be interesting.

Watch for my followup post!

Enhanced by Zemanta

  • 1

  • 0

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,235 other subscribers

Categories

Support Introverted Leadership on Patreon

Blubrry affiliate banner