SlideShare a Scribd company logo
1 of 18
Let Me In!
10 Tips to Better Passwords
Marian Merritt
Norton Internet Safety Advocate
Let Me In! 10 Tips to Better Passwords 1
Why It Matters
• Passwords protect your stuff
• A good password stops a hacker in his/her tracks
• A good password doesn’t make you crazy trying
to remember it
• A good password strategy = peace of mind
Let Me In! 10 Tips to Better Passwords 2
Passwords in the News
•Payment System – 130 million
accounts
•Gaming site 1 – 77 million
accounts
•Social site – 30 million accounts
•Military site - 26 million
accounts
•Career site – 6.4 million accounts
•Dating site – 1.5 million accounts
Let Me In! 10 Tips to Better Passwords 3
HACKED!
How the Hacker Uses Your Hacked Password
• Published databases of
usernames and passwords
from major data breaches
• They might already have the
combination of your email
address and favorite
password
• Plus dictionaries, common
phrases
• Keep running the list against
the target site
Let Me In! 10 Tips to Better Passwords 4
What Are Some of The Most Popular Passwords?
12345
123456
1234567
12345678
123123
111111
Password
Passw0rd
Password1
Welcome
Welcome1
Let Me In! 10 Tips to Better Passwords 5
Abc123
Monkey
Trustn01
Dragon
Baseball
Iloveyou
Master
Sunshine
Qazwsx
Superman
Michael
Football
Ashley
Bailey
Shadow
Letmein
Blink182
Admin1
1. Think Unique
Let Me In! 10 Tips to Better Passwords 6
•Not guessable word or phrase
•Different for each site and account
•Some use a few complex passwords and then
one “master” passwords for accounts considered
unimportant
•All accounts are important
•Not password that anyone else would use
2. No Dictionary Words
• Avoid using full words you might find in a dictionary
• Real words can be “edited” for password use
–Dictionary becomes
•D1(t10nAry (as an example)
• But hackers are “on to” common letter
replacement tricks like these
Let Me In! 10 Tips to Better Passwords 7
3. No Pet Names or School Mascots
• Even if you went to “D1(t10nAry High School”
– Avoid public information
• Children often use their pet’s name
–Friends and siblings hack accounts this way
• Security Questions and Answers should be hard to
guess
–You can use “fake” answers to “mother’s maiden
name” but you’ll need to remember what you used
–Better are sites that let you create your own
questions
Let Me In! 10 Tips to Better Passwords 8
4. Pay Particular Attention to Most Important Accounts
• Email is most important
–“Forgot your password” link on sites goes to email
–Hacker with access to email can reset all other
accounts
• Nearly as important is social networking
– Hacker can run scams against friends and colleagues
• Financial sites and shopping sites with stored credit
cards, too
Let Me In! 10 Tips to Better Passwords 9
5. Create a Pass Phrase and Turn It Into a Password
Let Me In! 10 Tips to Better Passwords 10
•Select a multi word phrase that is meaningful to
you (8 words or more)
•Ex: “I want to go to Africa in 2013” – 8 words
•Reduce to letters and numbers or characters
•Ex: Iw2g2Ai2013
•Now you have complex password BUT (see next
slide)
Create a mental
picture of your
phrase!
Suitcase
Zebra
2013
6. Make Unique for Each Account
• Iw2g2Ai2013 – complex but not unique
• At each site, create a variation that you can remember
– For example, add first letter of the site’s name:
• The “N” in Norton.com + Iw2g2Ai2013 = NIw2g2Ai2013
– Or, add letter adjacent to the first letter of site’s name:
• N becomes M (or B)
• M+ Iw2g2Ai2013 = MIw2g2Ai2013
Let Me In! 10 Tips to Better Passwords 11
Now you have created a system of UNIQUE and COMPLEX
passwords that you might be able to remember!
7. Use a Password Manager to Make This Easy
• Even with complex, unique password system, it’s work
to remember them all
• Password manager programs can secure all in
encrypted file, protected by one master password
• Makes life easier while managing complex and unique
passwords
• Allows sync to the cloud, making passwords portable
• Example: Norton’s Identity Safe (included in Norton
360, Norton Internet Security or as free download)
–https://identitysafe.norton.com
Let Me In! 10 Tips to Better Passwords 12
8. Never Share or Show Passwords
• Don’t write them down
• Never email or text them to someone
• If you tell it to someone, change the password as soon
as possible
• Legitimate companies NEVER ask for your account
password
Let Me In! 10 Tips to Better Passwords 13
9. If Notified About Data Breach, Take Action!
• Access your online account and change the password
• If a financial account, monitor transactions for unusual
activity
• If your social network, make sure the email addresses
and contact information are yours and:
– Review your privacy and security settings
– Monitor your “news feed” for unusual activity
– Monitor your friends list for people you don’t recognize
– Review apps that you’ve signed up for and the data they can
access
Let Me In! 10 Tips to Better Passwords 14
9. Install Security Software
• Get a security product for all devices:
–Computers
–Mobile phones
–Tablets
• Prevent password-stealing malware from infecting
your device
• Alert you to dangerous websites or links
Let Me In! 10 Tips to Better Passwords 15
10. Secure Mobile Devices with a Password
• Mobile apps may auto log you in to accounts
• Protect access with a password on phone or tablet
• Remove apps you don’t use anymore that may have
credit cards or financial info store:
– Shopping sites
– Banking and Investment companies
– Travel sites
Let Me In! 10 Tips to Better Passwords 16
Summary • Create unique passphrase (no
dictionary words)
• Nothing others will guess
• Customize for each site
• Focus on email, social, financial
sites first
• Use password managers
• Never share or show passwords
• Take action if breached
• Use security software
• Set passwords on mobiles
Let Me In! 10 Tips to Better Passwords 17
Thank you!
Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Marian Merritt
Norton Internet Safety Advocate
marian@norton.com
@marianmerritt
Let Me In! 10 Tips to Better Passwords 18
What did I miss?
Please send your suggestions to Marian@Norton.com

More Related Content

More from Durban Chamber of Commerce and Industry

Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...
Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...
Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...Durban Chamber of Commerce and Industry
 

More from Durban Chamber of Commerce and Industry (20)

SUMMARY AMENDED CCMA RULES
SUMMARY AMENDED CCMA RULESSUMMARY AMENDED CCMA RULES
SUMMARY AMENDED CCMA RULES
 
201507 caisson repair project final
201507 caisson repair project final201507 caisson repair project final
201507 caisson repair project final
 
Simply biz shift questions with allon dbn 2 v2
Simply biz shift questions with allon dbn 2 v2Simply biz shift questions with allon dbn 2 v2
Simply biz shift questions with allon dbn 2 v2
 
Speakers' profiles
Speakers' profilesSpeakers' profiles
Speakers' profiles
 
Mail shot wom. conv. a4
Mail shot   wom. conv. a4Mail shot   wom. conv. a4
Mail shot wom. conv. a4
 
Talk sign a5 flyer 2015
Talk sign a5 flyer 2015Talk sign a5 flyer 2015
Talk sign a5 flyer 2015
 
ethekwini municipality 2013 2014 annual report
ethekwini municipality 2013 2014 annual reportethekwini municipality 2013 2014 annual report
ethekwini municipality 2013 2014 annual report
 
Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...
Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...
Presentation: Durban Aerotropolis - Northern Area Business Forum: 18 February...
 
Sefa breakfast session presentation
Sefa breakfast session presentationSefa breakfast session presentation
Sefa breakfast session presentation
 
Invitation letter to careers expo 2015
Invitation letter to careers expo 2015Invitation letter to careers expo 2015
Invitation letter to careers expo 2015
 
Invitation to submit tenders to organise the sacci annual convention
Invitation to submit tenders to organise the sacci annual conventionInvitation to submit tenders to organise the sacci annual convention
Invitation to submit tenders to organise the sacci annual convention
 
Media release phoenix ink business directory approved 13 jan2015
Media release phoenix ink business directory approved 13 jan2015Media release phoenix ink business directory approved 13 jan2015
Media release phoenix ink business directory approved 13 jan2015
 
Daily market commentary 10122014
Daily market commentary 10122014Daily market commentary 10122014
Daily market commentary 10122014
 
Invitation
InvitationInvitation
Invitation
 
Daily market commentary 11112014
Daily market commentary 11112014Daily market commentary 11112014
Daily market commentary 11112014
 
Jirah article 2014
Jirah article 2014Jirah article 2014
Jirah article 2014
 
KZN Infrastructure Funding Fair
KZN Infrastructure Funding Fair KZN Infrastructure Funding Fair
KZN Infrastructure Funding Fair
 
Gibela supplier specs
Gibela supplier specs Gibela supplier specs
Gibela supplier specs
 
Tongaat Hullett - Durban Investment Roadshow
Tongaat Hullett - Durban Investment RoadshowTongaat Hullett - Durban Investment Roadshow
Tongaat Hullett - Durban Investment Roadshow
 
Mntc studyarea dbnchamber.mpumalanga
Mntc studyarea dbnchamber.mpumalangaMntc studyarea dbnchamber.mpumalanga
Mntc studyarea dbnchamber.mpumalanga
 

Recently uploaded

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Letmein10tipstobetterpasswords 120824113907-phpapp02

  • 1. Let Me In! 10 Tips to Better Passwords Marian Merritt Norton Internet Safety Advocate Let Me In! 10 Tips to Better Passwords 1
  • 2. Why It Matters • Passwords protect your stuff • A good password stops a hacker in his/her tracks • A good password doesn’t make you crazy trying to remember it • A good password strategy = peace of mind Let Me In! 10 Tips to Better Passwords 2
  • 3. Passwords in the News •Payment System – 130 million accounts •Gaming site 1 – 77 million accounts •Social site – 30 million accounts •Military site - 26 million accounts •Career site – 6.4 million accounts •Dating site – 1.5 million accounts Let Me In! 10 Tips to Better Passwords 3 HACKED!
  • 4. How the Hacker Uses Your Hacked Password • Published databases of usernames and passwords from major data breaches • They might already have the combination of your email address and favorite password • Plus dictionaries, common phrases • Keep running the list against the target site Let Me In! 10 Tips to Better Passwords 4
  • 5. What Are Some of The Most Popular Passwords? 12345 123456 1234567 12345678 123123 111111 Password Passw0rd Password1 Welcome Welcome1 Let Me In! 10 Tips to Better Passwords 5 Abc123 Monkey Trustn01 Dragon Baseball Iloveyou Master Sunshine Qazwsx Superman Michael Football Ashley Bailey Shadow Letmein Blink182 Admin1
  • 6. 1. Think Unique Let Me In! 10 Tips to Better Passwords 6 •Not guessable word or phrase •Different for each site and account •Some use a few complex passwords and then one “master” passwords for accounts considered unimportant •All accounts are important •Not password that anyone else would use
  • 7. 2. No Dictionary Words • Avoid using full words you might find in a dictionary • Real words can be “edited” for password use –Dictionary becomes •D1(t10nAry (as an example) • But hackers are “on to” common letter replacement tricks like these Let Me In! 10 Tips to Better Passwords 7
  • 8. 3. No Pet Names or School Mascots • Even if you went to “D1(t10nAry High School” – Avoid public information • Children often use their pet’s name –Friends and siblings hack accounts this way • Security Questions and Answers should be hard to guess –You can use “fake” answers to “mother’s maiden name” but you’ll need to remember what you used –Better are sites that let you create your own questions Let Me In! 10 Tips to Better Passwords 8
  • 9. 4. Pay Particular Attention to Most Important Accounts • Email is most important –“Forgot your password” link on sites goes to email –Hacker with access to email can reset all other accounts • Nearly as important is social networking – Hacker can run scams against friends and colleagues • Financial sites and shopping sites with stored credit cards, too Let Me In! 10 Tips to Better Passwords 9
  • 10. 5. Create a Pass Phrase and Turn It Into a Password Let Me In! 10 Tips to Better Passwords 10 •Select a multi word phrase that is meaningful to you (8 words or more) •Ex: “I want to go to Africa in 2013” – 8 words •Reduce to letters and numbers or characters •Ex: Iw2g2Ai2013 •Now you have complex password BUT (see next slide) Create a mental picture of your phrase! Suitcase Zebra 2013
  • 11. 6. Make Unique for Each Account • Iw2g2Ai2013 – complex but not unique • At each site, create a variation that you can remember – For example, add first letter of the site’s name: • The “N” in Norton.com + Iw2g2Ai2013 = NIw2g2Ai2013 – Or, add letter adjacent to the first letter of site’s name: • N becomes M (or B) • M+ Iw2g2Ai2013 = MIw2g2Ai2013 Let Me In! 10 Tips to Better Passwords 11 Now you have created a system of UNIQUE and COMPLEX passwords that you might be able to remember!
  • 12. 7. Use a Password Manager to Make This Easy • Even with complex, unique password system, it’s work to remember them all • Password manager programs can secure all in encrypted file, protected by one master password • Makes life easier while managing complex and unique passwords • Allows sync to the cloud, making passwords portable • Example: Norton’s Identity Safe (included in Norton 360, Norton Internet Security or as free download) –https://identitysafe.norton.com Let Me In! 10 Tips to Better Passwords 12
  • 13. 8. Never Share or Show Passwords • Don’t write them down • Never email or text them to someone • If you tell it to someone, change the password as soon as possible • Legitimate companies NEVER ask for your account password Let Me In! 10 Tips to Better Passwords 13
  • 14. 9. If Notified About Data Breach, Take Action! • Access your online account and change the password • If a financial account, monitor transactions for unusual activity • If your social network, make sure the email addresses and contact information are yours and: – Review your privacy and security settings – Monitor your “news feed” for unusual activity – Monitor your friends list for people you don’t recognize – Review apps that you’ve signed up for and the data they can access Let Me In! 10 Tips to Better Passwords 14
  • 15. 9. Install Security Software • Get a security product for all devices: –Computers –Mobile phones –Tablets • Prevent password-stealing malware from infecting your device • Alert you to dangerous websites or links Let Me In! 10 Tips to Better Passwords 15
  • 16. 10. Secure Mobile Devices with a Password • Mobile apps may auto log you in to accounts • Protect access with a password on phone or tablet • Remove apps you don’t use anymore that may have credit cards or financial info store: – Shopping sites – Banking and Investment companies – Travel sites Let Me In! 10 Tips to Better Passwords 16
  • 17. Summary • Create unique passphrase (no dictionary words) • Nothing others will guess • Customize for each site • Focus on email, social, financial sites first • Use password managers • Never share or show passwords • Take action if breached • Use security software • Set passwords on mobiles Let Me In! 10 Tips to Better Passwords 17
  • 18. Thank you! Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Marian Merritt Norton Internet Safety Advocate marian@norton.com @marianmerritt Let Me In! 10 Tips to Better Passwords 18 What did I miss? Please send your suggestions to Marian@Norton.com

Editor's Notes

  1. A good password keeps your private information private. It restricts access to your accounts to those you trust. It ensures trust in those who deal with you; when they see information coming from your accounts, they know it’s from you. Passwords are more than the keys to your virtual house. They are a constant force of protection, keeping dangerous elements away, as you interact with your information on your computer, via your mobile devices, in the cloud and increasingly to all devices that access the internet. Password strategies vary but you shouldn’t have to resort to methods of madness like writing your passwords down on a pad next to your computer. Or worse, using the same password for everything you do. Learn some tips for getting your passwords in better shape, being able to manage and retrieve them easily and learning to relax when the next data breach comes along.
  2. What’s going on? Hackers have discovered a variety of ways to defeat security to access databases of user accounts and passwords. What’s worse, when the data gets out, hackers often post it for other hackers to use. This means, if your account was hacked, your user name (often it’s your email address) and password get posted in a database that is public. If you are someone who uses the same password for all your accounts, it’s just a matter of time until someone takes your email address and favorite password and gains illegal access to another of your accounts. What if it were your bank account or your social network? How might you feel? Often, consumers are notified when their information has been involved in a breach. Consider those terrible times a kind of gift. A gift to remind you to use better passwords, unique passwords, especially for your most important account. Keep reading to find out which account is the most important one.
  3. Hackers share best practices to keep “upping” their game. From published databases of old data breaches, the security industry is better able to see how consumers fail at creating and using good passwords. Seemingly simple and what should be a minor security step, passwords have never been more crucial in crafting a good internet security strategy.
  4. Recognize some of these as your own? Uh Oh! Time to change those immediately. Others look like a good effort to create a strong password. They replace common letters in a dictionary word with a character or number that resembles it. So you get Passw0rd, instead of Password. But if it’s common, that means hackers have it in their list of passwords to try. Others like “QAZWSX” look clever and tricky. But if you look at your computer keyboard, it’s the left most keys in descending order. And if it’s common? Again, it goes in the hacker’s bag of passwords to try. Your best passwords are not dictionary words, should have eight or more characters that combine upper and lower case letters, numbers and special keyboard characters. I know, “groan”. And worse, it can’t be the same phrase you use over and over which weakens its worth. Your pass code also needs to be customized for each account and somehow, memorable!
  5. If I know you, can I guess your password? If I know the password you used on another account and you use the same password for everything, can I get in to this account? Can I answer your security questions and change your password? Remember what has happened to famous politicians who had their email account hacked this way?
  6. Remember from a few slides ago? Hackers START with a dictionary. And children often use names of pets and schools so those will be in the database too. We’ve got to think as craftily as the hackers.
  7. Public information is everything shared on social networks, like your employers, favorite bands, teams, tv shows, etc. Members of your family (even your mother is listed on there, right?). What about where you’ve lived or gone to school? Avoid this sort of information in your password or security questions.
  8. If the hacker gets access to your email account, they can change the password at every other account you use. Then they’ll go to your social networks, and change all the contact information. That way you can’t recover the account easily. And the hacker can post to all your friends and network of colleagues any scam they are running.
  9. Now to the heart of the matter, creating that magical password strategy. Start with the pass phrase. After you create it and start using it, you’ll be AMAZED how readily you can come up with the characters to type by thinking about the story in your phrase. Here, I’ve created a visual of a suitcase, covered in zebra print with a 2013 sticker on it. Use a mental picture to keep you mindful of your magic phrase.
  10. This is the real magic but takes practice to use properly. If you just add the website name to your phrase, anyone who hacks and gets the password or tricks you into revealing, it will understand your method. For example, “Iw2g2Ai2013norton” is pretty obvious.
  11. I don’t know how people do this without password managers. When I’m logged in to Norton’s Identity Safe, it not only enters passwords for me but offers to save them at new websites I sign up for. It can store my shipping information and credit cards so online shopping becomes fast and easy. And with the data both encrypted locally and in the cloud, I can use my logins when I’m at a friend’s home as easily and securely as I do at home. Whether you choose the Norton password manager or another brand, they will make password management much, much easier.
  12. Should be obvious but many people keep a list next to their computer. Or stored in their wallet. Just a bad, bad idea. If you must store them, password protect the device or the file to add another layer of security. Remember, if you get an email (spam) asking you to login to your account by clicking a link, it might be fake. Don’t do it. And never reply to a text with your account information and password. Go to the actual website on your own and access your account that way.
  13. Notification is usually by email. Pay attention and double check the authenticity of the information on the company website.
  14. Security software is MUCH, much more than just antivirus. And it’s increasingly necessary on mobile devices as hackers learn new ways to trick people on these devices.
  15. Mobile devices are just small computers, capable of doing nearly everything including access our most sensitive and important online accounts. Often with just a swipe or a click of an icon, meaning if I have access to your phone or tablet, I may have easy access to all your accounts.