SlideShare a Scribd company logo
Password Security
ASHLEY MIDDLETON 2020
Hereโ€™s what you will learnโ€ฆ
This course will teach you how to keep your accounts and
devices safe with secure use of passwords and authentication.
YOU WILL LEARN: WHY HAVING STRONG
PASSWORDS REALLY
MATTERS
WHAT ACTUALLY MAKES
A SECURE PASSWORD
WHY YOU SHOULDNโ€™T
REUSE PASSWORDS
HOW TO CREATE A
PASSWORD THATโ€™S EASY
TO REMEMBER BUT
HARD TO GUESS
WHAT NOT TO DO WITH
YOUR PASSWORDS
WHAT MULTI-FACTOR
AUTHENTICATION IS
AND WHY YOU SHOULD
USE IT
WHY HAVING STRONG
PASSWORDS REALLY
MATTERS
ASHLEY MIDDLETON (C) 2020 2
Why having strong passwords really matters
Youโ€™ve probably heard people talk about the importance of password security before. But does it really
matter what passwords you use - does anyone really care that much about getting into your accounts?
Password security matters because:
Any company account or device can contain information thatโ€™s lucrative to cybercriminals
Exposure of customer or business data can be highly damaging to your organisation
Ensuring only authorised users can log in to devices and systems helps maintain accountability
ASHLEY MIDDLETON (C) 2020 3
Password security matters because:
๏ถAny company account or device can contain information thatโ€™s lucrative to cybercriminals
๏ถExposure of customer or business data can be highly damaging to your organisation
๏ถEnsuring only authorised users can log in to devices and systems helps maintain accountability
ASHLEY MIDDLETON (C) 2020 4
How an attacker could guess your password
๏ถHow an attacker could guess your password
๏ถYou may have previously heard various advice about what makes for a strong password.
๏ถTo know what makes for a secure password, itโ€™s important to understand how attackers will try to
compromise passwords.
ASHLEY MIDDLETON (C) 2020 5
The most
common attack
vector
ASHLEY MIDDLETON (C) 2020 6
The most common ways that
cybercriminals will attempt to
compromise passwords are:
Lists of common passwords. Passwords
like abc123 and P@ssword1 will be
attempted first by attackers.
Personal information. An attacker could
use information like birthdays and pet
names that are often easily found on
social media.
Passwords
compromised
ASHLEY MIDDLETON (C) 2020 7
Using brute-force attacks. The last resort for an
attacker is a brute-force attack, which involves
going through characters systematically until
your password is arrived at (i.e. aaa, aab, aac,
and so onโ€ฆ)
Passwords compromised through breaches. If a
site experiences a breach and your password is
exposed, an attacker may try that password to
log into your accounts on other services.
Why you shouldnโ€™t reuse passwords?
While itโ€™s common advice that you should never reuse passwords, the
important thing is to never reuse passwords for anything that matters.
Websites and user databases are breached all the time, which may
allow cybercriminals to crack the passwords that users of those sites
used. They can then attempt a combination of the email you used to
sign up for the site and the password you used on the site to attempt to
log in to any other service or website.
If you have reused your password anywhere else, the attacker will be
able to get in instantly.
ASHLEY MIDDLETON (C) 2020 8
How to create a password thatโ€™s easy to
remember but hard to crack
A perfect password would be one that was easy to remember but impossible to crack.
๏ถWhile a perfect password is not possible, there is a technique you can use to get as close to it as you can:
the three random words technique.
๏ถPick three entirely random words, such as raven clockwork burger (donโ€™t choose any words that could be
tied to you or your organisation, interests or family)
๏ถPut the three random words together
ASHLEY MIDDLETON (C) 2020 9
ASHLEY MIDDLETON (C) 2020
10
Congratulations, you have a password thatโ€™s incredibly hard to crack but one that
you already remember!
Keeping your password safe
It's important to create a strong password, but the effort will be wasted if you don't take steps to keep your
password safe.
You should:
๏ถNever write down passwords on paper
๏ถNever share passwords with colleagues or anyone else
๏ถNever send passwords in emails, text messages or in any other way to anyone else
๏ถNever give your password to anyone, even the IT team will never need it
ASHLEY MIDDLETON (C) 2020 11
Multi-factor authentication
While having a secure password is essential, it still may not be enough to stop an attacker.
๏ถThe more secure your password is the smaller the chance that a cybercriminal could randomly guess it -
but it can always happen.
๏ถA site may also cause your password to become compromised in a breach.
ASHLEY MIDDLETON (C) 2020 12
Multi-factor authentication
Multi-factor authentication protects your accounts by making you need another method of authentication
in addition to your password when you sign in.
This additional method could be:
๏ถA code from an authentication app
๏ถA code from a text message or email
๏ถAn authenticated removable device
If you have anything worth protecting on an account, you should always turn on multi-factor
authentication when it's available.
ASHLEY MIDDLETON (C) 2020 13
When you are ready to
continue to the questions
section,
TICK ALL THE BOXES TO CONTINUE!
ASHLEY MIDDLETON (C) 2020 14
๏ถWhy having strong passwords matters
๏ถHow an attacker could breach your password
๏ถWhy you shouldn't reuse passwords
๏ถWhy using two-factor authentication helps to boost data security
ASHLEY MIDDLETON (C) 2020 15
๏ถHow might your social media use affect your password security?
๏ถSocial media sites sell your passwords to cybercriminals
๏ถIf your password is related to your family, pets or interests, social media could allow it to be
guessed
๏ถYour friends on social media will be able to see your passwords
ASHLEY MIDDLETON (C) 2020 16
Question 1
Using a pattern on your
keyboard will allow you to
easily create a strong but
memorable password?
True or False
ASHLEY MIDDLETON (C) 2020 17
Question 1- Answer
Using a pattern on your
keyboard will allow you to
easily create a strong but
memorable password?
False:
It may memorable but it
wouldnโ€™t be strong
ASHLEY MIDDLETON (C) 2020 18
Question 2
If you're not in a job role where you
regularly send or receive
confidential information over email,
it doesn't really matter if you have a
strong password for your email or
not?
Yes or No
ASHLEY MIDDLETON (C) 2020 19
Question 2 - Answer
Correct:
There is a lot that a cybercriminal could do with access to a
company email, so it is essential to protect all email
accounts with strong passwords.
ASHLEY MIDDLETON (C) 2020 20
Question 3
Which of these
examples is the most
secure password
combination?
QWERTY
P@ssword1
clockworkeightydumbbell
ASHLEY MIDDLETON (C) 2020 21
Question 3 - Answer
Correct:
Having three random words
make up your password makes it
very difficult to crack while
being reasonably easy to
remember.
clockworkeightydumbbell
ASHLEY MIDDLETON (C) 2020 22
Question 4
You have just started using a
new application for processing
confidential data. You've created
a strong password, but is there
anything else you can do to help
keep your account secure?
๏ถWrite down your password somewhere
safe
๏ถProvide answers to security questions
so you can recover the account if needed
๏ถTurn on multi-factor authentication
ASHLEY MIDDLETON (C) 2020 23
Question 4 - Answer
Correct:
Turn on multi-factor
authentication
Multi-factor authentication is
essential for keeping confidential
apps secure, as it adds another
layer of security.
ASHLEY MIDDLETON (C) 2020 24
Question 5
What does multi-
factor
authentication
do?
๏ถIt makes your accounts ask for
multiple passwords instead of just one
๏ถIt makes your accounts ask for
another method of authentication in
addition to your password
ASHLEY MIDDLETON (C) 2020 25
Question 5 - Answer
Correct:
This another method
could be a code from an
authentication app, text
message or email.
It makes your accounts automatically
detect cybercriminals trying to hack
their way in, because they cant
authenticate.
(They donโ€™t have the additional bit of information
or authentication key)
ASHLEY MIDDLETON (C) 2020 26
Question 6
You have created strong
passwords for all your
accounts, but keep
forgetting them. What
should you do?
๏ถSwitch to using the same password for everything
๏ถWrite down your passwords on post-it notes on your
monitor
๏ถWrite down your passwords in a spreadsheet
๏ถAsk your IT team if they can provide you any tips or
tools like password managers that you can use for
password management
ASHLEY MIDDLETON (C) 2020 27
Question 6 - Answer
Correct:
There are tools available that can help you manage your
passwords, but you should check with your IT support team
before using them.
ASHLEY MIDDLETON (C) 2020 28
Question 7
It's safest to create one
strong password and to
reuse it across all your
accounts and devices?
True / False
ASHLEY MIDDLETON (C) 2020 29
Question 7 - Answer
Correct:
You should not reuse passwords, because if you did and one
leaked it would expose all your other accounts.
ASHLEY MIDDLETON (C) 2020 30
Question 8
Who should you
share your passwords
with?
๏ถColleagues
๏ถYour partner
๏ถYour manager
๏ถNobody
ASHLEY MIDDLETON (C) 2020 31
Question 8 -Answer
Correct:
There is no reason why your manager or IT team would
need your password, as they can use account privileges to
access your accounts if required.
ASHLEY MIDDLETON (C) 2020 32
Question 9
What is the best way to
create a strong but
memorable password?
๏ถUse the name of your favourite singer or sports
team and add a number after it
๏ถThe name of your pet, but add some special
characters
๏ถThe same long and secure password you use
for everything else
๏ถPick three random words and combine them
together
ASHLEY MIDDLETON (C) 2020 33
Question 9 - Answer
Correct:
This allows you to create a password like
'buttergamingmongoose' that's difficult to crack but
reasonably easy to remember.
ASHLEY MIDDLETON (C) 2020 34
Thank You
https://outlearn.training/

More Related Content

PDF
Bow Tie Risk Analysis
PDF
Cybersecurity Awareness Training Presentation v2024.03
PPTX
A CSR Presentation
PDF
Password (in)security
PDF
Data security and Integrity
PDF
Information Security Risk Management
PPTX
Password management
PPTX
ICT and end user security awareness slides
ย 
Bow Tie Risk Analysis
Cybersecurity Awareness Training Presentation v2024.03
A CSR Presentation
Password (in)security
Data security and Integrity
Information Security Risk Management
Password management
ICT and end user security awareness slides
ย 

What's hot (20)

PPTX
Awareness Training on Information Security
PDF
End-User Security Awareness
PPTX
Cyber Security 101: Training, awareness, strategies for small to medium sized...
PDF
Customer information security awareness training
PDF
Cybersecurity Employee Training
PPTX
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
PPTX
Cyber security system presentation
PPTX
PPT on Phishing
PDF
Threat Intelligence
PDF
Information security awareness, middle management
PDF
Basics of Cyber Security
PPT
IT Security Awareness-v1.7.ppt
ย 
PPTX
Introduction to Cybersecurity Fundamentals
PPTX
The Zero Trust Model of Information Security
PPTX
Basic Security Training for End Users
PPTX
Ransomware
PPTX
Cybersecurity Awareness Training
PDF
Data Leakage Prevention (DLP)
PPTX
Cybersecurity Awareness Training for Employees.pptx
PPT
Cyber Security and Cyber Awareness
Awareness Training on Information Security
End-User Security Awareness
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Customer information security awareness training
Cybersecurity Employee Training
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Cyber security system presentation
PPT on Phishing
Threat Intelligence
Information security awareness, middle management
Basics of Cyber Security
IT Security Awareness-v1.7.ppt
ย 
Introduction to Cybersecurity Fundamentals
The Zero Trust Model of Information Security
Basic Security Training for End Users
Ransomware
Cybersecurity Awareness Training
Data Leakage Prevention (DLP)
Cybersecurity Awareness Training for Employees.pptx
Cyber Security and Cyber Awareness
Ad

Similar to Password Security (20)

PPTX
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
PDF
A Guide to Cyber Etiquette.pdf
PPTX
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
PPTX
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
PDF
Why is password protection a fallacy a point of view
PPTX
FHSU CITI CS Training.pptx
PDF
importance-security-awareness-training-33013.pdf
PDF
Cybersecurity Awareness E-Book - WeSecureApp
PPTX
Scientific Applications of Computers L4 10 March 2024 .pptx
PDF
Website Impersonation Attacks. Who is REALLY Behind That Mask?
PDF
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
PPT
Presentation2f_for_passwords_MS_Class.ppt
PDF
16 Billions Google Leaked Password Alert in 2025
PDF
Password and Account Management Strategies - April 2019
PDF
Two factor authentication
PDF
Two factor authentication
PPTX
Honeywords - BSides London 2014
PPTX
Cybersecurity Cyber awareness Presentation.pptx
ย 
PPTX
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ย 
PDF
Email Security: Protecting Your Business from Cyber Threats | Infographic | U...
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
A Guide to Cyber Etiquette.pdf
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
Why is password protection a fallacy a point of view
FHSU CITI CS Training.pptx
importance-security-awareness-training-33013.pdf
Cybersecurity Awareness E-Book - WeSecureApp
Scientific Applications of Computers L4 10 March 2024 .pptx
Website Impersonation Attacks. Who is REALLY Behind That Mask?
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
Presentation2f_for_passwords_MS_Class.ppt
16 Billions Google Leaked Password Alert in 2025
Password and Account Management Strategies - April 2019
Two factor authentication
Two factor authentication
Honeywords - BSides London 2014
Cybersecurity Cyber awareness Presentation.pptx
ย 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ย 
Email Security: Protecting Your Business from Cyber Threats | Infographic | U...
Ad

More from Outlearn Training (7)

PPTX
01 the basics getting started with computers-esol
PPTX
The basics- getting started with computers-slide share
PPTX
Structural presentation lesson 1
PPTX
Business project
PPTX
Ncfe level 1 award in graphic design
PPTX
Social media
PPTX
Equality Act 2010
01 the basics getting started with computers-esol
The basics- getting started with computers-slide share
Structural presentation lesson 1
Business project
Ncfe level 1 award in graphic design
Social media
Equality Act 2010

Recently uploaded (20)

PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PDF
The Internet -By the Numbers, Sri Lanka Edition
ย 
PPTX
Digital Literacy And Online Safety on internet
PDF
Introduction to the IoT system, how the IoT system works
ย 
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
ย 
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
ย 
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
E -tech empowerment technologies PowerPoint
PDF
Sims 4 Historia para lo sims 4 para jugar
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PDF
๐Ÿ’ฐ ๐”๐Š๐“๐ˆ ๐Š๐„๐Œ๐„๐๐€๐๐†๐€๐ ๐Š๐ˆ๐๐„๐‘๐Ÿ’๐ƒ ๐‡๐€๐‘๐ˆ ๐ˆ๐๐ˆ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“ ๐Ÿ’ฐ
ย 
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
ย 
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
DOCX
Unit-3 cyber security network security of internet system
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
international classification of diseases ICD-10 review PPT.pptx
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PptxGenJS_Demo_Chart_20250317130215833.pptx
The Internet -By the Numbers, Sri Lanka Edition
ย 
Digital Literacy And Online Safety on internet
Introduction to the IoT system, how the IoT system works
ย 
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
ย 
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Power Point - Lesson 3_2.pptx grad school presentation
ย 
Cloud-Scale Log Monitoring _ Datadog.pdf
E -tech empowerment technologies PowerPoint
Sims 4 Historia para lo sims 4 para jugar
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
๐Ÿ’ฐ ๐”๐Š๐“๐ˆ ๐Š๐„๐Œ๐„๐๐€๐๐†๐€๐ ๐Š๐ˆ๐๐„๐‘๐Ÿ’๐ƒ ๐‡๐€๐‘๐ˆ ๐ˆ๐๐ˆ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“ ๐Ÿ’ฐ
ย 
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
RPKI Status Update, presented by Makito Lay at IDNOG 10
ย 
introduction about ICD -10 & ICD-11 ppt.pptx
presentation_pfe-universite-molay-seltan.pptx
Unit-3 cyber security network security of internet system

Password Security

  • 2. Hereโ€™s what you will learnโ€ฆ This course will teach you how to keep your accounts and devices safe with secure use of passwords and authentication. YOU WILL LEARN: WHY HAVING STRONG PASSWORDS REALLY MATTERS WHAT ACTUALLY MAKES A SECURE PASSWORD WHY YOU SHOULDNโ€™T REUSE PASSWORDS HOW TO CREATE A PASSWORD THATโ€™S EASY TO REMEMBER BUT HARD TO GUESS WHAT NOT TO DO WITH YOUR PASSWORDS WHAT MULTI-FACTOR AUTHENTICATION IS AND WHY YOU SHOULD USE IT WHY HAVING STRONG PASSWORDS REALLY MATTERS ASHLEY MIDDLETON (C) 2020 2
  • 3. Why having strong passwords really matters Youโ€™ve probably heard people talk about the importance of password security before. But does it really matter what passwords you use - does anyone really care that much about getting into your accounts? Password security matters because: Any company account or device can contain information thatโ€™s lucrative to cybercriminals Exposure of customer or business data can be highly damaging to your organisation Ensuring only authorised users can log in to devices and systems helps maintain accountability ASHLEY MIDDLETON (C) 2020 3
  • 4. Password security matters because: ๏ถAny company account or device can contain information thatโ€™s lucrative to cybercriminals ๏ถExposure of customer or business data can be highly damaging to your organisation ๏ถEnsuring only authorised users can log in to devices and systems helps maintain accountability ASHLEY MIDDLETON (C) 2020 4
  • 5. How an attacker could guess your password ๏ถHow an attacker could guess your password ๏ถYou may have previously heard various advice about what makes for a strong password. ๏ถTo know what makes for a secure password, itโ€™s important to understand how attackers will try to compromise passwords. ASHLEY MIDDLETON (C) 2020 5
  • 6. The most common attack vector ASHLEY MIDDLETON (C) 2020 6 The most common ways that cybercriminals will attempt to compromise passwords are: Lists of common passwords. Passwords like abc123 and P@ssword1 will be attempted first by attackers. Personal information. An attacker could use information like birthdays and pet names that are often easily found on social media.
  • 7. Passwords compromised ASHLEY MIDDLETON (C) 2020 7 Using brute-force attacks. The last resort for an attacker is a brute-force attack, which involves going through characters systematically until your password is arrived at (i.e. aaa, aab, aac, and so onโ€ฆ) Passwords compromised through breaches. If a site experiences a breach and your password is exposed, an attacker may try that password to log into your accounts on other services.
  • 8. Why you shouldnโ€™t reuse passwords? While itโ€™s common advice that you should never reuse passwords, the important thing is to never reuse passwords for anything that matters. Websites and user databases are breached all the time, which may allow cybercriminals to crack the passwords that users of those sites used. They can then attempt a combination of the email you used to sign up for the site and the password you used on the site to attempt to log in to any other service or website. If you have reused your password anywhere else, the attacker will be able to get in instantly. ASHLEY MIDDLETON (C) 2020 8
  • 9. How to create a password thatโ€™s easy to remember but hard to crack A perfect password would be one that was easy to remember but impossible to crack. ๏ถWhile a perfect password is not possible, there is a technique you can use to get as close to it as you can: the three random words technique. ๏ถPick three entirely random words, such as raven clockwork burger (donโ€™t choose any words that could be tied to you or your organisation, interests or family) ๏ถPut the three random words together ASHLEY MIDDLETON (C) 2020 9
  • 10. ASHLEY MIDDLETON (C) 2020 10 Congratulations, you have a password thatโ€™s incredibly hard to crack but one that you already remember!
  • 11. Keeping your password safe It's important to create a strong password, but the effort will be wasted if you don't take steps to keep your password safe. You should: ๏ถNever write down passwords on paper ๏ถNever share passwords with colleagues or anyone else ๏ถNever send passwords in emails, text messages or in any other way to anyone else ๏ถNever give your password to anyone, even the IT team will never need it ASHLEY MIDDLETON (C) 2020 11
  • 12. Multi-factor authentication While having a secure password is essential, it still may not be enough to stop an attacker. ๏ถThe more secure your password is the smaller the chance that a cybercriminal could randomly guess it - but it can always happen. ๏ถA site may also cause your password to become compromised in a breach. ASHLEY MIDDLETON (C) 2020 12
  • 13. Multi-factor authentication Multi-factor authentication protects your accounts by making you need another method of authentication in addition to your password when you sign in. This additional method could be: ๏ถA code from an authentication app ๏ถA code from a text message or email ๏ถAn authenticated removable device If you have anything worth protecting on an account, you should always turn on multi-factor authentication when it's available. ASHLEY MIDDLETON (C) 2020 13
  • 14. When you are ready to continue to the questions section, TICK ALL THE BOXES TO CONTINUE! ASHLEY MIDDLETON (C) 2020 14
  • 15. ๏ถWhy having strong passwords matters ๏ถHow an attacker could breach your password ๏ถWhy you shouldn't reuse passwords ๏ถWhy using two-factor authentication helps to boost data security ASHLEY MIDDLETON (C) 2020 15
  • 16. ๏ถHow might your social media use affect your password security? ๏ถSocial media sites sell your passwords to cybercriminals ๏ถIf your password is related to your family, pets or interests, social media could allow it to be guessed ๏ถYour friends on social media will be able to see your passwords ASHLEY MIDDLETON (C) 2020 16
  • 17. Question 1 Using a pattern on your keyboard will allow you to easily create a strong but memorable password? True or False ASHLEY MIDDLETON (C) 2020 17
  • 18. Question 1- Answer Using a pattern on your keyboard will allow you to easily create a strong but memorable password? False: It may memorable but it wouldnโ€™t be strong ASHLEY MIDDLETON (C) 2020 18
  • 19. Question 2 If you're not in a job role where you regularly send or receive confidential information over email, it doesn't really matter if you have a strong password for your email or not? Yes or No ASHLEY MIDDLETON (C) 2020 19
  • 20. Question 2 - Answer Correct: There is a lot that a cybercriminal could do with access to a company email, so it is essential to protect all email accounts with strong passwords. ASHLEY MIDDLETON (C) 2020 20
  • 21. Question 3 Which of these examples is the most secure password combination? QWERTY P@ssword1 clockworkeightydumbbell ASHLEY MIDDLETON (C) 2020 21
  • 22. Question 3 - Answer Correct: Having three random words make up your password makes it very difficult to crack while being reasonably easy to remember. clockworkeightydumbbell ASHLEY MIDDLETON (C) 2020 22
  • 23. Question 4 You have just started using a new application for processing confidential data. You've created a strong password, but is there anything else you can do to help keep your account secure? ๏ถWrite down your password somewhere safe ๏ถProvide answers to security questions so you can recover the account if needed ๏ถTurn on multi-factor authentication ASHLEY MIDDLETON (C) 2020 23
  • 24. Question 4 - Answer Correct: Turn on multi-factor authentication Multi-factor authentication is essential for keeping confidential apps secure, as it adds another layer of security. ASHLEY MIDDLETON (C) 2020 24
  • 25. Question 5 What does multi- factor authentication do? ๏ถIt makes your accounts ask for multiple passwords instead of just one ๏ถIt makes your accounts ask for another method of authentication in addition to your password ASHLEY MIDDLETON (C) 2020 25
  • 26. Question 5 - Answer Correct: This another method could be a code from an authentication app, text message or email. It makes your accounts automatically detect cybercriminals trying to hack their way in, because they cant authenticate. (They donโ€™t have the additional bit of information or authentication key) ASHLEY MIDDLETON (C) 2020 26
  • 27. Question 6 You have created strong passwords for all your accounts, but keep forgetting them. What should you do? ๏ถSwitch to using the same password for everything ๏ถWrite down your passwords on post-it notes on your monitor ๏ถWrite down your passwords in a spreadsheet ๏ถAsk your IT team if they can provide you any tips or tools like password managers that you can use for password management ASHLEY MIDDLETON (C) 2020 27
  • 28. Question 6 - Answer Correct: There are tools available that can help you manage your passwords, but you should check with your IT support team before using them. ASHLEY MIDDLETON (C) 2020 28
  • 29. Question 7 It's safest to create one strong password and to reuse it across all your accounts and devices? True / False ASHLEY MIDDLETON (C) 2020 29
  • 30. Question 7 - Answer Correct: You should not reuse passwords, because if you did and one leaked it would expose all your other accounts. ASHLEY MIDDLETON (C) 2020 30
  • 31. Question 8 Who should you share your passwords with? ๏ถColleagues ๏ถYour partner ๏ถYour manager ๏ถNobody ASHLEY MIDDLETON (C) 2020 31
  • 32. Question 8 -Answer Correct: There is no reason why your manager or IT team would need your password, as they can use account privileges to access your accounts if required. ASHLEY MIDDLETON (C) 2020 32
  • 33. Question 9 What is the best way to create a strong but memorable password? ๏ถUse the name of your favourite singer or sports team and add a number after it ๏ถThe name of your pet, but add some special characters ๏ถThe same long and secure password you use for everything else ๏ถPick three random words and combine them together ASHLEY MIDDLETON (C) 2020 33
  • 34. Question 9 - Answer Correct: This allows you to create a password like 'buttergamingmongoose' that's difficult to crack but reasonably easy to remember. ASHLEY MIDDLETON (C) 2020 34