{"id":28,"date":"2006-10-18T10:08:18","date_gmt":"2006-10-18T10:08:18","guid":{"rendered":"http:\/\/blogs.wabash.edu\/technotes\/2006\/10\/18\/creating-strong-passwords\/"},"modified":"2006-10-18T10:08:18","modified_gmt":"2006-10-18T10:08:18","slug":"creating-strong-passwords","status":"publish","type":"post","link":"https:\/\/blog.wabash.edu\/technotes\/2006\/10\/18\/creating-strong-passwords\/","title":{"rendered":"Creating Strong Passwords"},"content":{"rendered":"<p style=\"margin-top: 0\"><img decoding=\"async\" alt=\"\" src=\"http:\/\/blogs.wabash.edu\/www2images\/password.jpg\" align=\"right\" \/>Using strong passwords is a key component of computer security. Passwords are the keys that provide access to information stored on our computers and online accounts, and are often the only barrier between that information and would-be thieves.<\/p>\n<p style=\"margin-top: 0\">One strategy for creating a strong password that is easy to remember is to think up a sentence or phrase, and base your password on that. The phrase could be a line from a song or book, a quote, or anything that\u2019s easy to remember. Make it long \u2013 at least eight words. For example:<\/p>\n<p style=\"margin-top: 0\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;From the hills of Maine to the western plain<\/p>\n<p style=\"margin-top: 0\">Take the first letter of each word to form your password:<\/p>\n<p style=\"margin-top: 0\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;fthomttwp<\/p>\n<p style=\"margin-top: 0\">You can make the password even more secure by using a whole word or two from your phrase, mixing upper and lowercase letters, and substituting or adding letters and symbols. In our example, we could capitalize the M in Maine, use the number 2 in place of the word \u201cto\u201d, use \u201cthe\u201d instead of just t, and replace the h with a hash mark #, to get:<\/p>\n<p style=\"margin-top: 0\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;ft#oM2thewp<\/p>\n<p style=\"margin-top: 0\">Such a password is many times more difficult to guess or hack than a short word, but is still easy to remember.<\/p>\n<p style=\"margin-top: 0\">Below are some additional tips for creating good passwords.<\/p>\n<p style=\"margin-top: 0\"><b>Do:<\/b><\/p>\n<ul>\n<li>Use long passwords. Passwords should be at least 8 characters long. Each additional character increases the strength of the password many times.<\/li>\n<li>Use letters, numbers, and symbols to form your password.<\/li>\n<li>Use different passwords for different systems. That way, if one is compromised other systems are still secure.<\/li>\n<li>Change your passwords regularly, especially if you think someone may know your password.<\/li>\n<li>If you must write down your passwords, keep the list in your wallet or purse, not next to your computer.<\/li>\n<\/ul>\n<p style=\"margin-left: 0.0;margin-top: 0\"><b>Don\u2019t:<\/b><\/p>\n<ul>\n<li>Use personal information that can be easily determined or guessed (your name or username, birthday or anniversary, family members\u2019 names, pets, phone number, street address, etc.)<\/li>\n<li>Use words in the dictionary, of any language<\/li>\n<li>Use sequences (12345, qwerty) or repeated characters (22222).<\/li>\n<li>Share your password with other people. If you need to share files or information on your computer, contact the Help Desk and we can provide ways that both accounts can share the information.<\/li>\n<li>Give out passwords over the phone, email, or web form. IT Services and the online companies you work with will never call or email you and ask for your password. If you get such a request and you think it is legitimate, call the Help Desk or the company yourself for confirmation<\/li>\n<\/ul>\n<p>You can find even more tips and suggestions at the following online sources:<\/p>\n<p style=\"margin-left: 0.0;margin-top: 0\">&nbsp;&nbsp;&nbsp;&nbsp;<a href=\"http:\/\/www.csoonline.com\/read\/120105\/ht_passwords.html\" target=\"_blank\">How to write better passwords &#8211; CSOnline<\/a><br \/>\n&nbsp;&nbsp;&nbsp;&nbsp;<a href=\"http:\/\/www.microsoft.com\/athome\/security\/privacy\/password.mspx\" target=\"_blank\">Strong passwords: How to create and use them &#8211; Microsoft.com<\/a><br \/>\n&nbsp;&nbsp;&nbsp;&nbsp;<a href=\"http:\/\/www.us-cert.gov\/cas\/tips\/ST04-002.html\" target=\"_blank\">Choosing and Protecting Passwords &#8211; US CERT<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Using strong passwords is a key component of computer security. Passwords are the keys that provide access to information stored on our computers and online accounts, and are often the only barrier [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-28","post","type-post","status-publish","format-standard","hentry","category-security"],"w_featured_image_url":"","_links":{"self":[{"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/posts\/28","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/comments?post=28"}],"version-history":[{"count":0,"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/posts\/28\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/media?parent=28"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/categories?post=28"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.wabash.edu\/technotes\/wp-json\/wp\/v2\/tags?post=28"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}