Protecting Your Password
Creating More Secure Passwords
Other Security Measures
More Information on PC Security Practices
This webpage provides tips for mitigating technology-related risks while getting the most out of your computing environment by addressing personal security practices and offering suggestions related to passwords and e-mail attachments.
These days, almost everything we do requires a PIN number or a password. There are so many that we sometimes can't keep track of them. While we may find passwords somewhat annoying, and even take them for granted, it is important to remember why passwords are important.
Passwords are often the first, and sometimes the only, defense against unauthorized access or intrusion of a specific computing system. For this reason, creating and maintaining secure passwords is the single most important step to protecting yourself from unauthorized use of your computing resources.
To protect your password:
Although passwords are a vital component of system security, they can often be cracked or broken relatively easily. Password cracking is the process of figuring out or breaking passwords in order to gain unauthorized entrance to a system or account.
Because there is always an ongoing threat of password cracking, we must develop good, strong passwords. Here are a few suggestions when creating and maintaining your passwords (this information is from the U.S. Computer Emergency Response Team (US-Cert) webpage)
Good practices for choosing secure password:
Poor practices for choosing a secure password:
Even though a number of methods are used to protect you from becoming infected, new virus threats continue to be an issue, particularly with e-mail attachments. The IUP e-mail server blocks some attachment types (see E-mail Attachment Filtering) that are known to spread viruses. You should still exercise extreme caution when receiving e-mail with attachments, even from people you know. Most viruses “spoof” or “fake” the sender’s e-mail address, making it look like the message is from someone you know. If you weren’t expecting an attachment, consult with the sender before opening it, or simply delete it. When in doubt, don’t open it.
Other Safety Measures
One other step in keeping your office computer safe is logging off each day but leaving your PC on so that it receives any necessary security patches or virus updates during the overnight hours.
Also, if you are going to be away from your computer, you can lock it to prevent someone else from using your account. In Windows, you can lock your computer by pressing Ctrl-Alt-Del simultaneously, and click on “Lock Computer.” You can unlock it when you return by pressing Ctrl-Alt-Del again and entering the password you used to log on to the computer.
You can also use the Windows screen saver to lock your computer automatically after a period of inactivity. To do this:
The U.S. Computer Emergency Response Team (US-Cert) offers extremely valuable information regarding PC security practices. Please take a moment to review these US-Cert websites to aid in protecting your PC and yourself.
Cyber Security Tip ST04-002
Cyber Security Tip ST04-003
Fraud, Waste, and Abuse Hotline
© 2007–16 Indiana University of Pennsylvania
1011 South Drive, Indiana, Pa. 15705 | 724-357-2100