Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
🎓 Purpose
Weak passwords can be cracked by a threat actor within a matter of seconds or minutes, merely delaying their access to your systems and data, rather than preventing it.
Expand | ||
---|---|---|
| ||
Unique user names and secure passwords are used by systems to distinguish between authorized users and unauthorized individuals. While username generation is often standardized, thus easy to deduce about another individual, passwords are an authentication factor that only you should know and should be complex enough that they cannot be easily guessed or compromised through brute-force (i.e.: try every possible combination) methods. When your credentials are compromised, not only can an unauthorized individual access your system or data, but they are doing so "as you". This is also an issue if you choose to share your password with a colleague, as ultimately you will be responsible for any actions they perform or comprises that occur during their usage. By taking the time choose a secure password and adhering to best practices regarding it's safety and protection, you can limit the chance of such a compromise. |
👥 Audience
Status | ||
---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Initial considerations
Warning |
---|
Do NOT share your password with anyone, regardless of their stated intent. Your supervisor, manager, colleague, nor IT staff should ask you to provide it. |
\uD83D\uDCD8 What can I do?
*️⃣ Consider the following principles when choosing a password.
📱 Enroll in the University’s multi-factor authentication (MFA), if you haven’t done so already.
🔓 Use a password manager to help prevent password reuse.
🎣 Be aware of known phishing attempts and report suspicious emails to help protect your and others credentials.
Page Properties | |||||||||
---|---|---|---|---|---|---|---|---|---|
| |||||||||
|
🔍 Search
Live Search | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|
✉️ Additional help
Expand | ||
---|---|---|
| ||
Expand | ||
---|---|---|
| ||
https://security.utoronto.ca/services/research-information-security-program/ |
\uD83D\uDCCB Related articles
Filter by label (Content by label) | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
|