The Security Guide Security Guide RSS Feed


Questions and Answers

Select Category:

...Internet and Data Security...

  1. What is the Security Guide about?
  2. What can be done about internet and data security?
  3. What makes a strong password?
  4. How do I contact you for feedback and further information?

1. What is the Security Guide about? Page Top
This Guide provides an A to Z knowledgebase and guidance for researching internet and data security information.
2. What can be done about internet and data security? Page Top
When you are thinking about system security, there is no one aspect that will secure your systems - you need an overall security strategy.
You cannot eliminate security risks, but you can manage and mitigate the risk.
3. What makes a strong password? Page Top
To an attacker, a strong password should appear to be a random string of characters.
Your passwords should be 8 or more characters in length; 14 characters or longer is ideal.
Many systems also support use of the space bar in passwords, so you can create a phrase made of many words (a pass phrase).
Combine letters, numbers, and symbols. The greater variety of characters that you have in your password, the harder it is to guess.
The fewer types of characters in your password, the longer it must be. An ideal password combines both length and different types of symbols. Avoid sequences or repeated characters.
Use the entire keyboard, not just the most common characters. Your password will be much stronger if you choose from all the symbols on the keyboard, including punctuation marks not on the upper row of the keyboard.
Use words and phrases that are easy for you to remember, but difficult for others to guess.
Avoid using only look-alike substitutions of numbers or symbols (such as to replace an e with a 3 or an a with @)
Do not use your login name. Any part of your name, birthday, social security number, or similar information for your loved ones constitutes a bad password choice.
Avoid dictionary words in any language.
Use different passwords for different login systems. If any one of the computers or online systems using this password is compromised, all of your other information protected by that password is also unsafe.
Do not store all your passwords online. If malicious users find these passwords stored online or on a networked computer, they have access to all your information.
4. How do I contact you for feedback and further information? Page Top
Please use the contact form on the home page.
We welcome your feedback, comments and suggestions for improvements.
Send your question or query and we will get back to you as soon as possible.

© RuleWorks - All Rights Reserved - Policy -