Cybersecurity Tips

Is your Password Safe
Part 1

The following tips are brought to you by students in Professor Kevin Crawford's COMI-2035: Introduction to Computer Forensics.

Password Safety Tips

Passwords are everywhere in our digital life online nowadays. It’s important to make sure that we have strong passwords that we don’t reuse to keep all our accounts safe.

What is a strong password?

A password should be hard to crack or solve like a puzzle. It should take time to get through.
Aim for 12 characters in length (longer is better), and make it a sentence or phrase that you can remember.
• Use a variety of characters in your password including a mix of uppercase and lowercase letters (A-Z, a-z), numbers (0-9), and symbols (!@#$%^&*()_+=-`~[]{}|;':",./<>?).
• Make sure never to reuse the same passwords. This is CRITICAL! Once one gets compromised, then they all get compromised.
• Try not to use common words, dates, names, or easily identifiable information about you. These are usually used first by the automated tools used by hackers. Use a passphrase like "I love to eat 2 pizzas on Fridays!" as this has all the requirements of a password: it is long and complex but is easy for you to remember.

 

Is your Password Safe
Part 2

The following tips are brought to you by students in Professor Kevin Crawford's COMI-2035: Introduction to Computer Forensics.

Password Safety Tips

Passwords are everywhere in our digital life online nowadays. It’s important to make sure that we have strong passwords that we don’t reuse to keep all our accounts safe.

Should I use the same password for everything?

Do the opposite of that. Use a different password for everything (managed by a password manager). The problem with using the same password for different services is that if any one of those services is compromised, your password is liable to end up on the dark web alongside email. Enterprising black hat hackers will try that username and password combination against a variety of websites and if you use the same password, you’ll be in serious jeopardy at that point.

Is your Password Safe
Part 3

The following tips are brought to you by students in Professor Kevin Crawford's COMI-2035: Introduction to Computer Forensics.

Password Cracking Times: Faster Than you Think!

How often should I change my password and should I reuse passwords?

The conventional wisdom is “change your password every 6 months to 1 year.” However, as someone who works in tech, I have literally hundreds of passwords. It’s totally impractical for me to change them, which is why I use highly random, very long passwords that are resistant to cracking, and I use different passwords for every website. Additionally, I enable Multifactor Authentication on every service that offers it.
This being the case, I feel comfortable in not changing my passwords regularly. Ironically, Microsoft stopped enforcing password expirations because it found that people would make their passwords weaker each time they picked a new one.

Password Managers Examples

Where should I save my passwords?

The safest way to store passwords is using a trusted password manager. It securely encrypts and stores passwords for easy access.

Summary:

We all need passwords to use different accounts in today’s online connected world. We need to use unique passwords that are not reused, are long, varied, and complex, and are stored securely in a password manager. These tips will help keep you protected against attacks that compromise your entire online life.

 

PHISHING

The following tips are brought to you by students in Professor Elizabeth Charette’s COMI 2037: Introduction to Cybersecurity.

"Don't take the bait"

Phishing is a deceptive practice where criminals use fake emails, text messages, or phone calls to trick victims into revealing sensitive information. Phishing emails may seem harmless at first glance, but they are designed to steal your data or install malicious software. Being able to spot the red flags is crucial to keeping your personal information safe.

Tips to Avoid Falling for Phishing Scams:

• Generic Greetings: Because scammers often target a broad set of victims at one time, they
often use generic greetings like "Dear customer," or they may even skip the greeting
altogether.
• Grammatical Errors: Phishing emails often contain grammatical errors, misspellings, odd
capitalization, and unnatural phrasing. While typos happen, legitimate business emails
shouldn’t have these mistakes.
• Low-resolution Logos or Images: Scammers often use copied logos to appear legitimate,
but low-quality, blurry, or improperly sized logos are red flags. Be cautious if a logo looks
fuzzy, pixelated, stretched, or requires close inspection to see it clearly.
• Suspicious Sender Email Addresses: Look closely at the sender's email address. Phishers
might create addresses that look similar to a real company, but with a minor typo or extra
character. For example, “appel.com” instead of “apple.com.”
• Strange URLs: Legitimate companies use clear URLs, while phishing emails often link to
suspicious ones. Hover your mouse over the link to see the URL before you click it.
• Requests for Personal Information: Legitimate companies won't ask for sensitive information like passwords or Social Security numbers through email. If an email tells you to verify your account by clicking a link and entering your login details, it's likely a phishing attempt.

Stay safe and remember—don’t take the bait!

 

Cyber Hygiene Best Practices

The following tips are brought to you by students in Professor Elizabeth Charette’s COMI 2037: Introduction to Cybersecurity.

Cyber Tips

 

How to Protect Yourself on the Dark Web

Submitted by Kevin Crawford’s COMI-2035 Computer Forensics Class

The dark web is a hidden subset of the internet that can only be accessed through special software. Because of this, many illegal activities happen on the dark web, including the sharing of personal information that hackers have acquired. So how can you protect yourself?

Protecting Your Cell Phone:

  • Download apps only from the App Store or Google Play.
  • Keep your software (Operating System and Apps) updated.
  • Don’t click links from text messages or email you don’t know.
  • Turn off Bluetooth and Wi-Fi when you’re not using them.
  • Use a lock screen with a PIN or fingerprint.
  • Use an antivirus app to keep your phone safe.
  • Use a VPN when on public Wi-Fi.
  • Check app settings, don’t let apps use your camera or location if not needed.

Protecting Your Desktop and Laptop:

  • Use antivirus software.
  • Use a non-administrator account for daily activities.
  • Keep your software (Operating System and Apps) updated.
  • Keep the firewall on to block unauthorized access.
  • Don’t download illegal or free movies/software from strange websites.
  • Use a VPN to keep your online activity private.
  • Back up your files often in the cloud or an external drive.
  • Be careful with emails, don’t click links unless you trust the sender.
  • Turn on encryption to protect your files if your computer is stolen.
  • Avoid using public Wi-Fi.
  • Avoid using untrusted websites.
  • Avoid clicking on pop-up windows.
  • Cover webcam when not in use to prevent unauthorized access.

Protecting Yourself Online:

  • Don’t go on dark web sites.
  • Use strong passwords that are hard to guess.
  • Use different passwords for each account.
  • Turn on 2-step verification.
  • Avoid sharing personal information online.
  • Keep your phone, computer, and apps updated.
  • Don’t click strange links or open weird emails.
  • Monitor your accounts for any suspicious activity.

If Your Info Is on the Dark Web

  • Change all your passwords right away.
  • Turn on 2-step verification for all accounts.
  • Tell your bank if your card or info was leaked.
  • Freeze your credit to stop identity theft.
  • Visit identitytheft.gov if someone is using your info.

 

Top