PASSWORD SECURITY

User information security is important!

We see that some people’s passwords in institutions are not secure enough. The Information Technology unit cannot see what your passwords are, but when they are examined in the systems, they can check their length and how secure or difficult they are. Be sure to create a unique password to prevent anyone else from breaking into any of your accounts. Please make your MS Windows login password, your Gmail (@okul.k12.tr – corporate) email address password, etc. stronger. Here are a few tips for creating and securely protecting your password:

  • Do not share your password with anyone.
  • Do not write your password anywhere other than the relevant place.
  • Use 2-Step Verification (e.g. Google https://www.google.com/landing/2step/?hl=tr )
  • Change your password periodically.
  • Do not choose a word from the dictionary as your password. Be creative. (E.g. Dilek – False, 5fsa6_DFA – True)
  • Include punctuation.
  • Use uppercase and lowercase letters together.
  • Use numbers.
  • Different characters make a password difficult to guess.

What you need to do to make yourself safe on the internet;

  1. Pay attention to the distinction between uppercase and lowercase letters when entering your username and password.

Do not give your password to anyone else and ensure that it cannot be seen during login.

The new password you give should not be an easily guessable password such as name, date of birth, children’s names, or a series selected on the keyboard (ZXCVBN). The password must contain uppercase letters, lowercase letters, special characters (?!’^$) and numbers. Example: ieSD4€B

Create all your passwords with at least 8-16 digits and broken characters as much as possible:

example: 5fsa62DFA’_?!1?A

Otherwise, it would not take a very long time for someone with bad intentions and good understanding of these things to crack a password like “234AFda3”.2. Answer your secret questions as we said in point 1.

Example: -What is your mother’s name?

Correct answer: Fr9aksew?_1!fa56

Wrong answer: Wish

  1. Never add people you do not know to your list, do not chat, do not trust or share your information. Even if it is someone you think you know, ask them 2-3 questions to understand who that person is really (because it could be a robot, a hacker, a hacker, etc.);

e.g.

-Do you remember where we went with you last?

-Was your mother unwell? how was it ?

etc.

The person you think you know on the internet may be someone else or a bot, they may send you a picture, and when you open that picture, your computer may be taken over by that person or that system. Even clicking on an internet address can cause all your information on your computer and on the internet to be transferred to the other party in a few seconds, thanks to the trojan.

  1. Try not to access the internet from internet cafes or places where you can use public computers. If you need to log in, log out by logging out of your email, then clear your history from the internet options, so that you do not leave any footprints behind. Because if you do not clear the memory, all your information can be accessed through cookie information. In some internet cafes, your information can be captured by using keyloggers or screenshot capturing tools, you should somehow check it before sitting in front of the computer. You should never enter your bank information, you can use a virtual credit card if you want to shop online or if you have to.
  2. In terms of software, use Antivirus, Antitrojan, Anti Spy and Firewall on your machine. My suggestions;

a) For antivirus;

Norton or Mcafee (class A)

Esed Nod32, Kaspersky, Microsoft Security Endpoint (Class B) if your Microsoft operating system is original

There may also be free antivirus programs (AVG, Antivir, Rising Antivirus)

b) Antitrojan program;

If you use Norton 360, you also have all the antitrojan and other components.

My suggestion; Emsisoft Anti-Malware/Anti-Trojan Software and hijackthis

c) Anti spy;

Spybot searfch and destroy and hijackthis

d) A professional managed Firewall;

Symantec Internet Security

6.

Do not write or send your password over the phone, via SMS, or in response to an e-mail sent to you.

7.

Browser programs provide an Auto Complete option to facilitate user login. For the security of your user code, turn off this feature. (e.g. internet explorer » tools » internet options » advanced » use inline autocomplete section should not be selected.)

8.

If you need to leave your computer while the program is open, do not leave the program open. Lock your screen using Windows-L keys. If it needs to remain on, activate the password protected screen protection (For detailed information: Read the “Protecting files using a screen saver password” section in Windows help and support).

9.

Generally, after logging into the system on websites, there is no access for 10 minutes.

Çerez Politikası | Gizlilik Politikası | Kullanım koşulları
Cookie Policy | Privacy Policy | Terms of Use | GPDR