Show Sidebar Log in
  • REGISTER
  • Login
MeetingArk
  • Home
  • Resource Centre
    • Resource Centre Home
    • The Meeting Post Blog
    • MeetingArk Wiki
    • Social Networks
    • Podcasts
    • People
    • Site-wide Activity
  • Discussion Groups
    • Meeting Stages…
      • Arranging a meeting
      • Commencing a meeting
      • Running a meeting
      • Participating in a meeting
      • Meeting etiquette
      • Closing a meeting
      • Meeting feedback and follow-up
    • Other Discussions…
      • Meeting Humour
      • Meeting Companies
      • Authors and Books
      • Meeting Technologies
  • Meeting FAQ
    • FAQ1: Arranging a meeting
    • FAQ2: Commencing a meeting
    • FAQ3: Running a meeting
    • FAQ4: Participating in a meeting
    • FAQ5: Meeting etiquette
    • FAQ6: Closing a meeting
    • FAQ7: Meeting feedback and follow-up
  • Meeting Analysis
    • Analysis Overview
    • Rate Your Meeting
    • Analysis Results
  • Help Centre
    • Send a Message
    • Managing Email Notifications
  • Support Us
  • Contact
  • About
    • About MeetingArk
    • Our Future Plans
    • Image Credits
    • Privacy Policy
    • Terms of Use
    • Creative Commons (CC) Licence
    • Cookie Policy (UK)

Home » Password Best Practices

Password Best Practices

Passwords are ubiquitous these days and choosing ones that are hard to guess and easy to remember is challenging. The following tips will help make your digital life more secure.

Don’t share your passwords with anyone. Even if someone is claiming to help you, it is probably a scam. IT departments and customer service representatives know not to ask customers for passwords. If you did share a password, change it as soon as possible.

Don’t use the same password for your accounts. If hackers guess your password, you can be sure they will try it on your other accounts.

If possible, use two-factor authentication.  Two-factor authentication adds another layer of security to your account. Even if someone successfully hacks your password, he or she still needs to have access to a token that is sent to your mobile device. Read more about two factor authentication and how to enable it on many popular websites here: https://www.turnon2fa.com/.

Create long passwords. Use at least 16 characters if possible.

Passwords should be easy to remember but hard to guess.

  • Try to use sentences or phrases.  Avoid single words, or a word preceded or followed by a single number. Hackers use databases of words to guess passwords.
  • Don’t use birthdays, home addresses, or the names of your significant others. Hackers mine social media accounts for password clues.

Make your password complex.  Use upper and lower case letters, numbers, and special characters. Try to have at least one of each of these in your password.

Don’t create a document on your computer with all your passwords. Hackers can easily search hard drives for password information if they get access to your computer or mobile device.

Use a password manager. Password managers store your passwords securely and allow for extremely complex passwords which you do not need to remember. Typically, you have one master password that you need to access your entire collection of passwords. Make sure you can access them across multiple devices. If you use a password manager on a school computer, make sure to sign out before you finish. Here are some examples of free password managers:

  • LastPass: https://lastpass.com/
  • KeePass: https://keepass.info/
  • Keeper: https://keepersecurity.com/
  • Password Safe: https://pwsafe.org/
  • Dashlane: https://dashlane.com/

Archives

  • May 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • August 2020

Recent Blog Posts

  • To Record or Not to Record?
  • Exploring Agendas
  • What is a Meeting?
  • ‘A Meeting of Minds’
  • Meeting Feedback & Follow-up

Welcome to MeetingArk

Log In
Register Lost Password

Social Sharing

RSS
Follow by Email
Facebook
Facebook
fb-share-icon
Twitter
Visit Us
Follow Me
Tweet
Youtube
Youtube
Pinterest
Pinterest
fb-share-icon
LinkedIn
LinkedIn
Share
Instagram
  • Creative Commons (CC) Licence
  • Privacy Policy
  • Terms of Use
  • Help Page
  • Contact
  • Cookie Policy (UK)
  • Terms & conditions
Powered by Commons In A Box

MeetingArk

  • Home
  • Resource Centre
    • Back
    • Resource Centre Home
    • The Meeting Post Blog
    • MeetingArk Wiki
    • Social Networks
    • Podcasts
    • People
    • Site-wide Activity
    • Back
  • Discussion Groups
    • Back
    • Meeting Stages…
      • Back
      • Arranging a meeting
      • Commencing a meeting
      • Running a meeting
      • Participating in a meeting
      • Meeting etiquette
      • Closing a meeting
      • Meeting feedback and follow-up
      • Back
    • Other Discussions…
      • Back
      • Meeting Humour
      • Meeting Companies
      • Authors and Books
      • Meeting Technologies
      • Back
    • Back
  • Meeting FAQ
    • Back
    • FAQ1: Arranging a meeting
    • FAQ2: Commencing a meeting
    • FAQ3: Running a meeting
    • FAQ4: Participating in a meeting
    • FAQ5: Meeting etiquette
    • FAQ6: Closing a meeting
    • FAQ7: Meeting feedback and follow-up
    • Back
  • Meeting Analysis
    • Back
    • Analysis Overview
    • Rate Your Meeting
    • Analysis Results
    • Back
  • Help Centre
    • Back
    • Send a Message
    • Managing Email Notifications
    • Back
  • Support Us
  • Contact
  • About
    • Back
    • About MeetingArk
    • Our Future Plans
    • Image Credits
    • Privacy Policy
    • Terms of Use
    • Creative Commons (CC) Licence
    • Cookie Policy (UK)
    • Back
MeetingArk
Manage Cookie Consent
We use cookies to optimise our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}
Skip to toolbar
  • About WordPress
    • WordPress.org
    • Documentation
    • Support
    • Feedback
  • Log in
  • Register
  • Settings