Settings
Language
Color Theme
What is password security?
Password security is the practice of using strong, well-managed passwords and regularly updating them to protect accounts and data from unauthorized access. It's a key layer of defense in cybersecurity.
Which of the following best describes password security?
Password security is using strong, unique passwords and updating them regularly to prevent unauthorized access to accounts and sensitive information.
View Options Again
Using “123456” because it’s simple and fast
Using strong, unique passwords to protect against unauthorized access
Writing all your passwords on a sticky note
Reusing the same password across multiple sites
Why are weak passwords a problem?
Weak passwords are a problem because they’re easy to crack and can lead to bigger issues like identity theft, financial loss, privacy breaches, and compromised accounts.
How weak passwords can lead to identity theft
Having a weak password gives attackers easy access to your accounts. They can steal personal details like your name, date of birth, address, or ID numbers. With that, they can impersonate you, open new accounts, or commit fraud in your name.
How weak passwords can lead to financial loss
Weak passwords make it easy for attackers to break into your banking or payment services. They can drain your funds, make unauthorized purchases, or redirect payments. In some cases, they might even lock you out and demand a ransom to regain access.
How weak passwords can lead to privacy breaches
Weak passwords give attackers an easy way into your accounts. Once inside, they can access personal and work emails, private documents, photos, and sensitive information. This kind of unauthorized access is a privacy breach.
Which of the following can be a consequence of having a weak password?
A weak password can let attackers compromise your account, where they can then access your financial accounts, steal money, make unauthorized purchases, or demand ransom to restore access.
View Options Again
Your device works slower due to the password length
Your account is more secure
Account compromise
Stronger antivirus protection
Is the following statement True or False:
It's okay to share your password with close friends or coworkers.
Sharing your password, even with someone you trust, increases the risk of it being leaked, misused, or accidentally exposed.
View Options Again
True
False
What makes a Strong password?
A strong password is long (at least 12 characters), unpredictable, and hard to guess. It should include a mix of uppercase and lowercase letters, numbers, and special characters. Avoid common words, names, or patterns like "1234" or "password.”
Which of the following is the strongest password?
LongP@ssw*rd*#*^ is the strongest because it’s long, unpredictable, and complex. This makes it tough for attackers to crack with brute-force or guessing tools.
View Options Again
LongP@ssw*rd*#*^
Password1233456
JanePassword
P@ssword*
Is the following statement True or False:
Is Security123 a strong password?
Security123 is NOT a strong password as it’s predictable, uses a common word, and follows an easy number sequence.
View Options Again
True
False
Which of the following is the weakest password?
abc123 is a weak password because it's short and one of the most commonly used combinations, making it an easy target for attackers.
View Options Again
cva951%
LongP@ssw*rd*#*^
abc123
P@ssword*
Is the following statement True or False:
Reusing passwords increases the risk of multiple accounts being compromised if one is breached.
Reusing passwords puts all your accounts at risk. If one site is breached, cybercriminals can use those same credentials to access your other accounts.
View Options Again
True
False
What are password managers?
A password manager is a secure tool that stores, generates, and autofills strong, unique passwords for every account you use. By remembering just one master password, you reduce the risk of password reuse and weak logins. It offers a simple way to boost security and make access easier across both your personal and professional life.
Which of the following is a smart solution if you struggle to remember or manage multiple passwords?
Using a trusted password manager is the most secure and reliable way to manage strong, unique passwords across multiple accounts. It helps you avoid the risks of weak, reused, or forgotten passwords.
View Options Again
Use a trusted password manager to store them securely
Just reset your password every time you forget it
Use the same password for every account
Save all your passwords in your email drafts on your computer
Importance of updating your password
Changing passwords on a regular basis reduces the window of opportunity for attackers if a data breach occurs.
How often should I change my password?
Changing your password regularly helps reduce the risk of long-term exposure if it’s ever compromised. It limits how long an attacker can use it undetected and ensures your accounts stay secure.
View Options Again
Once every 10 years
Regularly
Every time you log in
Only when you forget it
Is the following statement True or False:
Strong password security only matters when the information is sensitive.
Even accounts that seem low-risk can be valuable to attackers. They may be used to reset more important logins, gather personal information, or gain access to corporate systems. Strong password security is important for every account, not just the sensitive ones.
View Options Again
True
False
Is the following statement True or False:
It’s safe to use a family member’s name as your password if it’s easy to remember.
Names of family members are often shared on social media or found in public records. Attackers can use this information to guess passwords or include them in automated cracking tools. Strong passwords should be unpredictable and unrelated to your personal life.
View Options Again
True
False
The importance of password security
Using long, complex, and unique passwords, and storing them safely, helps protect your data, your privacy, and your organization. One weak password can lead to serious consequences, but strong habits keep you a step ahead.
Back
Next
Translation Correction
×
Select a translation to correct...
Begin the Guided Tour
[0, "Begin the Guided Tour", "Begin the Guided Tour"],
Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.
[1, "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.", "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action."],
Compose
[2, "Compose", "Compose"],
Folders
[3, "Folders", "Folders"],
Inbox
[4, "Inbox", "Inbox"],
Starred
[5, "Starred", "Starred"],
Draft
[6, "Draft", "Draft"],
Sent Mail
[7, "Sent Mail", "Sent Mail"],
Spam
[8, "Spam", "Spam"],
Trash
[9, "Trash", "Trash"],
[URGENT] Claim Your Work From Home Set-Up Payment
[10, "[URGENT] Claim Your Work From Home Set-Up Payment", "[URGENT] Claim Your Work From Home Set-Up Payment"],
Human Resources
[11, "Human Resources", "Human Resources"],
to
[12, "to", "to"],
Claim Your Work From Home Set-Up Payment
[13, "Claim Your Work From Home Set-Up Payment", "Claim Your Work From Home Set-Up Payment"],
Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of
[14, "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of", "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of"],
to ensure that you have a suitable home working set-up.
[15, "to ensure that you have a suitable home working set-up.", "to ensure that you have a suitable home working set-up."],
To receive the payment via payroll
[16, "To receive the payment via payroll", "To receive the payment via payroll"],
you will need to complete this
[17, "you will need to complete this", "you will need to complete this"],
acknowledgement form
[18, "acknowledgement form", "acknowledgement form"],
For more information on how to set up your home office space safely, please look at the
[19, "For more information on how to set up your home office space safely, please look at the", "For more information on how to set up your home office space safely, please look at the"],
Thank you
[20, "Thank you", "Thank you"],
The Human Resources Team
[21, "The Human Resources Team", "The Human Resources Team"],
This is an automatically generated email, please do not reply
[22, "This is an automatically generated email, please do not reply", "This is an automatically generated email, please do not reply"],
Is the following statement True or False
[23, "Is the following statement True or False", "Is the following statement True or False"],
View Options Again
[24, "View Options Again", "View Options Again"],
Email Subject: Urgent Action
[25, "Email Subject: Urgent Action", "Email Subject: Urgent Action"],
Phishing attacks are designed to put a
[26, "Phishing attacks are designed to put a", "Phishing attacks are designed to put a"],
time pressure on us to act fast
[27, "time pressure on us to act fast", "time pressure on us to act fast"],
This can cause us to skip much of the critical thinking we normally apply when browsing our emails
[28, "This can cause us to skip much of the critical thinking we normally apply when browsing our emails", "This can cause us to skip much of the critical thinking we normally apply when browsing our emails"],
Email Sender: Fradulent Address
[29, "Email Sender: Fradulent Address", "Email Sender: Fradulent Address"],
Email Sender: Fraudulent Address
[30, "Email Sender: Fraudulent Address", "Email Sender: Fraudulent Address"],
Attackers will often use
[31, "Attackers will often use", "Attackers will often use"],
obscure email addresses and use display names
[32, "obscure email addresses and use display names", "obscure email addresses and use display names"],
that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information
[33, "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information", "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information"],
Email Content: Engaging Topic
[34, "Email Content: Engaging Topic", "Email Content: Engaging Topic"],
Attackers often use a
[35, "Attackers often use a", "Attackers often use a"],
broad but important topic
[36, "broad but important topic", "broad but important topic"],
to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.
[37, "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.", "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes."],
Email Link: Phishing Website
[38, "Email Link: Phishing Website", "Email Link: Phishing Website"],
hovering over the link
[39, "hovering over the link", "hovering over the link"],
you'll see the true link location. Often this is enough to see the malicious intent.
[40, "you'll see the true link location. Often this is enough to see the malicious intent.", "you'll see the true link location. Often this is enough to see the malicious intent."],
Wrapping up
[41, "Wrapping up", "Wrapping up"],
If you
[42, "If you", "If you"],
spot anything suspicious
[43, "spot anything suspicious", "spot anything suspicious"],
with the email sender, subject, content, links or attachments
[44, "with the email sender, subject, content, links or attachments", "with the email sender, subject, content, links or attachments"],
Don't take the risk. Report the email to your IT or Security team for review.
[45, "Don't take the risk. Report the email to your IT or Security team for review.", "Don't take the risk. Report the email to your IT or Security team for review."],
Submit
[46, "Submit", "Submit"],
Next
[47, "Next", "Next"],
Back
[48, "Back", "Back"],
Malicious links will often appear with innocent looking text. By
[49, "Malicious links will often appear with innocent looking text. By", "Malicious links will often appear with innocent looking text. By"],
Correct!
[50, "Correct!", "Correct!"],
Incorrect
[51, "Incorrect", "Incorrect"],
True
[52, "True", "True"],
False
[53, "False", "False"],
Change language
[54, "Change language", "Change language"],
Current Language
[55, "Current Language", "Current Language"],
Use Browser Settings
[56, "Use Browser Settings", "Use Browser Settings"],
Select a language
[57, "Select a language", "Select a language"],
Change Language
[58, "Change Language", "Change Language"],
Please select a language
[59, "Please select a language", "Please select a language"],
Language
[60, "Language", "Language"],
Color Theme
[61, "Color Theme", "Color Theme"],
Color Theme And Background Selector
[62, "Color Theme And Background Selector", "Color Theme And Background Selector"],
Colorful Theme
[63, "Colorful Theme", "Colorful Theme"],
Select Theme
[64, "Select Theme", "Select Theme"],
Close
[65, "Close", "Close"],
Dark Theme
[66, "Dark Theme", "Dark Theme"],
Green Theme
[67, "Green Theme", "Green Theme"],
Purple Theme
[68, "Purple Theme", "Purple Theme"],
Light Theme
[69, "Light Theme", "Light Theme"],
Blue Theme
[70, "Blue Theme", "Blue Theme"],
Settings
[71, "Settings", "Settings"],
Theme Selected
[72, "Theme Selected", "Theme Selected"],
This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!
[73, "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!", "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!"],
Translation Correction
[74, "Translation Correction", "Translation Correction"],
Select a translation to correct...
[75, "Select a translation to correct...", "Select a translation to correct..."],
Original Text
[76, "Original Text", "Original Text"],
Correct Translation
[77, "Correct Translation", "Correct Translation"],
Translation to correct...
[78, "Translation to correct...", "Translation to correct..."],
Submissions are reviewed and applied within 48 hours.
[79, "Submissions are reviewed and applied within 48 hours.", "Submissions are reviewed and applied within 48 hours."],
Submit Correction
[80, "Submit Correction", "Submit Correction"],
Submission Successfully Sent
[81, "Submission Successfully Sent", "Submission Successfully Sent"],
Submission Error - Please Try Again
[82, "Submission Error - Please Try Again", "Submission Error - Please Try Again"],
Submission Sending...
[83, "Submission Sending...", "Submission Sending..."],
Mandatory Viewing
[84, "Mandatory Viewing", "Mandatory Viewing"],
Please watch the video from beginning to end before proceeding.
[85, "Please watch the video from beginning to end before proceeding.", "Please watch the video from beginning to end before proceeding."],
Ok
[86, "Ok", "Ok"],
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.
[87, "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.", "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant."],
Language translation for this training module has been disabled and explicitly set to the following language
[88, "Language translation for this training module has been disabled and explicitly set to the following language", "Language translation for this training module has been disabled and explicitly set to the following language"],
Password-Security
[89, "Password-Security", "Password-Security"],
What is password security?
[90, "What is password security?", "What is password security?"],
Password security is the practice of using strong, well-managed passwords and regularly updating them to protect accounts and data from unauthorized access. It's a key layer of defense in cybersecurity.
[91, "Password security is the practice of using strong, well-managed passwords and regularly updating them to protect accounts and data from unauthorized access. It's a key layer of defense in cybersecurity.", "Password security is the practice of using strong, well-managed passwords and regularly updating them to protect accounts and data from unauthorized access. It's a key layer of defense in cybersecurity."],
Which of the following best describes password security?
[92, "Which of the following best describes password security?", "Which of the following best describes password security?"],
Reusing the same password across multiple sites
[93, "Reusing the same password across multiple sites", "Reusing the same password across multiple sites"],
Using “123456” because it’s simple and fast
[94, "Using “123456” because it’s simple and fast ", "Using “123456” because it’s simple and fast "],
Using strong, unique passwords to protect against unauthorized access
[95, "Using strong, unique passwords to protect against unauthorized access ", "Using strong, unique passwords to protect against unauthorized access "],
Writing all your passwords on a sticky note
[96, "Writing all your passwords on a sticky note", "Writing all your passwords on a sticky note"],
Password security is using strong, unique passwords and updating them regularly to prevent unauthorized access to accounts and sensitive information.
[97, " Password security is using strong, unique passwords and updating them regularly to prevent unauthorized access to accounts and sensitive information. ", " Password security is using strong, unique passwords and updating them regularly to prevent unauthorized access to accounts and sensitive information. "],
Why are weak passwords a problem?
[98, "Why are weak passwords a problem?", "Why are weak passwords a problem?"],
Weak passwords are a problem because they’re easy to crack and can lead to bigger issues like identity theft, financial loss, privacy breaches, and compromised accounts.
[99, "Weak passwords are a problem because they’re easy to crack and can lead to bigger issues like identity theft, financial loss, privacy breaches, and compromised accounts. ", "Weak passwords are a problem because they’re easy to crack and can lead to bigger issues like identity theft, financial loss, privacy breaches, and compromised accounts. "],
How weak passwords can lead to identity theft
[100, "How weak passwords can lead to identity theft", "How weak passwords can lead to identity theft"],
Having a weak password gives attackers easy access to your accounts. They can steal personal details like your name, date of birth, address, or ID numbers. With that, they can impersonate you, open new accounts, or commit fraud in your name.
[101, "Having a weak password gives attackers easy access to your accounts. They can steal personal details like your name, date of birth, address, or ID numbers. With that, they can impersonate you, open new accounts, or commit fraud in your name. ", "Having a weak password gives attackers easy access to your accounts. They can steal personal details like your name, date of birth, address, or ID numbers. With that, they can impersonate you, open new accounts, or commit fraud in your name. "],
How weak passwords can lead to financial loss
[102, "How weak passwords can lead to financial loss ", "How weak passwords can lead to financial loss "],
Weak passwords make it easy for attackers to break into your banking or payment services. They can drain your funds, make unauthorized purchases, or redirect payments. In some cases, they might even lock you out and demand a ransom to regain access.
[103, "Weak passwords make it easy for attackers to break into your banking or payment services. They can drain your funds, make unauthorized purchases, or redirect payments. In some cases, they might even lock you out and demand a ransom to regain access. ", "Weak passwords make it easy for attackers to break into your banking or payment services. They can drain your funds, make unauthorized purchases, or redirect payments. In some cases, they might even lock you out and demand a ransom to regain access. "],
How weak passwords can lead to privacy breaches
[104, "How weak passwords can lead to privacy breaches ", "How weak passwords can lead to privacy breaches "],
Weak passwords give attackers an easy way into your accounts. Once inside, they can access personal and work emails, private documents, photos, and sensitive information. This kind of unauthorized access is a privacy breach.
[105, "Weak passwords give attackers an easy way into your accounts. Once inside, they can access personal and work emails, private documents, photos, and sensitive information. This kind of unauthorized access is a privacy breach.", "Weak passwords give attackers an easy way into your accounts. Once inside, they can access personal and work emails, private documents, photos, and sensitive information. This kind of unauthorized access is a privacy breach."],
Which of the following can be a consequence of having a weak password?
[106, "Which of the following can be a consequence of having a weak password?", "Which of the following can be a consequence of having a weak password?"],
Account compromise
[107, "Account compromise ", "Account compromise "],
Your device works slower due to the password length
[108, "Your device works slower due to the password length", "Your device works slower due to the password length"],
Stronger antivirus protection
[109, " Stronger antivirus protection ", " Stronger antivirus protection "],
Your account is more secure
[110, "Your account is more secure", "Your account is more secure"],
A weak password can let attackers compromise your account, where they can then access your financial accounts, steal money, make unauthorized purchases, or demand ransom to restore access.
[111, "A weak password can let attackers compromise your account, where they can then access your financial accounts, steal money, make unauthorized purchases, or demand ransom to restore access. ", "A weak password can let attackers compromise your account, where they can then access your financial accounts, steal money, make unauthorized purchases, or demand ransom to restore access. "],
It's okay to share your password with close friends or coworkers.
[112, "It's okay to share your password with close friends or coworkers. ", "It's okay to share your password with close friends or coworkers. "],
Sharing your password, even with someone you trust, increases the risk of it being leaked, misused, or accidentally exposed.
[113, "Sharing your password, even with someone you trust, increases the risk of it being leaked, misused, or accidentally exposed. ", "Sharing your password, even with someone you trust, increases the risk of it being leaked, misused, or accidentally exposed. "],
What makes a Strong password?
[114, "What makes a Strong password? ", "What makes a Strong password? "],
A strong password is long (at least 12 characters), unpredictable, and hard to guess. It should include a mix of uppercase and lowercase letters, numbers, and special characters. Avoid common words, names, or patterns like "1234" or "password.”
[115, "A strong password is long (at least 12 characters), unpredictable, and hard to guess. It should include a mix of uppercase and lowercase letters, numbers, and special characters. Avoid common words, names, or patterns like "1234" or "password.” ", "A strong password is long (at least 12 characters), unpredictable, and hard to guess. It should include a mix of uppercase and lowercase letters, numbers, and special characters. Avoid common words, names, or patterns like "1234" or "password.” "],
Which of the following is the strongest password?
[116, "Which of the following is the strongest password?", "Which of the following is the strongest password?"],
JanePassword
[117, "JanePassword ", "JanePassword "],
LongP@ssw*rd*#*^
[118, "LongP@ssw*rd*#*^ ", "LongP@ssw*rd*#*^ "],
Password1233456
[119, "Password1233456 ", "Password1233456 "],
P@ssword*
[120, "P@ssword* ", "P@ssword* "],
LongP@ssw*rd*#*^ is the strongest because it’s long, unpredictable, and complex. This makes it tough for attackers to crack with brute-force or guessing tools.
[121, "LongP@ssw*rd*#*^ is the strongest because it’s long, unpredictable, and complex. This makes it tough for attackers to crack with brute-force or guessing tools.", "LongP@ssw*rd*#*^ is the strongest because it’s long, unpredictable, and complex. This makes it tough for attackers to crack with brute-force or guessing tools."],
Is Security123 a strong password?
[122, "Is Security123 a strong password?", "Is Security123 a strong password?"],
Security123 is NOT a strong password as it’s predictable, uses a common word, and follows an easy number sequence.
[123, "Security123 is NOT a strong password as it’s predictable, uses a common word, and follows an easy number sequence.", "Security123 is NOT a strong password as it’s predictable, uses a common word, and follows an easy number sequence."],
Which of the following is the weakest password?
[124, "Which of the following is the weakest password? ", "Which of the following is the weakest password? "],
cva951%
[125, "cva951% ", "cva951% "],
LongP@ssw*rd*#*^
[126, "LongP@ssw*rd*#*^", "LongP@ssw*rd*#*^"],
abc123
[127, "abc123", "abc123"],
P@ssword*
[128, "P@ssword*", "P@ssword*"],
abc123 is a weak password because it's short and one of the most commonly used combinations, making it an easy target for attackers.
[129, "abc123 is a weak password because it's short and one of the most commonly used combinations, making it an easy target for attackers.", "abc123 is a weak password because it's short and one of the most commonly used combinations, making it an easy target for attackers."],
Reusing passwords increases the risk of multiple accounts being compromised if one is breached.
[130, "Reusing passwords increases the risk of multiple accounts being compromised if one is breached.", "Reusing passwords increases the risk of multiple accounts being compromised if one is breached."],
Reusing passwords puts all your accounts at risk. If one site is breached, cybercriminals can use those same credentials to access your other accounts.
[131, "Reusing passwords puts all your accounts at risk. If one site is breached, cybercriminals can use those same credentials to access your other accounts.", "Reusing passwords puts all your accounts at risk. If one site is breached, cybercriminals can use those same credentials to access your other accounts."],
What are password managers?
[132, "What are password managers? ", "What are password managers? "],
A password manager is a secure tool that stores, generates, and autofills strong, unique passwords for every account you use. By remembering just one master password, you reduce the risk of password reuse and weak logins. It offers a simple way to boost security and make access easier across both your personal and professional life.
[133, "A password manager is a secure tool that stores, generates, and autofills strong, unique passwords for every account you use. By remembering just one master password, you reduce the risk of password reuse and weak logins. It offers a simple way to boost security and make access easier across both your personal and professional life. ", "A password manager is a secure tool that stores, generates, and autofills strong, unique passwords for every account you use. By remembering just one master password, you reduce the risk of password reuse and weak logins. It offers a simple way to boost security and make access easier across both your personal and professional life. "],
Which of the following is a smart solution if you struggle to remember or manage multiple passwords?
[134, "Which of the following is a smart solution if you struggle to remember or manage multiple passwords?", "Which of the following is a smart solution if you struggle to remember or manage multiple passwords?"],
Use the same password for every account
[135, "Use the same password for every account ", "Use the same password for every account "],
Just reset your password every time you forget it
[136, "Just reset your password every time you forget it", "Just reset your password every time you forget it"],
Save all your passwords in your email drafts on your computer
[137, "Save all your passwords in your email drafts on your computer", "Save all your passwords in your email drafts on your computer"],
Use a trusted password manager to store them securely
[138, "Use a trusted password manager to store them securely ", "Use a trusted password manager to store them securely "],
Using a trusted password manager is the most secure and reliable way to manage strong, unique passwords across multiple accounts. It helps you avoid the risks of weak, reused, or forgotten passwords.
[139, "Using a trusted password manager is the most secure and reliable way to manage strong, unique passwords across multiple accounts. It helps you avoid the risks of weak, reused, or forgotten passwords. ", "Using a trusted password manager is the most secure and reliable way to manage strong, unique passwords across multiple accounts. It helps you avoid the risks of weak, reused, or forgotten passwords. "],
Importance of updating your password
[140, "Importance of updating your password ", "Importance of updating your password "],
Changing passwords on a regular basis reduces the window of opportunity for attackers if a data breach occurs.
[141, "Changing passwords on a regular basis reduces the window of opportunity for attackers if a data breach occurs.", "Changing passwords on a regular basis reduces the window of opportunity for attackers if a data breach occurs."],
How often should I change my password?
[142, "How often should I change my password?", "How often should I change my password?"],
Only when you forget it
[143, "Only when you forget it ", "Only when you forget it "],
Every time you log in
[144, "Every time you log in", "Every time you log in"],
Regularly
[145, "Regularly", "Regularly"],
Once every 10 years
[146, "Once every 10 years ", "Once every 10 years "],
Changing your password regularly helps reduce the risk of long-term exposure if it’s ever compromised. It limits how long an attacker can use it undetected and ensures your accounts stay secure.
[147, "Changing your password regularly helps reduce the risk of long-term exposure if it’s ever compromised. It limits how long an attacker can use it undetected and ensures your accounts stay secure. ", "Changing your password regularly helps reduce the risk of long-term exposure if it’s ever compromised. It limits how long an attacker can use it undetected and ensures your accounts stay secure. "],
Strong password security only matters when the information is sensitive.
[148, "Strong password security only matters when the information is sensitive.", "Strong password security only matters when the information is sensitive."],
Even accounts that seem low-risk can be valuable to attackers. They may be used to reset more important logins, gather personal information, or gain access to corporate systems. Strong password security is important for every account, not just the sensitive ones.
[149, "Even accounts that seem low-risk can be valuable to attackers. They may be used to reset more important logins, gather personal information, or gain access to corporate systems. Strong password security is important for every account, not just the sensitive ones. ", "Even accounts that seem low-risk can be valuable to attackers. They may be used to reset more important logins, gather personal information, or gain access to corporate systems. Strong password security is important for every account, not just the sensitive ones. "],
It’s safe to use a family member’s name as your password if it’s easy to remember.
[150, "It’s safe to use a family member’s name as your password if it’s easy to remember.", "It’s safe to use a family member’s name as your password if it’s easy to remember."],
Names of family members are often shared on social media or found in public records. Attackers can use this information to guess passwords or include them in automated cracking tools. Strong passwords should be unpredictable and unrelated to your personal life.
[151, "Names of family members are often shared on social media or found in public records. Attackers can use this information to guess passwords or include them in automated cracking tools. Strong passwords should be unpredictable and unrelated to your personal life. ", "Names of family members are often shared on social media or found in public records. Attackers can use this information to guess passwords or include them in automated cracking tools. Strong passwords should be unpredictable and unrelated to your personal life. "],
The importance of password security
[152, "The importance of password security ", "The importance of password security "],
Using long, complex, and unique passwords, and storing them safely, helps protect your data, your privacy, and your organization. One weak password can lead to serious consequences, but strong habits keep you a step ahead.
[153, "Using long, complex, and unique passwords, and storing them safely, helps protect your data, your privacy, and your organization. One weak password can lead to serious consequences, but strong habits keep you a step ahead.", "Using long, complex, and unique passwords, and storing them safely, helps protect your data, your privacy, and your organization. One weak password can lead to serious consequences, but strong habits keep you a step ahead."],
[154, "", ""],
Original Text (English)
Correct Translation (English)
Submissions are reviewed and applied within 48 hours.
Color Theme And Background Selector
×
Colorful Theme
Select Theme
Blue Theme
Select Theme
Light Theme
Select Theme
Purple Theme
Select Theme
Green Theme
Select Theme
Dark Theme
Select Theme
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.