Authentication is the process of verifying the identity of a user, device, or system. It ensures that the user attempting to access the system is who or what they claim to be.
A password is a common security measure people use for their devices or accounts. Using a confidential and unique password is one of the best ways to verify your identity and keep your personal information safe.
Multi-factor authentication is a security process that requires users to provide two or more verification factors to gain access to a device or account. It strengthens security by combining multiple factors of user authentication, which can include:
- Something you know – Passwords, a PIN, or answers to security questions;
- Something you have – Smart cards, security tokens, or mobile devices; and
- Something you are – Your fingerprint, facial recognition, or voice verification.
Safety Tips for Individuals
- Choose strong passwords that have at least 8 characters and make those characters a random combination of upper- and lower-case letters, numbers, and special characters (e.g., !, $, or #).
- Use passwords that do not contain personal information, like a birthday, or a pet’s name, as these are easier for cyber criminals to guess. It is also best to avoid common patterns or words, such as “Password” or “qwerty123.”
- Create unique passwords for different accounts to reduce the risk of multiple accounts being compromised due to a single exposed password.
- Change your password if you believe it has been or could be, compromised. It is best practice to change your passwords often.
- Keep your password a secret. Passwords should not be shared with anyone.
- Only use devices you trust to sign in to your accounts. Public or shared devices may be unsafe.
- Consider using an authenticator app to reduce your dependency on cellular services.
- Monitor account activity and notifications for suspicious logins or unauthorized access attempts. Report any suspicious activity to your service provider immediately.
Safety Tips for Organizations
- Promptly deactivate accounts when employees leave the organization to prevent unauthorized access.
- Encourage employees to use unique passwords and to update their passwords often to prevent potential breaches.
- Set up automatic lockouts or alerts after a set number of unsuccessful login attempts to reduce the success of brute-force attacks.