Username and Password Security _

In an increasingly complex _ world, Great Western Bank () is always striving to __ their part to protect customers, from online banking __. Below are some quick _ from GWB’s Information Security _ to keep in mind _ you can do to __ yourself and your family.

Username Best Practices

  • Don’t use your email __ a username.
  • Avoid user names that too simple, similar to __ else or just your _.
  • Create a user name _ is non-identifiable but not __ complex you can’t remember.
  • Use a minimum of 10 or more characters including _ and lowercase letters, numbers special characters. Some websites _ have their own requirements.
  • Avoid using your social number, specific dates tied __ your identity i.e. birth _, your full name or of your address or number.
  • Use different user names different online accounts.
  • Don’t choose a username _ gives clues to your _ such as a series __ numbers/letters or the first _ of a two-part phrase, _ as knock-knock or starlight.
  • DO choose a username _&;_ appropriate for the type __ account, i.e., business, social __ personal.

Password Best Practices

  • Complexity:  One of the first _ to focus on is complexity. Strong passwords are _, the more characters you _ the stronger the password. _ for a minimum of 14 characters in your password. __ addition, we highly encourage use of passphrases, passwords _ up of multiple words. include “It’s time for &; or “block-curious-sunny-leaves”. Passphrases are _ easy to remember and _, yet meet the strength __.&_;_, or weak, passwords have following characteristics:
    • Contain eight characters or _.
    • Contain personal information such __ birthdates, addresses, phone numbers, __ names of family members, _, friends, and fantasy characters.
    • Contain number patterns such __ aaabbb, qwerty, zyxwvuts, or 123321.
    • Are some version of “Welcome123” “Password123” “Changeme123”
  • Sharing: This is a _ practice! Once a password __ shared, you lose accountability, cannot track who did _ because people have shared . In addition, once a is shared it may _ more shared then expected, _ with unethical individuals.
  • Dual Use: Using the same for multiple accounts should __ limited to non-critical accounts _, if at all. If _ Facebook, Flickr and Blog passwords are the same, _ is perhaps acceptable risk. _ is not acceptable is _ Flickr login and password the same as your _ or online banking login password.
  • Public Computers: Do not log _ confidential networks from public _, such as at an cafe, hotel lobby or __ terminal. These computers may __ infected or at the _ least residing on compromised . Only authenticate on trusted __ you control.
  • Phishing: No one should _ ask you for your . If someone asks for _ password assume they are __ attacker.
  • Owned: Most compromised passwords _ from keystroke logging malware, brute forcing. If you want to protect your _, then protect your computer _ getting infected!

Related Posts

Stock image of a dollar bill and the words Covid-19 on top.

Fraud Alert: Unemployment Payment _

These are tough times, _ many confused and uncertain their financial future. It __ at times like this _ scammers are the most _, and we have to special attention to make _ less vulnerable.

Back