You are on page 1of 1

ACCOUNT SECURITY:

SECURING ONLINE
ACCOUNTS
Why Does my Account Need
Security?
• Security Breaches occur when a user's online account is
accessed without authorization.

• When accounts are breached, illegitimate users can gain


access to personal information such as: financials,
personal messages, photos, passwords and contact
lists.

• Unauthorized users can also post illicit, embarrassing


information on the account holder’s social media
accounts.

How do Security Breaches Happen?


1. A logged-in computer is left unattended.

2. If a user's password is saved on a publically accessed


computer.

3. If a computer or smart device was stolen and all


passwords are saved.

4. If a hacker obtains access to a user's password.

Password Protection
Aside from signing out regularly both on personal and publically
devices, it is important to choose password(s) that are complex.

To prevent the unauthorized access of personal and sensitive


information, changing one's password often is key to enhanced safety.
NEVER write one's password anywhere, neither physically or virtually.

Ideal passwords should be non-dictionary words that use a variety of


letters (both uppercase and lowercase), numbers and symbols such as:
&, !, *, ?.

Two-Step Factor Verification


An integral tool in harboring security for a user is Two-Step Factor Verification.

A temporary, usually time sensitive code is produced on another device (usually a


cell phone) that the account holder possesses.

This helps prevent hackers, who are attempting to sign in from a different device,
knowing the code.

This method also provides users additional access, so if a password is forgotten or


changed by someone else, the user has a chance of still gaining access.

Source:
Teaching in IST. IST 110: Introduction to Information, People
And Technology | Teaching in IST. (n.d.).
https://teaching.ist.psu.edu/courses/undergrad/ist/110

You might also like