Security

Passwords

Password Creation

You’re in good company if you are at the point where you want to set up one easy password for everything--but this potentially puts the security of the digital accounts that you use at very high risk. Easy-to-remember passwords can be too easy to remember. Often, your password is all that stands between sensitive information and hostile, thieving criminals -- also known as crackers, or black-hatted hackers.

Criminals are good at guessing passwords. This is why some systems auto-lock down your account after three attempts. Criminals also use software to guess at words, word combinations, and mutated words at the rate of millions of guesses a second. If they already know information about you, it will be even easier to guess.

They count on security fatigue. Did you know that in cases where password databases have been infiltrated, analysts find that common choices were “password”, “123456”, and “abc123”.

Though it may seem that an address, birthdate, pet’s name, telephone number, and similar options are better than 123, these are also too easy for criminals to discover. Your password should not reference information about you, especially if it’s online in your email, on Instagram, in a shopping account, and elsewhere on the Internet where it can be accessed.

What is a strong password? How can you outsmart intruders, and not yourself?

Strong passwords mix characters, typically numbers, punctuation marks, upper and lowercase letters. They may even include an international character or two. Depending on the permitted length, some experts advise passwords be at least eight, if not twelve characters long. The longer, the harder to guess.

Creating strong passwords from a security phrase or a mnemonic can help balance security with memory.

For example:

To use a security phrase, combine 3 or 4 words that would not belong together in a sentence. e.g. parallelweatherdeep.  Then consider applying a code to add complexity by using one you devised to substitute letters, numbers, and punctuation. e.g. p@r@ll3lw3@th3rd33p

Mnemonics. Identify a familiar phrase that you can remember, and use the first letter of each word to start a password. e.g. One if by land, two if by sea. = oibltibs Next, use use a code to add complexity. e.g. !0iBltiBs

Having created strong and memorable passwords, heed the advice of security experts: Don’t reuse a good password. Even if you choose a strong password, it may be leaked. Guard against it being discovered and used by an intruder to access other accounts.

Store your passwords safely. For instance, don’t save them in an email. Don’t share passwords. Others may not be as careful. And, when using a communal

computer, remember to log out of a private account before you walk away.

Antioch Employees:  You are responsible for maintaining security and confidentiality of information stored on systems and computers. Along with using strong passwords, we are asked explicitly not to share passwords and other types of account authorizations with others. Read the Acceptable Use of Electronic Resources Policy (8.101) to fully understand the guidance and responsibilities pertaining to this area.

Password Resets

AUDirect can be used by Antioch students, applicants, faculty and staff to quickly access a variety of Antioch University applications, services, and information. AUDirect uses your personal, non-Antioch email address to communicate information needed to perform password changes and User ID reminders. If you do not have access to this email account, or have not provided a personal, non-Antioch email address, you should contact the helpdesk at 866-662-0056 for all user id/password related issues. To set up access to AUDirect, follow the steps found here, download the AUDirect Password Reset guide, or watch the video guide

Avoiding Phishing Scams

Phishing is an e-mail fraud method in which someone sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. Typically, the messages appear to come from well known and trustworthy people or organizations (e.g. the "Antioch Email Administrator") or Web sites. 

To report phishing in Gmail, click the drop-down arrow next to “Reply” and select “Report phishing.” 

More on Phishing:

https://support.google.com/accounts/answer/75061?hl=en

Malware

Short for malicious software, malware is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Common forms of malware include viruses (a type of malware spread by automatic copying from disks or computer networks and intended to interrupt or destroy the functioning of a computer), worms (a type of computer malware that replicates itself onto other programs, commonly used with email messages allowing it to move from file to file and computer to computer), and Trojan horses (a type of computer malware that is disguised to be a known or useful program but contains unexpected or harmful program codes that are activated when it is used). 

All Antioch University-owned computers have anti-Malware software installed on them before they are deployed, including all computers in the various computer labs and libraries at all our campus locations. This software automatically updates and should not be tampered with or disabled. If you have problems with the anti-Malware software installed on an Antioch University-owned computer, please consult a member of the IT Services staff or contact the Help Desk.

Regarding privately owned computers and electronic devices, you are strongly urged to install anti-Malware software (if you have not already done so) and keep it up to date. Recommendations for anti-malware software can be found on the Minimum Computing Requirements page.

Physical Security

Some common sense suggestions for protecting hardware, programs, and data from physical circumstances and events that could cause serious losses or damage: