{"id":33203,"date":"2008-10-21T00:00:00","date_gmt":"2008-10-21T05:00:00","guid":{"rendered":"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/21\/discussing-cyber-security-muscle-up-those-passwords\/"},"modified":"2008-10-21T00:00:00","modified_gmt":"2008-10-21T05:00:00","slug":"discussing-cyber-security-muscle-up-those-passwords","status":"publish","type":"post","link":"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/21\/discussing-cyber-security-muscle-up-those-passwords\/","title":{"rendered":"Discussing cyber security &#8212; Muscle up those passwords"},"content":{"rendered":"<div class=\"panel body-content\"><div class=\"panel__container\"><p><I>(EDITOR&#8217;S NOTE: October is National Cyber Security Awareness as Month. The following is the second in a series of stories from UNMC Information Technology Services that highlight aspects of cyber security.)<\/I><\/p>\n<p>Using strong passwords is important because they are the entry point to UNMC&#8217;s IT resources. Misused or stolen passwords can give intruders access to not only these resources, but also to employees&#8217; personal information. <\/p>\n<p>When creating a password, ensure that the password is &#8220;strong&#8221; by meeting the following criteria:<\/p>\n<p><BR>1. Passwords should have at least seven characters, with at least one alphabetic and one numeric character. (Lotus Notes requires eight characters)<br \/>\n<BR>2. Passwords should contain at least one lower case and one upper case alphabetic character.<br \/>\n<BR>3. Weak passwords should NEVER be used because they can easily be guessed. The following are examples of weak passwords and should not be used:<br \/>\n<UL><LI>Words in a dictionary;<br \/>\n<LI>Derivatives of user ids;<br \/>\n<LI>Common character sequences such as 123456;<br \/>\n<LI>Personal details such as spouse&#8217;s name, license plate, social security number or birthday unless accompanied by additional unrelated characters; and<br \/>\n<LI>Any part of speech including proper names, geographical locations, common acronyms and slang.<\/UL><\/p>\n<p>It is recommended to use a &#8220;pass phrase&#8221; rather than a &#8220;password.&#8221; An example of a pass phrase would be &#8220;Nolv4me&#8221;. <a href=\"http:\/\/www.microsoft.com\/protect\/yourself\/password\/checker.mspx\" target=\"_blanK\" rel=\"noopener\">Click here<\/a> to test the strength of your password.<\/p>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Using strong passwords is important because they are the entry point to UNMC&#8217;s IT resources. Misused or stolen passwords can give intruders access to not only these resources, but also to employees&#8217; personal information.<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-33203","post","type-post","status-publish","format-standard","hentry","category-uncategorized","department-unmc-today-todays-headlines"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Discussing cyber security -- Muscle up those passwords<\/title>\n<meta name=\"description\" content=\"Using strong passwords is important because they are the entry point to UNMC&#039;s IT resources. Misused or stolen passwords can give intruders access to not only these resources, but also to employees&#039; personal information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/21\/discussing-cyber-security-muscle-up-those-passwords\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Discussing cyber security -- Muscle up those passwords\" \/>\n<meta property=\"og:description\" content=\"Using strong passwords is important because they are the entry point to UNMC&#039;s IT resources. Misused or stolen passwords can give intruders access to not only these resources, but also to employees&#039; personal information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/21\/discussing-cyber-security-muscle-up-those-passwords\/\" \/>\n<meta property=\"og:site_name\" content=\"Newsroom\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/unmcedu\" \/>\n<meta property=\"article:published_time\" content=\"2008-10-21T05:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Karen Burbach\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@unmc\" \/>\n<meta name=\"twitter:site\" content=\"@unmc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Karen Burbach\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/21\/discussing-cyber-security-muscle-up-those-passwords\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/21\/discussing-cyber-security-muscle-up-those-passwords\/\"},\"author\":{\"name\":\"Karen Burbach\",\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/person\/ee8fa869fc007fb3f02acf871a6c41d8\"},\"headline\":\"Discussing cyber security &#8212; Muscle up those passwords\",\"datePublished\":\"2008-10-21T05:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/21\/discussing-cyber-security-muscle-up-those-passwords\/\"},\"wordCount\":227,\"publisher\":{\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/#organization\"},\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/21\/discussing-cyber-security-muscle-up-those-passwords\/\",\"url\":\"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/21\/discussing-cyber-security-muscle-up-those-passwords\/\",\"name\":\"Discussing cyber security -- Muscle up those passwords\",\"isPartOf\":{\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/#website\"},\"datePublished\":\"2008-10-21T05:00:00+00:00\",\"description\":\"Using strong passwords is important because they are the entry point to UNMC's IT resources. Misused or stolen passwords can give intruders access to not only these resources, but also to employees' personal information.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/21\/discussing-cyber-security-muscle-up-those-passwords\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/21\/discussing-cyber-security-muscle-up-those-passwords\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/21\/discussing-cyber-security-muscle-up-those-passwords\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.unmc.edu\/newsroom\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Discussing cyber security &#8212; Muscle up those passwords\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/#website\",\"url\":\"https:\/\/www.unmc.edu\/newsroom\/\",\"name\":\"Newsroom\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.unmc.edu\/newsroom\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/#organization\",\"name\":\"University of Nebraska Medical Center\",\"url\":\"https:\/\/www.unmc.edu\/newsroom\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2022\/08\/overview-1.png\",\"contentUrl\":\"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2022\/08\/overview-1.png\",\"width\":500,\"height\":153,\"caption\":\"University of Nebraska Medical Center\"},\"image\":{\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/unmcedu\",\"https:\/\/x.com\/unmc\",\"https:\/\/instagram.com\/iamunmc\",\"https:\/\/www.youtube.com\/user\/UNMCEDU\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/person\/ee8fa869fc007fb3f02acf871a6c41d8\",\"name\":\"Karen Burbach\",\"url\":\"https:\/\/www.unmc.edu\/newsroom\/author\/45c48cce2e2d7fbdea1afc51c7c6ad26\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Discussing cyber security -- Muscle up those passwords","description":"Using strong passwords is important because they are the entry point to UNMC's IT resources. Misused or stolen passwords can give intruders access to not only these resources, but also to employees' personal information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/21\/discussing-cyber-security-muscle-up-those-passwords\/","og_locale":"en_US","og_type":"article","og_title":"Discussing cyber security -- Muscle up those passwords","og_description":"Using strong passwords is important because they are the entry point to UNMC's IT resources. Misused or stolen passwords can give intruders access to not only these resources, but also to employees' personal information.","og_url":"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/21\/discussing-cyber-security-muscle-up-those-passwords\/","og_site_name":"Newsroom","article_publisher":"https:\/\/www.facebook.com\/unmcedu","article_published_time":"2008-10-21T05:00:00+00:00","author":"Karen Burbach","twitter_card":"summary_large_image","twitter_creator":"@unmc","twitter_site":"@unmc","twitter_misc":{"Written by":"Karen Burbach","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/21\/discussing-cyber-security-muscle-up-those-passwords\/#article","isPartOf":{"@id":"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/21\/discussing-cyber-security-muscle-up-those-passwords\/"},"author":{"name":"Karen Burbach","@id":"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/person\/ee8fa869fc007fb3f02acf871a6c41d8"},"headline":"Discussing cyber security &#8212; Muscle up those passwords","datePublished":"2008-10-21T05:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/21\/discussing-cyber-security-muscle-up-those-passwords\/"},"wordCount":227,"publisher":{"@id":"https:\/\/www.unmc.edu\/newsroom\/#organization"},"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/21\/discussing-cyber-security-muscle-up-those-passwords\/","url":"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/21\/discussing-cyber-security-muscle-up-those-passwords\/","name":"Discussing cyber security -- Muscle up those passwords","isPartOf":{"@id":"https:\/\/www.unmc.edu\/newsroom\/#website"},"datePublished":"2008-10-21T05:00:00+00:00","description":"Using strong passwords is important because they are the entry point to UNMC's IT resources. Misused or stolen passwords can give intruders access to not only these resources, but also to employees' personal information.","breadcrumb":{"@id":"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/21\/discussing-cyber-security-muscle-up-those-passwords\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.unmc.edu\/newsroom\/2008\/10\/21\/discussing-cyber-security-muscle-up-those-passwords\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.unmc.edu\/newsroom\/2008\/10\/21\/discussing-cyber-security-muscle-up-those-passwords\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.unmc.edu\/newsroom\/"},{"@type":"ListItem","position":2,"name":"Discussing cyber security &#8212; Muscle up those passwords"}]},{"@type":"WebSite","@id":"https:\/\/www.unmc.edu\/newsroom\/#website","url":"https:\/\/www.unmc.edu\/newsroom\/","name":"Newsroom","description":"","publisher":{"@id":"https:\/\/www.unmc.edu\/newsroom\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.unmc.edu\/newsroom\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.unmc.edu\/newsroom\/#organization","name":"University of Nebraska Medical Center","url":"https:\/\/www.unmc.edu\/newsroom\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/logo\/image\/","url":"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2022\/08\/overview-1.png","contentUrl":"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2022\/08\/overview-1.png","width":500,"height":153,"caption":"University of Nebraska Medical Center"},"image":{"@id":"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/unmcedu","https:\/\/x.com\/unmc","https:\/\/instagram.com\/iamunmc","https:\/\/www.youtube.com\/user\/UNMCEDU"]},{"@type":"Person","@id":"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/person\/ee8fa869fc007fb3f02acf871a6c41d8","name":"Karen Burbach","url":"https:\/\/www.unmc.edu\/newsroom\/author\/45c48cce2e2d7fbdea1afc51c7c6ad26\/"}]}},"_links":{"self":[{"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/posts\/33203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/comments?post=33203"}],"version-history":[{"count":0,"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/posts\/33203\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/media?parent=33203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/categories?post=33203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/tags?post=33203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}