Enter your name and work email so we can record your training completion.
Learn how to create strong passwords, protect your work accounts, recognize manipulation tactics, and stay aware of physical security around your workspace.
~10 minutes
Your password is the lock on your HR portal, your email, and every other work account. If someone guesses or steals it, they can access your personal information: pay stubs, tax forms, home address, Social Security number, and bank details.
The single most important factor in password strength is length. A long password made of simple words is much harder to crack than a short password full of symbols.
Instead of a single complicated word, use a passphrase: four or more random words strung together. Pick words that create a picture in your mind so you can remember them.
The short password can be guessed by automated tools in minutes. The passphrase is 26 characters and would take centuries to crack, but you can picture a purple fish dancing on a Tuesday.
Your password is yours alone. No one at this company will ever need it, including IT, your manager, or HR. If someone asks for your password for any reason, that is a red flag.
Use a different password for every work system you log into. If you have a login for the HR portal, your email, and any other work application, each one should have its own unique password.
If one account is compromised and you used the same password on your other work accounts, the attacker now has access to all of them.
Someone watching over your shoulder as you type your password or view sensitive information is called shoulder surfing. This can happen in the office, at a job site, or anywhere you use a device.
Always lock your screen when stepping away, even for a few minutes. On Windows, press Windows key + L to lock instantly. It takes one second and prevents anyone from accessing your accounts.
Avoid writing passwords on sticky notes, under your keyboard, or anywhere visible at your workspace. If you need help remembering passwords, the passphrase method makes them easy to remember.
Pretexting is when an attacker invents a believable scenario to manipulate you into giving up information, access, or taking an action you normally would not. Unlike phishing emails, pretexting can happen by phone, in person, or through any channel.
Attackers create convincing stories designed to make you act quickly without thinking. These scenarios are crafted to feel urgent, helpful, or authoritative so you lower your guard.
Here is a quick recap of what you learned in this module. Keep these points in mind as you take the quiz.
Length is the most important factor. Use passphrases of 4+ random words (16+ characters). Never use your name, birthday, or company name as a password.
Never share your password with anyone. Use a unique password for every work system. If you think a password is compromised, change it immediately and notify IT.
Be aware of your surroundings. Lock your screen when you step away (Windows + L). Watch for shoulder surfing. Do not write passwords down.
Verify before you act. No one at this company will ever ask for your password. When someone creates urgency or pressures you to skip a normal process, that is the red flag. Slow down and verify through a known channel.
Answer all 5 questions based on what you just read.
Passing score: 80% (4 out of 5)