Mary Immaculate College Password Best Practice Guidelines Purpose The purpose of these best practice guidelines is to establish a standard for the creation of strong passwords and keeping them confidential. By following these guidelines you are conforming to our Password Policy and you are also making it more difficult for an unauthorised person to access your information. Scope This policy applies to all College Staff, Students and Third parties who are issued with usernames and passwords for any College IT System or device. Password Construction Guidelines The following information provides tips for creating and remembering passwords and password phrases. Use more than one word: Instead of only using the name of someone you know, choose something about that person no one else knows about, for instance “Allisonsbear5”. Use symbols instead of characters: Many people tend to put the required symbols and numbers at the end of a word they know, for instance, "Allison1234". Unfortunately, this is relatively easy to break. Once the name is discovered, the attacker has only four more relatively easy characters to guess. Instead, replace one or more of the letters within the word with symbols that you'll easily recall. For example, try substituting "@" for "A", "!" for "l", a zero (0) for an "O", a "$" for an "S", and a "3" for an "E". With substitutions such as these, "@llis0nbe@r", "A!!isonB3ar", and "A//i$onBear" are all recognizable to you, but they would be extremely difficult to guess or break. Choose events or people that are on your mind: To remember a strong password that will have to change in 120 days, try selecting an upcoming personal or public event. Be sure to make it a phrase of two or more words, and continue to use symbols. For example: "J0hn$Gr@du@tion". Use phonetics in the words: In general, password dictionaries used by attackers search for words embedded inside your password. As mentioned before, don't hesitate to use the words, but make sure you liberally sprinkle those words with embedded symbols. Use first letters of a phrase: To create an easy-to-remember and strong password, begin with a properly capitalized and punctuated sentence that is easy for you to remember. For example: "My daughter Kay goes to the International School." Next, take the first letter of each word in your sentence, preserving the capitalization used in the sentence. In the example above "MdKgttIS" would be the result. You might use an "@" to replace an "a" or use an "!" to replace an "L". After one such substitution the example password above would be "MdKgtt!S"—a very difficult password to break. Password Protection Standards Do not use the same password for MIC accounts as for other non MIC access. Where possible, don't use the same password for various MIC access needs. Do's: Combine letters, symbols, and numbers that are easy for you to remember and hard for someone else to guess. Create pronounceable passwords (even if they are not words) that are easier to remember, reducing the temptation to write down your password. Use different passwords on different systems. Try out using the initial letters of a phrase you love, especially if a number or special character is included. Take two familiar things, and then wrap them around a number or special character. Alternatively, change the spelling to include a special character. Here are a few examples: "Phone + 4 + you" = "Phone4you" or "Fone4y0u" "cat + * + Mouse" = "cat*Mouse" or "cat*Mou$e" Don'ts: Don't use personal information such as derivatives of your user ID, names of family members, maiden names, cars, telephone numbers, pets, birthdays, addresses, or hobbies. Don't use any word in any language spelled forward or backward. Don't create new passwords that are substantially similar to ones you've previously used. Don't reveal a password in an email message Don't talk about a password in front of others Don't hint at the format of a password (e.g., "my family name") Don't reveal a password on questionnaires or security forms Do not use the "Remember Password" feature of applications Again, do not write passwords down and store them anywhere in your office. Watch for attackers trying to trick you through phone calls or email messages requesting that you reveal your passwords.
© Copyright 2026 Paperzz