Page 24 - How to be Cyber Safe + Savvy
P. 24

CHAPTER 2: Connecting Devices With Confidence
 Start with passwords
The first and perhaps most important setting to consider on your phone is the one that controls who can unlock it. Depending on the kind of device you have, this setting might be called a “passcode,” “password,” “PIN,” “Touch ID,” “Face ID,” “fingerprint,”
or something else along these lines. Whatever the term, the security prin- ciples in play extend to larger discus- sions of passwords that will come later in the book. For now, be sure
to choose a strong, unique password for your device that you can easily remember, then keep it to yourself. This approach is the foundation for building and maintaining effective passwords for online accounts, as we will see in chapters 3 and 4.
In our real-life relationships, we put time, thought, effort, and feeling into assessing how much we can trust other people with information and objects
near and dear to us. With machines, the lines of communication and ex- change are much more constrained. Alexa and Siri, for example, can quickly become unsatisfying partners in con-
versation when topics go beyond driv- ing directions, requests to play music, or questions about the weather. To establish ourselves as “trustworthy” to computers, we use passwords to
   24 CYBER SAFE + SAVVY


























































































   22   23   24   25   26