{"id":84,"date":"2017-01-30T16:47:45","date_gmt":"2017-01-30T16:47:45","guid":{"rendered":"https:\/\/blog.bham.ac.uk\/itsecurity\/?p=84"},"modified":"2018-08-22T14:42:17","modified_gmt":"2018-08-22T14:42:17","slug":"genuine-password-change-notice","status":"publish","type":"post","link":"https:\/\/blog.bham.ac.uk\/itsecurity\/2017\/01\/30\/genuine-password-change-notice\/","title":{"rendered":"Genuine Password Change Notice"},"content":{"rendered":"<h2><em><strong>Please note that there is now an updated version of this notice.\u00a0 Please see the <a href=\"https:\/\/blog.bham.ac.uk\/itsecurity\/2018\/08\/22\/new-password-expiry-notice\/\">following article.<\/a><\/strong><\/em><\/h2>\n<p>IT security policy requires password changes every 180 days. \u00a0In order to achieve this, passwords are set to expire approximately every 180 days. Warnings and reminders are sent in the period running up to password expiry times. \u00a0This has been well established\u00a0for staff and is being rolled out for students.<\/p>\n<p>Some of you have been questioning whether or not genuine password change notices are phishing attacks. \u00a0We are pleased that people are being alert to the possibility of malicious email attacks. \u00a0However, we thought it would be useful to post an example of a genuine password change notification and highlight some of features that distinguish it from a phishing attack.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-88 size-full\" src=\"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2017\/01\/genuine-password-change-reminder-1.jpg\" alt=\"Example of genuine passsword change reminder from PasswordManager@contacts.bham.ac.uk\" width=\"1081\" height=\"769\" srcset=\"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2017\/01\/genuine-password-change-reminder-1.jpg 1081w, https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2017\/01\/genuine-password-change-reminder-1-300x213.jpg 300w, https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2017\/01\/genuine-password-change-reminder-1-768x546.jpg 768w, https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2017\/01\/genuine-password-change-reminder-1-1024x728.jpg 1024w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Please note that there is now an updated version of this notice.\u00a0 Please see the following article. IT security policy requires password changes every 180 days. \u00a0In order to achieve this, passwords are set to expire approximately every 180 days. Warnings and reminders are sent in the period running up to password expiry times. \u00a0This &hellip; <a href=\"https:\/\/blog.bham.ac.uk\/itsecurity\/2017\/01\/30\/genuine-password-change-notice\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Genuine Password Change Notice&#8221;<\/span><\/a><\/p>\n","protected":false},"author":84,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-84","post","type-post","status-publish","format-standard","hentry","category-genuine-notifications"],"_links":{"self":[{"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/posts\/84","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/users\/84"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/comments?post=84"}],"version-history":[{"count":5,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/posts\/84\/revisions"}],"predecessor-version":[{"id":516,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/posts\/84\/revisions\/516"}],"wp:attachment":[{"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/media?parent=84"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/categories?post=84"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/tags?post=84"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}