April 23, 2025
Trending News

World Password Day: A Guide to Having the Best Without Hacking Risks

  • May 6, 2022
  • 0

World Password Day. (Photo: TN) As every year, it is considered the first Thursday of May World Password Day That’s why Infobae provides the guide To make sure

World Password Day: A Guide to Having the Best Without Hacking Risks
World Password Day.  (Photo: TN)
World Password Day. (Photo: TN)

As every year, it is considered the first Thursday of May World Password Day That’s why Infobae provides the guide To make sure all users are more careful when creating passwords, As well as for Confirm access for personal or corporate use and achieve greater security.

“A large number of users make mistakes, such as using the same combination for all of their logins. “Such an obstacle becomes the main key to accessing absolutely everything that concerns the individual,” he assures us. Pablo Lima, d.VU South Cone Sales Director.

And that is what is done daily, becomes iInternetAnd to do this you need to activate accounts and profiles on most of the platforms used. A password is required to create a profile to make sure the person is the only one who can access these identifiers.

The problem is that the vast majority of people always use the same password for all the different profiles they have and in most cases, These passwords are easy to guess, So they do not respect your authority, your protection and make reports vulnerable to theft of personal information.

According to a report by UBA Security Analysis and the use of password managers, people manage access certificates with a low level of security. ᲡIn fact, Here are some alarming facts:

– 69% of users use the same password for more than one service.

– 82% admitted that they forgot their password.

– 51% of respondents do not change the password or do so only upon request.

– and 64% manage by remembering them.

This is the best way to authenticate or authenticate

Weak or easily identifiable passwords can lead to identity theft during purchases, loans, duplicate credit cards, and other fraudulent transactions.

What usually happens is PhishingRandom combination tests and / or keylogger, A complex program that records the pressing of buttons to extract to an external server.

For this reason, password security is the number one hurdle that prevents most online accounts from being hacked. Identity verification is based on combination Three factors that create strong authentication:

1. “I know something” Such as PIN, password or specific data.

2. “I have something”, As Device External (USB drive, mobile token or smart card).

3. Finally, but the least used, “Something I am” Such as face (facial recognition), our fingerprints or our own voice.

Combining At least two of these factors Causes a significant security barrier.

PIN.  (Photo: Solvetic)
PIN. (Photo: Solvetic)

So you can safely manage passwords

Although cybercriminals are constantly updated and constantly looking for new ways to steal users’ personal data, their procedures often have common features, meaning that most cases can be avoided. thus, Paul Lima We offer the following recommendations for password protection:

– Enable second factor authentication

The use of multi-factor authentication to verify user identity is based on the premise that unauthorized third parties may not provide the elements required for access.

Therefore, if the item is compromised, The attacker must cross at least one additional barrier Before you can access the target account.

Companies E-commercePlatforms, Social mediaBanking services or Applications Allowing you to turn on the second factor option, which increases security, 100% restriction of fraud cases. For example, dual authentication or biometric systems, fingerprint sensor or face recognition.

Two-factor authentication.  (Photo: Ubuntulog)
Two-factor authentication. (Photo: Ubuntulog)

– Do not use public Wi-Fi networks

This point, first of all, should not be done Buses, airports or shopping malls, Because they are often not protected.

Password illustration.  (Photo: as.com)
Password illustration. (Photo: as.com)

– Use a strong password

Change the default password; Avoid repeating key data or numbers sequentially. The strongest passwords are the ones that consist of both Letters, as in numbers, which also have alternate uppercase and lowercase letters, symbols, and more.

There are similar sites https://haveibeenpwned.com/ Where you can identify password disclosure or not.

Check Point Software also provided these tips:

1 CCharacter combination: Using words that are in the dictionary, or that are related to the user’s personal life, is a fairly common but dangerous practice.

two. Different password for each item: There are so many apps or services that users have to manage today that the temptation to use one password for everyone is great. Nevertheless, it is necessary to be different for each service.

3. The longer, the stronger: True, the longer the combination, the harder it will be to remember. But that’s the only way to keep her safe. Password length is a defining quality.

Keep reading



Source: Info Bae

Leave a Reply

Your email address will not be published. Required fields are marked *