Strong passwords: recommendations for creating and remembering them

Date:

Share:

Every year, the importance of having strong passwords is reminded (Photo: AdobeStock)

Although it sounds absurd, the most used passwords in the world are still the consecutive passwords on the keyboard. with 12345 in the lead.

Like every first Thursday of May, the “World Password Day” , an initiative promoted by several companies in the field of IT and cybersecurity to make users aware of the importance of using robust methods to guarantee unequivocal identification.

Officials from various cybersecurity companies give basic recommendations that users should follow to safely navigate the network.

Because the most used passwords are always -in this order- 12345, 123456 and 1234567 ; because many users use the simplest keyboard sequence (qwerty); because they use the same key for all services and applications; and because very few people choose to create a strong password, with at least ten characters, including uppercase, lowercase, numbers and special symbols (+,-, $,€,@ or others).

Techniques for memorizing passwords

Spanish cybersecurity technician Ángela García Valdés says that while it may seem like a tedious task, nothing could be further from the truth, as memory rules or techniques can be used to generate strong passwords and remember them. simply and without errors.

  • Use password managers. But be careful, because some can also bring security problems. Among the safest and most recommended of 2022 are:
  1. Dashlane: Secure file sharing, in-depth online security assessment, and personalized security alerts that help you monitor security risks as they arise.
  2. Keeper – Protects your passwords with tight encryption and lets you have multiple forms of two-factor authentication to keep hackers out.
  3. RoboForm: Automatically captures and stores passwords directly in organized folders, making it easy to find what you’re looking for.
  4. LastPass – Strong encryption and user-friendly design that includes a password and username generator, as well as storage for secure and credit card information.
  • Use mnemonic rules . Different specialists have shared the ones they use to remember their passwords. (It goes without saying that the use of the examples below is not recommended.)
  1. Look for a famous phrase or popular saying ; cites as an example that “In a place in La Mancha whose name” and the addition of a “+3” would make the password “EuldLMdcn+3” practically indecipherable.
  2. Use our favorite song and generate the password using the initial letter of each word in the chorus or the verse we like. For example, if the sentence is “If you tell me to come, I’ll leave everything”, our password will be “stmdvldt”.
  3. Choose commonly used words and replace vowels with numbers or signs. Example: if we choose a shoe store, the password would be Z4p4t%r14. To this you can add character at the beginning and end to make it more robust ( +Z4p4t%r14- ).

How should a strong password be?

  • Minimum length of eight characters
  • Combine uppercase, lowercase, numbers and special characters (+,-, $,€,@)
  • Be unique for each service or application
  • Also not be related to the user (names, designated dates or hobbies).

Mistakes that expose our privacy

  • Write them down in a notebook or on post-it notes in front of other people
  • Use the same for many services
  • Use the simplest keyboard strings (123456 or qwerty)
  • Use expressions made or related to the user himself.
Strong passwords: recommendations for creating and remembering them

The password is only the first link

Although there are already many systems that avoid having to enter a password or credentials, the number of services that still require this type of authentication is still huge, and 98% of web pages continue to request these passwords without offering any other possibility. identification.

Hervé Lambert (Panda Security) explains that the password should only be the first security factor and that ideally these factors should be based on something that only the user”to know ” (Your password), “to have (a security token or electronic key) or “be (a biometric measure).

The classic example is the ATM, where you need a physical card and a PIN code; or that of many web pages, which already require a password first, then a code sent as a text message to a device to log in or complete an operation.

Source: TN

━ more like this

LEAVE A REPLY

Please enter your comment!
Please enter your name here