In the private and corporate spheres, password management is key to computer security. This aspect should be noted with the seriousness it deserves because it depends on whether or not the possibilities of attacks by cybercriminals are maximized.

What should we do and what not to have strong passwords?

There are a series of rules that must be met to avoid possible theft of security keys and subsequent access to accounts by third parties:

Do not use short passwords that can be deduced through social engineering. Here you can include the dates of birth, pet names, or data that have to do with the user or their relatives.

Do not make changes such as the typical substitutions of “e” for “3”, “o” for “0”, “A” for “4”, and so on.

There is a list of the worst passwords that reflects those that should never be used.

Passwords that have certain alphanumeric characters, some of which must be uppercase and another that is a symbol, are formulas that cybercriminals also know and that they will try to access the system.

Ideally, create passwords that are easy for the user to remember, but difficult for anyone else to guess.

Combining words unrelated except for whoever is building the password is a fairly safe method since the relationship between them is only established by the user himself.

Good password management minimizes the risk of attacks

One of the most important rules when it comes to good password management is not to reuse them to enter different parts of the network.

By using several passwords to access various internet websites, if someone manages to guess one of them, they will not be able to use it to enter other accounts, affecting the security of computer systems

A good practice is to change passwords from time to time; with this, it is achieved that, if after a while a filtration occurs, no one can reuse it.

Of course, keys should never be shared; first so that the person with whom it has been shared does not try to enter that account, and second to prevent it from falling into other hands that misuse them.

Double Authentication: A Good Choice for Password Security

This is two-step verification.  In other words, to enter a website or identify you to a service, a second check is required, after having entered the password.

This can be done in several ways:

In certain cases, it is a question of sending an SMS containing a code that must be put after the password.

Other times it is necessary to create a pin interacting with the app using the mobile, for example.

And in the last case, you can resort to password managers. These are responsible for creating strong access codes for those network services in which the user is registered and even change them periodically.

With password managers, you only need to remember the master password to access them. It is convenient to change them from time to time so that computer security is not affected.

Leave a Comment