It is becoming easier for cybercriminals to access users’ personal information. The first step to avoiding it? Create a strong password that combines random words in multiple languages, letters, and numbers … This is what you should keep in mind.
The increase in applications, social networks, mail servers, and websites of all kinds that require passwords to be used makes users tend to create simple keys and repeat them in different accounts so as not to forget them, which greatly facilitates the third party to get in. Therefore, the division of cybersecurity of Entergy has produced a guide to aspects to consider when creating a secure password.
Create a robust key with simple guidelines
A strong password should be more than eight characters and include letters, numbers, and signs, without common words and that is not related to any personal information, such as a partner, work, hobbies, etc. Something advisable would be, for example, that they consist of several words and in different languages, without any relation between them, with special characters inserted between each letter.
Change the password periodically
The minimum recommended is every six months. Or, if there is an account or application that the user has not accessed for a long time, the most cautious thing to do is to change it at that very moment, in case someone had accessed during that period of inactivity.
Activate double authentication
More and more platforms are betting on not only requesting a password, but it is also necessary to enter a password that can either be reached through an SMS or an application such as Google Authenticator.
Use a password manager
These are tools that allow the user to store all this data under a single account and password. Also, many of these tools are responsible for creating complex passwords for the services in which a user is registered, changing them even periodically, and freeing the user from this tedious task.
Use biometric solutions as a complement
Many devices allow the use of technologies that are based on an individual’s physical characteristics: fingerprint, iris scanner, facial recognition, etc. The main advantages offered by these systems reside, mainly, in their practical impossibility of being used by another person, given that they depend on the characteristics of a single individual. Without a doubt, the level of protection offered by these measures can be much higher than that allowed by an alphanumeric password. However, depending on the technology, sometimes they may suffer a gap, so the idea is to combine it with the password.