Experts and studies agree: in an increasingly digital world, users are not protecting ourselves in the right and necessary way. To cite one, Carnegie Mellon University in the United States estimated that people access an average of 26.3 websites with passwords. But nevertheless, in 80% of cases these are repeated, something not recommended.
In our electronic devices such as computers, mobiles and tablets we keep not only all our personal data, too material and conversations We want them to remain private. That is why it is necessary to put laziness aside and spend time informing and applying, at least, basic security measures that go beyond having a password.
Here we tell you everything that needs to be taken into account and that any user, regardless of your computer knowledge, Can apply.
It may seem obvious but it is worth remembering that we must never reveal our passwords to anyone, however trustworthy we consider that person.
It is also not convenient to automatically save passwords in browsers and shared computers. This option is useful on a computer that only we have access to but should not be done under any circumstances if that is not the case.
You have to be very careful with the links in the emails. We must not click unless we are completely sure of the veracity of the sender. These links can take us to websites that download us malware or to direct us to another that imitates a legitimate page, but whose purpose is steal our passwords.
Finally, it is recommended to always have installed a good antivirus and updated software.
Change your passwords regularly
The Center for Systems and Network Analysis of the US National Security Agency recommends changing our passwords systematically every 90 days.
although you can do it once a year or every month, the important thing is that you change them. To remember you can make it coincide with the change of season, an important date or write it on the agenda.
A password, a site
Use also a different password for each site. If you find yourself unable to remember them all, you can use a password manager that stores passwords and synchronizes them.
1Password is one of the most popular administrators and is available for Windows, Mac, Android and iOS. On the other hand, a good free alternative It's KeePassX.
Use complex or long keys
Some password managers also have the function of being able to generate for you very complex passwords, without the need for you to break the coconut.
It is recommended to choose keys of between 10 and 12 digits to alternate uppercase, lowercase, numbers and special symbols. However, you can also reduce the difficulty, especially if you are not going to use an administrator, making them a complete sentence with semantic meaning. In fact, a long password is better than a complex but short one.
It is also not recommended to change a password for a variant of an old.
You don't create an algorithm
Some people generate an algorithm creating a sequence which includes several elements in which only one of them changes. For example: year of birth, name of a pet and site for which the password is used. In this example, only the last word would change, depending on where we entered the password.
The problem with these types of passwords is that, once the system has been decrypted, it's easy to decode all the keys generated following this system.
Although it is still better than using the same password on several sites, create an algorithm It is not as secure as a completely random password.
Two step verification
On this page you can check which services offer two-step verification. It is a system that sends us to the mobile a one-time code every time we try to access to the service in question or when it detects a suspicious attempt.
In this way, he makes sure that it is us and not another person who is behind the screen. Activate this option whenever possible.
Check the authorizations
It is very common to find our Google, Twitter and Facebook accounts access to a service to authenticate through them. The problem is that, with this action, we are also giving you certain permissions to access our accounts.
That is why it is important to review from time to time what we have given access to and clean authorizations to sites that we don't use or that we don't know.
Use the biometric options
If the device has biometric options such as identification by fingerprint, voice recognition or facial identification, use them. They are very secure, especially when they are also combined with a password.
Beware of public Wi-Fi
When you connect to a public internet network you are placing yourself in a situation of significant digital vulnerability. However, it is possible to take precautions by activating the public Wi-Fi connection brand. This function can be found in the Control Panel of the device.
Nor do you share files and avoid making financial transactions, purchases and accessing websites that request access data.