|
Post by account_disabled on Nov 25, 2023 23:16:28 GMT -5
Phishing : As we saw in the article “ Phishing. What it is and how to defend yourself "in the case of phishing, it is the users themselves who hand over their credentials to hackers believing they are responding to a communication from a well-known and authoritative company which has instead been falsified by scammers in the hope that someone will "take the bait". Past data breaches : Hackers may Special Data attempt to gain access to systems using sensitive data disclosed from past breaches. This technique can be particularly dangerous if you never change your login credentials or reuse old passwords. Guidelines for a secure password How should a secure password be composed? What are the rules that should be taken into account in order to create a hacker-proof password? The most secure passwords are the most complex and difficult to guess. The complexity of a password is due to a series of factors which we can summarize in 3 categories : Knowledge/identity factors Simplicity factors Structure rules. How to create a strong password: Knowledge/identity factors Knowledge/identity factors are elements linked to the user's identity or personal information potentially easily available online on various social profiles such as: Name and surname Date and place of birth Address and place of residence Telephone number Name of relatives, friends and pets. These elements must be absolutely avoided in passwords, because being relatively easy to obtain, they would make decoding very simple.
|
|