[vc_row][vc_column][vc_column_text]Contar con una polÃtica de seguridad de datos, es indispensable para cualquier empresa, por lo que comenzar a protegerlos con contraseñas seguras es un elemento clave. Caso contrario, las empresas arriesgarÃan la información de sus empleados, ingresos y clientes.
Why is IT security a necessity?
In Latin America, cyber-attacks increased 24% in the first 8 months of 2021, according to Kaspersky. Why? Remote work is one of the main causes, since the rapid migration of many companies to this modality did not allow it to be done with the necessary security measures. Especially if there was no technological support.
Cyber attacks are generally directed against micro, small and medium-sized companies. They do not have all the tools to deal with it.
Knowing how your passwords can be stolen is the first step in learning more about the subject:
How can your passwords be stolen?Â
There are four main methods of password theft:
- Brute force attacks.
It is the most common and often seen in movies but with a degree of fantasy. It is usually not that simple and many times we are the ones who unknowingly reveal our passwords to hackers.
- Phishing and Spyware
Phishing is quite famous. It is one of the preferred options for hackers.
A platform that looks legitimate is used: some page or email to encourage you to click on a link with a fake login to steal data.
On the other hand, this link may lead you to download spyware that records your passwords.
An example: you receive an email from the bank (with a simulated page), asking you to log in. The page is fake, designed to look like this platform. By entering your data, you are actually sending it to a hacker.
- Use of common passwords
Another widely used way is to test different passwords, using a computer program, on random user accounts.
Usually filtered password lists are used, since many users use the same password for all websites.
Having secure passwords will be one of the first lines of defense to avoid being a victim of this type of attack. Here we recommend three key elements.
3 keys to create a secure passwordÂ
1. Length
The more characters your password has, the more secure it is. A short password has a high probability of being deciphered in a few minutes. It is recommended to use at least 12 characters.
2. Avoid personal information
Your personal information should be out of your options when creating the password. If it is information that people know or is public on social networks, it is best not to use it.
3. One-time password
It's time to repeat the process for all your accounts. It can be tedious, but protecting your business information is worth it. Each platform should have a different password from the rest.
For this, there are also products like Zoho Directory, which help to have a single sign-on, securely. Contact us for more information
In the second part of this series, we will discuss in depth how to create a secure password and protect all your passwords from one place.
Want more online security tips? Our team of consultants is available to provide consulting services.
[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column text_align=”center” width=”1/1″][minti_button link=”http://www.etixen.com/es/contacto/” target=”_blank” color=”color-2″ size=”medium”]CONTACTANOS[/minti_button][/vc_column][/vc_row]