How do we manage our passwords ?
Did you know that the weakness of passwords is one of the doors the most exploited by the hacker? The simpler they are, the more you expose yourself to all kinds of risks .
Why is it important to define a policy for changing our access codes and integrating it into our lifestyle? To control what is controllable .
This preventive action is an effective way that could save you a lot of trouble. That being said, it will ask some organization ans discipline to changing passwords and make them more complex to crack.
Where to start?
- First, you could make a list of all your accounts (usernames and passwords) and classified them by importance (high-medium-low):
– Computer, tablet and phone
– Bank accounts and cards
– Social networks
– DATAenligne Customer Area
- Emails Accounts
- Determine how often you want to change a password.
- Schedule this activity to your calendar.
Avoid using the same password
for all your accounts .
To help you define and implement your password change management policy, download this document which will guide you.
Generate complex access, but easy to manage
There are trusted tools to help you create and keep your passwords safe. Among the most popular applications are 1Password and TrueKey . These applications allow you to generate complex passwords combining upper and lower case letters, numbers and symbols.
If you want to work with this type of application, I invite you to do your research to choose the one that suits you best. Alternatively, you can create your own password and keep it safe out of prying eyes.
There are good generators on the Internet. They are free , but you will have to copy them into a digital document (e.g. Word, Pages, Notes), which must itself be password protected, and print them and keep them carefully.
The passphrase is, in my opinion, an ingenious method of creating complex passwords that are easier to remember than those generated by an algorithm.
For example, if I wanted to create the phrase “A difficult password”, then I could combine uppercase and lowercase letters, numbers and symbols to create the following password: @[email protected] By observing the structure of this passphrase, you can produce your own method for determining the meaning of each character, number and symbol.
The important thing is to choose a method that will be yours. Define your password change policy and start creating your password phrases to better protect your information and your sensitive data .