You are facilitating the theft of cybercriminals

The Mobile phones At the same time they are a great advance for humanity, they can also become a great danger. Through them it is how we perform much of our lives, downloading, saving and sharing a lot of value data that if they fall into bad hands can be a big problem for those who are victims.

The multiple scams that have been giving in recent years have had Notable growth. The figures corroborate sustained growth of cybercrime in Spain. Such is the case, that 35% of users have been victims of telephone phishing, also known as Vishing; 35.52% have received SMS with fraudulent links; 28.08% have received fraud attempts through WhatsApp; and 30.63% say they were contacted by telephone by robots to try to sell them something.

One of the strengths so that many of these scams are not happening are passwords. Mobile passwords They are one of the first lines of defense to protect your personal information and guarantee that no one else can access your private data. Since today our phones contain a lot of sensitive information, such as photos, messages, bank accounts and social media applications, it is essential to take measures to ensure their safety.

The number you should not put as a security password

Passwords that people usually put on their mobiles tend to be simple and easy to rememberbut this also makes them more vulnerable to being guessed or hacked.

Sometimes, citizens tend to place passwords related to important dates as birthdays, trips, weddings, etc.. The problem with this is that they are easy data to get for thugs, either because we place them on platforms such as Twitter or Facebook or because they may escape us in some message or post of social networks.

Even in many cases, citizens opt for extremely easy passwords like “1,2,3,4,5,6“Or even the word itself”password“To avoid forgetting these words and having easy and immediate access to the platform you want to access.

Top 10 of the most used passwords on the Internet.The reason

In this way, experts explain that We should never use personal numbers or these numbers in easy patterns, as well as birthday dates or the car registration number.

Tips for choosing a good password

1. keep a safe password with the right length: For a password to be considered safe, it must contain At least 10 characters. This can hinder its elaboration and memorization. That is why we recommend that the techniques be used above. Remember that the longer a more difficult password will be your hacking.

2. Avoid repeating password for different accesses: This may seem evident is a fairly widespread practice. It is also convenient change passwords from time to time. It is recommended every three months. Of course you must change the password that is established by default in the first accesses for new users. All these changes hinder the work of cybercriminals.

3. Use password managers: If you find it hard to remember all the passwords you have to use it is best to use a password manager. These programs guarantee safe access without having to perform a memorization exercise. There are several market options that can adjust to your needs.

It is totally forbidden to have passwords in a unprotected place. In any case, if you have this need, it is best that the document that collects passwords remains safe in a safe space as a safe.

4. Use two steps identification and biometric systems: Passwords are authentication methods that have ceased to be safe for themselves. It is best to use the services that use an extra step to the introduction of the password. The most common is to receive an SMS or an email with a code that must be introduced during access. This is what is known as authentication in two steps.

Biometry has also revolutionized security systems and are gradually replacing password systems. The fingerprint and easy recognition They appear as safer systems for authentication.

Now you know how you can elaborate a safe password that meets its mission properly. Remember that safe access is the key to having your personal information and the operations you do online. That’s why It is really worth taking time to establish reliable passwords that meet cybersecurity standards.