skip to content

How do hackers access your protected data?

  • Password shopping:In the corridors of the dark web were monetizing lists of passwords and users, which is why it is strongly discouraged to use the same combination in multiple places.
  • Brutal force attack: It simply consists of trying all possible combinations, and brings up the importance of the length of the password. The longer it is, the better. At present, a combination with less than 12 characters is vulnerable and will be susceptible to ''cracking''.
  • Dictionary attack: Less aggressive, it involves entering a pre-set list of potential passwords similar to those found in a dictionary.
  • Phishing: These techniques and processes, popular with cybercriminals, aim to deceive, intimidate or pressure the user through social engineering. Their goal? To bring the latter to voluntarily reveal his passwords.

How to counter the attacks

Setting a strong password

  • Create a password that is at least 12 characters long
  • Don't put any easy-to-find personal information in it (date of birth, your children's names, your pet's names, etc.)
  • Use several different passwords.
  • Never send your password. If you are forced to reveal it to a third party, change it as soon as they are done.

Warning:Replacing the letter "o" with the number zero is useless today, as algorithms know this trick well.

Using Tools

  • Use password managers so you don't have to remember your various accesses. You will need to remember one, though: your password manager!"
  • Prefer dual authentication when possible

Creating sentences

If you're going to have a very long, easy-to-remember password, you might as well create a complete phrase for yourself. This will allow you to avoid "brute force" attacks at the same time. Beware, however: dictionary attacks can combine words and prove effective in thwarting this kind of password.

So try to create sentences that don't make sense, using slang words or deliberately making spelling mistakes.You can also use special characters, numbers or choose a word transformation rule. Example: take the next letter in the alphabet on the 2nd letter of the word: "Love" becomes "Anour".

In practice, here are two passwords:

  • FG5b7
  • J1Aime2Vache3Zarbi#

The 1st one is harder for humans to remember, but will be easier for a machine to crack.