}
Know How

Digital Communication Security

Step 4: Fortification – start with passwords

Data surveillance may take place through the loopholes we leave along the way. You can use tools and strategies to make it difficult for people to monitor you. It is important to remember that security is a group process and it may take time to implement a number of tools and strategies.

Strengthen your passwords: One important feature of fortification is having strong passwords for accessing services, we recommend:

    • long passwords, think of a phrase that is not very obvious or connected to you
    • use upper and lower case, numbers and symbols
    • ones that can be frequently changed and are unlike others
    • store these securely in an encrypted database, you could use a programme such as KeepassXC.
    • KeepassXC

Another important aspect is linked to two-factor authentication for accessing social networks, such as:

Facebook

two-factor authentication Facebook

Whatsapp

using two step verification Whatsapp

Instagram

what is two step verification Instagram

Twitter

two-factor authentication Twitter