Digital Communication Security
Step 4: Fortification – start with passwords
Data surveillance may take place through the loopholes we leave along the way. You can use tools and strategies to make it difficult for people to monitor you. It is important to remember that security is a group process and it may take time to implement a number of tools and strategies.
Strengthen your passwords: One important feature of fortification is having strong passwords for accessing services, we recommend:
- long passwords, think of a phrase that is not very obvious or connected to you
- use upper and lower case, numbers and symbols
- ones that can be frequently changed and are unlike others
- store these securely in an encrypted database, you could use a programme such as KeepassXC.
KeepassXC
Another important aspect is linked to two-factor authentication for accessing social networks, such as:
Facebook
two-factor authentication Facebook
Whatsapp
using two step verification Whatsapp
Instagram
what is two step verification Instagram
Twitter
two-factor authentication Twitter