This article looks at password security and the different security measures taken to log into Firi. Read on for tips on how to create strong passwords.
To register and log into both the website and our app, you can choose between either logging in with Vipps or with a username, password and two-factor authentication.
We recommend all our Norwegian customers to register and log in with Vipps. This is a safe and very easy login-method with just one click. The only thing you need to remember is your own phone number.
If you register with Vipps, you do not have to enter all the information we need to create your user, such as name, e-mail, telephone number and address. Your Vipps profile will tell us what we need to know.
Important: When you register with Vipps, you do not have a username and password with Firi and do not need to go through two-factor authentication.
If you do not want to use Vipps to log in, you can also choose to register with your username and password. You will then have to go through two-factor authentication for extra security.
Multifactor authentication, two-factor authentication (2FA), or two-step verification as it is also known, is an extra layer of security in addition to passwords. The most well-known two-factor authentication is BankID. Here you enter both username and password, but you must also use a password calculator or your mobile phone. In other words, it takes two factors to log in – something you remember (such as a password or code) and a device (such as a cell phone, computer, password calculator, etc.). Other types of authentication include a fingerprint, voice or face shape.
Two-factor authentication is an important security measure. It makes it harder for people to access your account even if they manage to guess your password. Creating passwords that are sufficiently unique, long and strong can be a challenge, so an extra layer of security is absolutely necessary for most people to avoid falling victims to cybercrime.
It can be a challenge to both write down and remember all the different passwords you have on different websites. We therefore recommend everyone to use an encrypted password manager that stores all your passwords in a safe and secure way. Remember that if a website is hacked, and you use the same password on several websites, the hacker has your login information for all those websites.
Examples of password managers are LastPass, F-secure safe and 1Password, and there are many more out there.
Password managers are, simply put, apps with a main password that should be very strong and completely unique. This is the only password you need to remember. We recommend that you use password phrases instead of a single password. An example of such a sentence is:
Fruit salad with Ch0c0late!
This password has 25 characters, including uppercase and lowercase letters, numbers and special characters, but is quite easy to remember and difficult to crack.
How does hacking work? You might think hackers use clever methods to crack your password. That they are sitting in dark rooms and "hacking" your password. But the truth is that in most cases, YOU are the one being hacked – by the swindlers tricking you into giving them your password. The most common way this happens is by being tricked into clicking on links in emails. These emails will pretend to be from someone you know or from a company or organization you trust. You should therefore always be careful, and double-check the sender when you receive links by e-mail. We will return to this in the next section.
But there are also other methods that swindlers use. For instance, they might get in touch with you directly and make you trust him or her. You may want to pay special attention to suspicious phone calls or people you meet on dating apps/ websites.
Phishing, or electronic information fraud, is when a cyber-criminal tries to manipulate someone into acting in a particular way so that the scam-artist can gain access to sensitive information. This could be tricking someone into opening an email attachment, clicking on a link, paying fake bills, clicking on fake updates on websites, etc. Phishing attempts are most often made by e-mail, but social media has also recently been widely used as an arena for targeting people. The swindlers can pretend to be someone you know and trust.
If you follow the advice about passwords and security in this article, and are careful not to share passwords and other personal information, you will probably be well protected against hacking and fraud. We recommend you acquaint yourself with the term“social engineering” to understand how fraud works. Here is a YouTube video that explains the concept of social engineering.
Do you believe someone has tried to defraud you? Contact [email protected] immediately.
Here you can learn more about how to use Firi safely.