
In this article, we will talk about password security and explain the various security measures for logging in to Firi.
To register and log in to both our website and app, you need a digital id like Vipps in Norway or MitID in Denmark.
For our customers, registration is quick and easy with Vipps/MitID. This is a secure and super-simple login completed with just one click. The only thing you need to remember is your own phone number.
If you register with Vipps/MitID, you do not have to enter all the information we need to create your user, such as name, e-mail, telephone number and address. Your profile will tell us what we need to know.
Important: When you register with Vipps/MitID, you do not have a username and password with Firi and do not need to go through two-factor authentication.
If you previously created an account using email and password, and not Vipps/MitID, you can log in with that. In this case, you will also need two-factor authentication for extra security.
Multifactor authentication, two-factor authentication (2FA), or two-step verification as it is also called, is an extra layer of security in addition to passwords. The most well-known two-factor authentication is BankID and MitID. Here you enter both username and password, but you must also use a password calculator or your mobile phone. In other words, it takes two factors to log in – something you remember (such as a password or code) and a device (such as a cell phone, computer, password calculator, etc.). Other types of 2Fa can include a fingerprint or face shape.
Two-factor authentication is an important security measure. It makes it harder for people to access your account even if they manage to guess your password. Creating passwords that are sufficiently unique, long and strong can be a challenge, so an extra layer of security is absolutely necessary for most people to avoid falling victims to cybercrime.
It can be a challenge to both write down and remember all the different passwords you have on different websites. We therefore recommend everyone to use an encrypted password manager that stores all your passwords in a safe and secure way. Remember that if a website is hacked, and you use the same password on several websites, the hacker has your login information for all those websites.
Examples of password managers are LastPass, F-secure safe and 1Password, and there are many more out there.
Password managers are, simply put, apps with a main password that should be very strong and completely unique. This is the only password you need to remember. We recommend that you use password phrases instead of a single password. An example of such a sentence is:
Fruit salad with Ch0c0late!
This password has 25 characters, including uppercase and lowercase letters, numbers and special characters, but is quite easy to remember and difficult to crack.
How does hacking work? You might think hackers use clever methods to crack your password. That they are sitting in dark rooms and "hacking" your password. But the truth is that in most cases, YOU are the one being hacked – by the swindlers tricking you into giving them your password. The most common way this happens is by being tricked into clicking on links in emails. These emails will pretend to be from someone you know or from a company or organization you trust. You should therefore always be careful, and double-check the sender when you receive links by e-mail. We will return to this in the next section.
But there are also other methods that scammers use. For instance, they might get in touch with you directly and make you trust him or her. Be aware of suspicious phone calls or people who contat you directly on social media og dating apps.
Phishing, or electronic information fraud, is when a cyber-criminal tries to manipulate someone into acting in a particular way so that the scam-artist can gain access to sensitive information. This could be tricking someone into opening an email attachment, clicking on a link, paying fake bills, downloading files on websites, etc. Phishing attempts are most often made by e-mail, but social media has also been widely used to target people. The scammers can pretend to be someone you know and trust.
If you follow our advice regarding passwords and security, and you are careful not to share passwords or other personal info, you will probably be well protected. We recommend you learn more about “social engineering” to understand how fraud works. Here is a YouTube video that explains the concept of social engineering.
Do you believe someone has tried to defraud you? Contact [email protected] immediately.