{"id":1892,"date":"2024-03-05T14:30:00","date_gmt":"2024-03-05T19:30:00","guid":{"rendered":"https:\/\/miguelcastelo.ca\/?p=1892"},"modified":"2024-03-01T23:04:07","modified_gmt":"2024-03-02T04:04:07","slug":"the-key-to-your-digital-kingdom-why-unique-secure-passwords-matter","status":"publish","type":"post","link":"https:\/\/miguelcastelo.ca\/fr\/the-key-to-your-digital-kingdom-why-unique-secure-passwords-matter\/","title":{"rendered":"La cl\u00e9 de votre royaume num\u00e9rique : L'importance des mots de passe uniques et s\u00e9curis\u00e9s"},"content":{"rendered":"\n<p>In today&#8217;s digital world, our online accounts hold a treasure trove of information: personal details, financial data, communication records, and more. Protecting these digital vaults requires a strong line of defense, and the first line is often the most crucial \u2013 your passwords.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/4d435813-a140-4467-8b7e-193331b8eb5f.jpg\" alt=\"The Key to Your Digital Kingdom: Why Unique, Secure Passwords Matter\" class=\"wp-image-1893\" srcset=\"https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/4d435813-a140-4467-8b7e-193331b8eb5f.jpg 1024w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/4d435813-a140-4467-8b7e-193331b8eb5f-300x300.jpg 300w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/4d435813-a140-4467-8b7e-193331b8eb5f-150x150.jpg 150w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/4d435813-a140-4467-8b7e-193331b8eb5f-768x768.jpg 768w, https:\/\/miguelcastelo.ca\/wp-content\/uploads\/2024\/02\/4d435813-a140-4467-8b7e-193331b8eb5f-12x12.jpg 12w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">The Key to Your Digital Kingdom: Why Unique, Secure Passwords Matter<\/figcaption><\/figure>\n\n\n<div class=\"root-eb-toc-nh67h wp-block-essential-blocks-table-of-contents\"><div class=\"eb-parent-wrapper eb-parent-eb-toc-nh67h \"><div class=\"eb-toc-container eb-toc-nh67h eb-toc-sticky-left eb-toc-is-sticky eb-toc-collapsible eb-toc-initially-collapsed eb-toc-scrollToTop style-2 list-style-none\" data-scroll-top=\"false\" data-scroll-top-icon=\"fas fa-angle-up\" data-collapsible=\"true\" data-sticky-hide-mobile=\"false\" data-sticky=\"true\" data-scroll-target=\"scroll_to_toc\" data-copy-link=\"false\" data-editor-type=\"\" data-hide-desktop=\"false\" data-hide-tab=\"false\" data-hide-mobile=\"false\" data-itemCollapsed=\"false\" data-highlight-scroll=\"false\"><div class=\"eb-toc-header\"><span class=\"eb-toc-close eb-toc-sticky-left\"><\/span><h2 class=\"eb-toc-title\">Table of Contents<\/h2><\/div><div class=\"eb-toc-wrapper \" data-headers=\"[{&quot;level&quot;:2,&quot;content&quot;:&quot;1. Combating the Rise of Cybercrime&quot;,&quot;text&quot;:&quot;1. Combating the Rise of Cybercrime&quot;,&quot;link&quot;:&quot;1-combating-the-rise-of-cybercrime&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;2. Preventing Account Takeover&quot;,&quot;text&quot;:&quot;2. Preventing Account Takeover&quot;,&quot;link&quot;:&quot;2-preventing-account-takeover&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;3. Protecting Your Identity&quot;,&quot;text&quot;:&quot;3. Protecting Your Identity&quot;,&quot;link&quot;:&quot;3-protecting-your-identity&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;4. Building Trustworthiness for Online Interactions&quot;,&quot;text&quot;:&quot;4. Building Trustworthiness for Online Interactions&quot;,&quot;link&quot;:&quot;4-building-trustworthiness-for-online-interactions&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;So, what makes a password secure and unique?&quot;,&quot;text&quot;:&quot;So, what makes a password secure and unique?&quot;,&quot;link&quot;:&quot;so-what-makes-a-password-secure-and-unique&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;Additional tips for password hygiene:&quot;,&quot;text&quot;:&quot;Additional tips for password hygiene:&quot;,&quot;link&quot;:&quot;additional-tips-for-password-hygiene&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;About the Author&quot;,&quot;text&quot;:&quot;About the Author&quot;,&quot;link&quot;:&quot;about-the-author&quot;}]\" data-visible=\"[true,true,true,true,true,true]\" data-delete-headers=\"[{&quot;label&quot;:&quot;1. Combating the Rise of Cybercrime&quot;,&quot;value&quot;:&quot;1-combating-the-rise-of-cybercrime&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;2. Preventing Account Takeover&quot;,&quot;value&quot;:&quot;2-preventing-account-takeover&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;3. Protecting Your Identity&quot;,&quot;value&quot;:&quot;3-protecting-your-identity&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;4. Building Trustworthiness for Online Interactions&quot;,&quot;value&quot;:&quot;4-building-trustworthiness-for-online-interactions&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;So, what makes a password secure and unique?&quot;,&quot;value&quot;:&quot;so-what-makes-a-password-secure-and-unique&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;Additional tips for password hygiene:&quot;,&quot;value&quot;:&quot;additional-tips-for-password-hygiene&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;About the Author&quot;,&quot;value&quot;:&quot;about-the-author&quot;,&quot;isDelete&quot;:false}]\" data-smooth=\"true\" data-top-offset=\"\"><div class=\"eb-toc__list-wrap\"><ul class='eb-toc__list'><li><a href=\"#1-combating-the-rise-of-cybercrime\">1. Combating the Rise of Cybercrime<\/a><li><a href=\"#2-preventing-account-takeover\">2. Preventing Account Takeover<\/a><li><a href=\"#3-protecting-your-identity\">3. Protecting Your Identity<\/a><li><a href=\"#4-building-trustworthiness-for-online-interactions\">4. Building Trustworthiness for Online Interactions<\/a><li><a href=\"#so-what-makes-a-password-secure-and-unique\">So, what makes a password secure and unique?<\/a><li><a href=\"#additional-tips-for-password-hygiene\">Additional tips for password hygiene:<\/a><li><a href=\"#about-the-author\">About the Author<\/a><\/ul><\/div><\/div><button class=\"eb-toc-button  eb-toc-button-left\"><div>Table of Contents<\/div><\/button><\/div><\/div><\/div>\n\n\n<p>Using a <strong>secure and unique password<\/strong> for each account is the cornerstone of online security. Here&#8217;s why it matters:<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\"><strong>1. Combating the Rise of Cybercrime<\/strong><\/h2>\n\n\n\n<p>Cybercrime is unfortunately an ever-increasing threat. Hackers employ sophisticated techniques to breach security measures, and weak or reused passwords are their easiest targets. A unique, strong password significantly increases the difficulty of unauthorized access.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\"><strong>2. Preventing Account Takeover<\/strong><\/h2>\n\n\n\n<p>Imagine someone gaining access to your email address by cracking a weak password used across multiple accounts. This can lead to a domino effect, allowing them to access other accounts associated with the same email and wreak havoc. Unique passwords for each account minimize this risk.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\"><strong>3. Protecting Your Identity<\/strong><\/h2>\n\n\n\n<p>Compromised accounts can be used for identity theft, a serious crime where stolen personal information is used to commit fraud or other malicious activities. Using unique passwords helps prevent this by keeping your information secure in individual accounts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\"><strong>4. Building Trustworthiness for Online Interactions<\/strong><\/h2>\n\n\n\n<p>Strong passwords showcase your commitment to online security. This can be particularly important when engaging in professional or financial transactions online, where trust and security are paramount.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><strong>So, what makes a password secure and unique?<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Length is key:<\/strong> Aim for at least 12 characters, making it more difficult to crack through brute force attacks.<\/li>\n\n\n\n<li><strong>Diversity is strength:<\/strong> Combine upper and lowercase letters, numbers, and special characters to create a complex and unpredictable password.<\/li>\n\n\n\n<li><strong>Uniqueness is crucial:<\/strong> Avoid using the same password for multiple accounts. This minimizes the damage if one account is compromised.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><strong>Additional tips for password hygiene:<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Avoid using personal information:<\/strong> Don&#8217;t incorporate your name, birthdate, or other easily guessable details into your password.<\/li>\n\n\n\n<li><strong>Enable two-factor authentication (2FA):<\/strong> This adds an extra layer of security by requiring a second verification step beyond your password.<\/li>\n\n\n\n<li><strong>Use a password manager:<\/strong> Consider using a secure tool to manage your various passwords, ensuring they are strong and unique while reducing the burden of remembering them all.<\/li>\n<\/ul>\n\n\n\n<p>By taking these steps and prioritizing unique, strong passwords for each of your online accounts, you can significantly strengthen your digital defenses and build a secure foundation for your online presence. Remember, your vigilance is essential in safeguarding your information and keeping your digital kingdom safe.<\/p>\n\n\n\n<details class=\"wp-block-details has-medium-font-size is-layout-flow wp-block-details-is-layout-flow\"><summary>References<\/summary>\n<p class=\"has-small-font-size\"><em>10 Ways to Prevent Identity Theft<\/em>. (n.d.). US News &amp; World Report. Retrieved March 1, 2024, from <a href=\"https:\/\/doi.org\/\/\/www.usnews.com\/360-reviews\/privacy\/identity-theft-protection\/10-ways-to-prevent-identity-theft\" target=\"_blank\" rel=\"noopener\" title=\"\">\/\/www.usnews.com\/360-reviews\/privacy\/identity-theft-protection\/10-ways-to-prevent-identity-theft<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Create and use strong passwords\u2014Microsoft Support<\/em>. (n.d.). Retrieved March 1, 2024, from <a href=\"https:\/\/support.microsoft.com\/en-us\/windows\/create-and-use-strong-passwords-c5cebb49-8c53-4f5e-2bc4-fe357ca048eb\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/support.microsoft.com\/en-us\/windows\/create-and-use-strong-passwords-c5cebb49-8c53-4f5e-2bc4-fe357ca048eb<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\">cybercrimemag. (2018, February 21). Cybercrime To Cost The World $10.5 Trillion Annually By 2025. <em>Cybercrime Magazine<\/em>. <a href=\"https:\/\/cybersecurityventures.com\/hackerpocalypse-cybercrime-report-2016\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/cybersecurityventures.com\/hackerpocalypse-cybercrime-report-2016\/<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Cybersecurity 101: Why Choosing a Secure Password Is So Important | Walden University<\/em>. (n.d.). Retrieved March 1, 2024, from <a href=\"https:\/\/www.waldenu.edu\/programs\/information-technology\/resource\/cybersecurity-101-why-choosing-a-secure-password-in-so-important\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.waldenu.edu\/programs\/information-technology\/resource\/cybersecurity-101-why-choosing-a-secure-password-in-so-important<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Digital Footprints and How to Protect Yours<\/em>. (n.d.). Retrieved March 1, 2024, from <a href=\"https:\/\/terranovasecurity.com\/blog\/digital-footprints\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/terranovasecurity.com\/blog\/digital-footprints\/<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\">Establishment, C. S. (2023, July 10). <em>Why unique passwords are so important<\/em>. Get Cyber Safe. <a href=\"https:\/\/www.getcybersafe.gc.ca\/en\/blogs\/why-unique-passwords-important\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.getcybersafe.gc.ca\/en\/blogs\/why-unique-passwords-important<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Good, better, best: How you can make an OK password even better\u2014Get Cyber Safe<\/em>. (n.d.). Retrieved March 1, 2024, from <a href=\"https:\/\/www.getcybersafe.gc.ca\/en\/blogs\/good-better-best-how-you-can-make-ok-password-even-better\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.getcybersafe.gc.ca\/en\/blogs\/good-better-best-how-you-can-make-ok-password-even-better<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Identifying And Safeguarding PII: Your Digital Suit Of Armor &#8211; ITU Online<\/em>. (2023, December 27). <a href=\"https:\/\/www.ituonline.com\/blogs\/identifying-and-safeguarding-pii\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.ituonline.com\/blogs\/identifying-and-safeguarding-pii\/<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Password managers: Using browsers and apps to safely store your passwords<\/em>. (n.d.). Retrieved March 1, 2024, from <a href=\"https:\/\/www.ncsc.gov.uk\/collection\/top-tips-for-staying-secure-online\/password-managers\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.ncsc.gov.uk\/collection\/top-tips-for-staying-secure-online\/password-managers<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Protecting Personal Data: The Importance of Strong Passwords | The Enterprise World<\/em>. (2024, February 8). <a href=\"https:\/\/theenterpriseworld.com\/protecting-personal-data-with-passwords\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/theenterpriseworld.com\/protecting-personal-data-with-passwords\/<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\">Rasnake, C. (2023, June 8). The Crucial Importance of Unique Passwords for Every Online Account. <em>PC Matic Blog<\/em>. <a href=\"https:\/\/www.pcmatic.com\/blog\/the-crucial-importance-of-unique-passwords-for-every-online-account\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.pcmatic.com\/blog\/the-crucial-importance-of-unique-passwords-for-every-online-account\/<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>The importance of a strong password: Safeguarding your digital world | LinkedIn<\/em>. (n.d.). Retrieved March 1, 2024, from <a href=\"https:\/\/www.linkedin.com\/pulse\/importance-strong-password-safeguarding\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.linkedin.com\/pulse\/importance-strong-password-safeguarding\/<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>This chart shows how long it would take a computer to hack your exact password<\/em>. (2021, December 7). World Economic Forum. <a href=\"https:\/\/www.weforum.org\/agenda\/2021\/12\/passwords-safety-cybercrime\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.weforum.org\/agenda\/2021\/12\/passwords-safety-cybercrime\/<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Turn on 2-Step Verification\u2014Android\u2014Google Account Help<\/em>. (n.d.). Retrieved March 1, 2024, from <a href=\"https:\/\/support.google.com\/accounts\/answer\/185839?hl=en&amp;co=GENIE.Platform%3DAndroid\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/support.google.com\/accounts\/answer\/185839?hl=en&amp;co=GENIE.Platform%3DAndroid<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>What is a Brute Force Attack? Types, Examples &amp; Prevention | StrongDM<\/em>. (n.d.). Retrieved March 1, 2024, from <a href=\"https:\/\/www.strongdm.com\/blog\/brute-force-attack\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.strongdm.com\/blog\/brute-force-attack<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>What Is Identity Theft? | Terranova Security<\/em>. (n.d.). Retrieved March 1, 2024, from <a href=\"https:\/\/terranovasecurity.com\/what-is-identity-theft\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/terranovasecurity.com\/what-is-identity-theft\/<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>What Is Password Protection? | Microsoft Security<\/em>. (n.d.). Retrieved March 1, 2024, from <a href=\"https:\/\/www.microsoft.com\/en-ca\/security\/business\/security-101\/what-is-password-protection\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.microsoft.com\/en-ca\/security\/business\/security-101\/what-is-password-protection<\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\"><em>Why you should never use the same password for more than one account\u2014Get Cyber Safe<\/em>. (n.d.). Retrieved March 1, 2024, from <a href=\"https:\/\/www.getcybersafe.gc.ca\/en\/blogs\/why-you-should-never-use-same-password-more-one-account\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.getcybersafe.gc.ca\/en\/blogs\/why-you-should-never-use-same-password-more-one-account<\/a><\/p>\n<\/details>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">About the Author<\/h2>\n\n\n<div class=\"wp-block-post-author\"><div class=\"wp-block-post-author__avatar\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/5d4e3329ec6635c9125a46bbf02e23f016c952e0f63eb74d0e03b9d126d75828?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/5d4e3329ec6635c9125a46bbf02e23f016c952e0f63eb74d0e03b9d126d75828?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' \/><\/div><div class=\"wp-block-post-author__content\"><p class=\"wp-block-post-author__name\"><a href=\"https:\/\/miguelcastelo.ca\/fr\/author\/m-castelooutlook-com\/\" target=\"_self\">Miguel Castelo<\/a><\/p><p class=\"wp-block-post-author__bio\">Miguel Castelo is a passionate cybersecurity professional with a strong foundation in technology. He holds a Bachelor of Science in Cybersecurity and is currently pursuing a Master&#8217;s degree in Computer Engineering at Polytechnique Montreal, further solidifying his technical expertise.\r\n\r\nBeyond his academic pursuits, Miguel brings valuable experience in web design and development, graphic design, and programming. This diverse skillset allows him to approach cybersecurity challenges from multiple angles, fostering a holistic understanding of the digital landscape.\r\n\r\nMiguel&#8217;s dedication to continuous learning and his diverse skillset position him as a valuable asset in the cybersecurity field. He is driven by a passion for building secure, resilient systems and protecting individuals and organizations in the ever-evolving digital world.<\/p><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s digital world, our online accounts hold a treasure trove of information: personal details, financial data, communication records, and more. Protecting these digital vaults requires a strong line of defense, and the first line is often the most crucial \u2013 your password.<\/p>","protected":false},"author":1,"featured_media":1893,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[19],"tags":[12,22,21,23,29,28],"class_list":["post-1892","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-best-practices","tag-cyber-safe","tag-cybersecurity-awareness","tag-information-security","tag-password-policies","tag-secure-passwords"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/posts\/1892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/comments?post=1892"}],"version-history":[{"count":6,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/posts\/1892\/revisions"}],"predecessor-version":[{"id":1984,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/posts\/1892\/revisions\/1984"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/media\/1893"}],"wp:attachment":[{"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/media?parent=1892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/categories?post=1892"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/miguelcastelo.ca\/fr\/wp-json\/wp\/v2\/tags?post=1892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}