{"id":2474,"date":"2020-08-12T11:10:04","date_gmt":"2020-08-12T11:10:04","guid":{"rendered":"https:\/\/www.siteuptime.com\/blog\/2020\/08\/12\/password-guidelines-for-creating-an-unbreakable-password\/"},"modified":"2020-09-01T11:16:14","modified_gmt":"2020-09-01T11:16:14","slug":"password-guidelines-for-creating-an-unbreakable-password","status":"publish","type":"post","link":"https:\/\/www.siteuptime.com\/blog\/2020\/08\/12\/password-guidelines-for-creating-an-unbreakable-password\/","title":{"rendered":"Password Guidelines for Creating an Unbreakable Password"},"content":{"rendered":"<p>We all know that our passwords are the key to online security.<\/p>\n<p>Despite this, most of us have been guilty of ignoring strong password guidelines and best practices. You\u2019ve likely used a weak password at some point\u2014and maybe even one of the <a href=\"https:\/\/www.cnn.com\/2019\/04\/22\/uk\/most-common-passwords-scli-gbr-intl\/index.html\">worst password sins of all<\/a>, like \u201cpassword\u201d or \u201c123456.\u201d<\/p>\n<p>These weak passwords can have some serious consequences. In the event that your password is stolen, whoever accesses your account could gain access to personal information like your home address or credit card information. Worse, they might find the login credentials that would help them steal your identity.<\/p>\n<p>If you\u2019re looking for a wake-up call, this is it.<\/p>\n<p>It\u2019s time to boost the strength of your online passwords\u2014and we\u2019re here to help. We\u2019re taking a look at the best practices you need to incorporate into your password system, and why they\u2019re so important. Read on to learn more.<\/p>\n<h2>The Power of a Strong Password<\/h2>\n<p>Before we go any further, let\u2019s take a look at what a strong password isn\u2019t. Weak passwords, like the \u201cpassword sins\u201d we mentioned earlier, are any string of characters that would be easy to guess. (Don\u2019t forget: if it\u2019s easy for a human to guess your password, imagine how simple it would be for a machine to guess it!)<\/p>\n<p>Here are some examples of weak passwords:<\/p>\n<ul>\n<li>Any word in any language that can be found in a dictionary. Variants of this include words followed by a number, such as \u201cpassword35\u201d<\/li>\n<li>A series of characters or numbers, such as CCCCC or 56789<\/li>\n<li>Passwords that include personal information, such as a spouse\u2019s birthday or the name of a pet<\/li>\n<li>Passwords that are written and posted on your desk or near your computer<\/li>\n<\/ul>\n<p>Using any of these types of weak passwords? If so, it\u2019s time to reconsider your password strategy\u2014because whether your account is for personal or business use, security awareness is crucial.<\/p>\n<h2>Strong Password Guidelines<\/h2>\n<p>One of the best rules for secure passwords? The strongest ones will look like a string of completely random characters. This makes it difficult both for a human to crack and for a machine\u2019s brute-force attack (i.e. a cyberattack in which a machine guesses many possible letter and number combinations through trial and error).<\/p>\n<p>Below are the best practices for creating a secure password that can stand this kind of force. Whether a website prompts you to follow these strong password requirements or not, it\u2019s a good idea to include as many of these as you can.<\/p>\n<p>Here are the characteristics of a strong password:<\/p>\n<ul>\n<li>It\u2019s difficult to guess, both for a human or for a machine<\/li>\n<li>It\u2019s unique to a single website login, to minimize risk in the case of a data breach<\/li>\n<li>It includes a minimum of 8 characters\u2014and the more, the better<\/li>\n<li>It has uppercase and lowercase letters<\/li>\n<li>It includes numbers<\/li>\n<li>It has at least one special character, e.g. @#%&amp;<\/li>\n<\/ul>\n<p>Note that not all websites will support these password criteria. For example, while the strongest passwords include a special character, you\u2019ll likely still run into some websites that don\u2019t allow the inclusion of these criteria. Some websites don\u2019t recognize uppercase vs. lowercase, and others may limit the number of characters your password can have.<\/p>\n<p>Once you\u2019ve decided on a password, use <a href=\"https:\/\/howsecureismypassword.net\/\">this tool<\/a> to check the strength of your choice. You\u2019ll know you\u2019ve found a secure password if it would take a computer a great deal of time to crack it.<\/p>\n<h2>Remembering Complex Passwords<\/h2>\n<p>The most secure passwords are complex. This makes them difficult to guess and difficult to even say aloud. Unfortunately, this in turn can make them difficult to remember.<\/p>\n<p>However, if you find yourself leaning toward writing a password down, remember that even the strongest password is made instantly weak the moment it\u2019s on paper.<\/p>\n<p>Instead, if you want to create a memorable password, you can try finding a phrase whose letters you can substitute characters with letters or numbers. For example:<\/p>\n<ul>\n<li><em>James Bond in No Time to Die<\/em> becomes <em>JB!nN0t1m2D1<\/em>, a password that would take a computer 34 thousand years to crack<\/li>\n<li><em>I always forget Sarah\u2019s birthday; I\u2019ll remember next time<\/em> becomes <em>1Af$bd;ILRn+<\/em>, a password that would take a computer a whopping 485 thousand years to crack<\/li>\n<\/ul>\n<p>However, if you want to create truly random passwords that are more difficult to guess, <a href=\"https:\/\/www.cnet.com\/news\/password-managers-a-little-pain-for-a-lot-better-security-world-password-day\/\">experts recommend<\/a> using a password manager. These tools help you generate strong random passwords, store your passwords in encrypted form, and give you easy access to them across multiple devices. Many password managers will even alert you if your email or password has been involved in a data breach.<\/p>\n<h2>What Happens if You Forget a Strong Password?<\/h2>\n<p>This is the most common fear when it comes to boosting password security. After all, what happens if you lose access to a vital account after forgetting the password? The answer depends.<\/p>\n<p>For some sites, gaining access to your account is as easy as resetting your password. For others, you may be able to get back in by confirming your identity through a linked email address.<\/p>\n<p>For others, the process is more difficult. <a href=\"https:\/\/setapp.com\/how-to\/google-account-recovery\">Google account recovery<\/a>, for example, has a reputation for being a particularly laborious (though not impossible!) process.<\/p>\n<p>Don\u2019t forget, though, that all of this worry goes away with a solid password management system, which stores your passwords so you don\u2019t lose them.<\/p>\n<h2>Create More Effective Passwords<\/h2>\n<p>Following these critical password guidelines doesn\u2019t mean your accounts will never be hacked\u2014but they do dramatically decrease your risk.<\/p>\n<p>As you incorporate these guidelines into your online security, don\u2019t forget that passwords are just one part of a well-rounded approach to online safety. For more tips on boosting your security, check out our blog.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We all know that our passwords are the key to online security. Despite this, most of us have been guilty of ignoring strong password guidelines and best practices. You\u2019ve likely used a weak password at some point\u2014and maybe even one of the worst password sins of all, like \u201cpassword\u201d or \u201c123456.\u201d These weak passwords can [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":2475,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[107],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Password Guidelines for Creating an Unbreakable Password | SiteUptime Blog<\/title>\n<meta name=\"description\" content=\"We all know that our passwords are the key to online security. Despite this, most of us have been guilty of ignoring strong password guidelines and best\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.siteuptime.com\/blog\/2020\/08\/12\/password-guidelines-for-creating-an-unbreakable-password\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Password Guidelines for Creating an Unbreakable Password | SiteUptime Blog\" \/>\n<meta property=\"og:description\" content=\"We all know that our passwords are the key to online security. Despite this, most of us have been guilty of ignoring strong password guidelines and best\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.siteuptime.com\/blog\/2020\/08\/12\/password-guidelines-for-creating-an-unbreakable-password\/\" \/>\n<meta property=\"og:site_name\" content=\"SiteUptime Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-12T11:10:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-01T11:16:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.siteuptime.com\/blog\/wp-content\/uploads\/2020\/08\/3b33e109df664d84231731ccb7815a43.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1338\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\">\n\t<meta name=\"twitter:data1\" content=\"Site Uptime Tips, Tricks, and Hacks\">\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data2\" content=\"4 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.siteuptime.com\/blog\/#organization\",\"name\":\"Site Uptime\",\"url\":\"https:\/\/www.siteuptime.com\/blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.siteuptime.com\/blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.siteuptime.com\/blog\/wp-content\/uploads\/2016\/11\/logo.png\",\"width\":268,\"height\":67,\"caption\":\"Site Uptime\"},\"image\":{\"@id\":\"https:\/\/www.siteuptime.com\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.siteuptime.com\/blog\/#website\",\"url\":\"https:\/\/www.siteuptime.com\/blog\/\",\"name\":\"SiteUptime Blog\",\"description\":\"Website Monitoring\",\"publisher\":{\"@id\":\"https:\/\/www.siteuptime.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.siteuptime.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.siteuptime.com\/blog\/2020\/08\/12\/password-guidelines-for-creating-an-unbreakable-password\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.siteuptime.com\/blog\/wp-content\/uploads\/2020\/08\/3b33e109df664d84231731ccb7815a43.jpg\",\"width\":2000,\"height\":1338,\"caption\":\"Digital Password\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.siteuptime.com\/blog\/2020\/08\/12\/password-guidelines-for-creating-an-unbreakable-password\/#webpage\",\"url\":\"https:\/\/www.siteuptime.com\/blog\/2020\/08\/12\/password-guidelines-for-creating-an-unbreakable-password\/\",\"name\":\"Password Guidelines for Creating an Unbreakable Password | SiteUptime Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.siteuptime.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.siteuptime.com\/blog\/2020\/08\/12\/password-guidelines-for-creating-an-unbreakable-password\/#primaryimage\"},\"datePublished\":\"2020-08-12T11:10:04+00:00\",\"dateModified\":\"2020-09-01T11:16:14+00:00\",\"description\":\"We all know that our passwords are the key to online security. Despite this, most of us have been guilty of ignoring strong password guidelines and best\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.siteuptime.com\/blog\/2020\/08\/12\/password-guidelines-for-creating-an-unbreakable-password\/\"]}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.siteuptime.com\/blog\/2020\/08\/12\/password-guidelines-for-creating-an-unbreakable-password\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.siteuptime.com\/blog\/2020\/08\/12\/password-guidelines-for-creating-an-unbreakable-password\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.siteuptime.com\/blog\/#\/schema\/person\/0c5da25d1e73b52a001cde949f064a84\"},\"headline\":\"Password Guidelines for Creating an Unbreakable Password\",\"datePublished\":\"2020-08-12T11:10:04+00:00\",\"dateModified\":\"2020-09-01T11:16:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.siteuptime.com\/blog\/2020\/08\/12\/password-guidelines-for-creating-an-unbreakable-password\/#webpage\"},\"publisher\":{\"@id\":\"https:\/\/www.siteuptime.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.siteuptime.com\/blog\/2020\/08\/12\/password-guidelines-for-creating-an-unbreakable-password\/#primaryimage\"},\"articleSection\":\"Website Security\",\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.siteuptime.com\/blog\/#\/schema\/person\/0c5da25d1e73b52a001cde949f064a84\",\"name\":\"Site Uptime Tips, Tricks, and Hacks\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.siteuptime.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a9225861cfb200610ac9071a40b5dc27?s=96&d=mm&r=g\",\"caption\":\"Site Uptime Tips, Tricks, and Hacks\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.siteuptime.com\/blog\/wp-json\/wp\/v2\/posts\/2474"}],"collection":[{"href":"https:\/\/www.siteuptime.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.siteuptime.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.siteuptime.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.siteuptime.com\/blog\/wp-json\/wp\/v2\/comments?post=2474"}],"version-history":[{"count":1,"href":"https:\/\/www.siteuptime.com\/blog\/wp-json\/wp\/v2\/posts\/2474\/revisions"}],"predecessor-version":[{"id":2479,"href":"https:\/\/www.siteuptime.com\/blog\/wp-json\/wp\/v2\/posts\/2474\/revisions\/2479"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.siteuptime.com\/blog\/wp-json\/wp\/v2\/media\/2475"}],"wp:attachment":[{"href":"https:\/\/www.siteuptime.com\/blog\/wp-json\/wp\/v2\/media?parent=2474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.siteuptime.com\/blog\/wp-json\/wp\/v2\/categories?post=2474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.siteuptime.com\/blog\/wp-json\/wp\/v2\/tags?post=2474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}