The Do's and Don'ts of Choosing a Secure Password

Passwords are the digital keys to our daily lives. They are the gateway to our professional services, and our network of friends. So, what does a secure password look like? Here is a collection of the do's and don't on how to choose a strong password to avoid being a victim of cyberattack.

Rakesh Soni
By Rakesh Soni
January 06, 2021
12 min read

No conversation on digital security is complete without a well-rounded discussion on how to choose a strong password.

Passwords are the digital keys to our daily lives. They are the gateway to our professional services, our network of friends, and all our financial applications.

No wonder we want to keep our passwords private and secure!

If someone gains access to your email ID, they can easily opt for the "forgot your password?" link on (for example, an online shopping or banking site) you use.

Also, if a cybercriminal successfully hacks into your social media account, they can post fraudulent messages asking for money or sending out links to scammer websites.

So, what's the solution? A good password.

But before finding how to choose a strong password in 2021, let's first look at the most common methods of how passwords are being hacked today.

How Does a Password Get Hacked? Top 5 Threats

Hackers utilize numerous techniques to crack your passwords. One technique is to gain access by guessing the password directly.

They could do it by closely following your social media presence, security questions, and similar details. This is why industry experts do not favor the use of personal details on passwords.

Other tactics that hackers use include:

1. Phishing attacks

Phishing is a social engineering attack that occurs when the hacker dupes a victim into opening an email using fraudulent ads or scareware tactics.

Unfortunately, such attacks are no longer just an email problem. It has somewhat expanded to instant/ text messages, social networks, videoconferencing, and gaming applications.

As phishing threats grew to over 50,000 a day around December 2020, SlashNext Threat Labs reported a 30% increase throughout 2019.

Both organizations and individuals should know how to choose a strong password and take a zero-trust approach beyond domain credibility.

2. Dictionary attack

A dictionary attack is a method of attacking the victim's account by entering every word in a dictionary as a password. They usually run through a list of common words and phrases or easy to guess passwords.

Users frequently reuse their passwords or do not change them even after a breaching attempt. That makes this form of attack easy to execute.

In fact, the 2019 Verizon Data Breach Investigations Report (DBIR) reveals that compromised and reused passwords are involved in 80 percent of hacking-related breaches.

3. Brute force attacks

Similar to a dictionary attack, brute force uses trial-and-error to guess the victim's login credentials, find a hidden web page, or access network resources.

Later, those tainted accounts are used to send phishing emails, sell credentials to third parties, or spread fake content.

Verizon's Data Breach Investigations Report 2020 reveals that around 20% of breaches happening within SMBs involve brute force. The number is approximately 10% for large enterprises.

The trend essentially remained unchanged in 2018 and 2019, but the coronavirus pandemic may have impacted the number last year.

4. Keystroke logging

Keystroke logging or keyboard capturing is the method of tracking and recording the keystrokes of the victim, thereby capturing any information typed during the session.

The hacker uses tools to record the data captured by each keystroke, which are retrieved later on. Moreso, a majority of these tools can record calls, GPS data, copy-cut-paste clipboard, and microphone or camera footage. The recorded data are later used for phishing attacks, stalking, and identity theft.

5. Man-in-the-middle attacks

In this attack, the hacker positions themselves in the middle of a conversation between a user and an application to eavesdrop or impersonate a website or application.

In return, the hacker steals the victim's login credentials, account numbers, social security numbers, etc.

SaaS businesses, e-commerce sites, and users of financial services majorly fall victim to man-in-the-middle attacks.

The Do's and Don't on How to Choose a Strong Password

do's-and-don't-to-choose-a-strong-password

What does a secure password look like? It is usually the one that cannot be guessed easily or cracked using software tools.

Not that it should only be unique and complex, here is a collection of the do's and don't on how to choose a strong password to avoid being a victim of the attacks mentioned above.

The Do's

Use two-factor authentication (2FA): 2FA adds an additional layer of security to your existing account. Even if the hacker is able to crack your password, they will still have an extra layer to authenticate.

The following are a few types of layers that businesses choose to provide:

  • A PIN or password.
  • A physical asset such as the last 4 digits of your credit card.
  • An OTP sent to your mobile device.
  • A biometric authenticator such as a fingerprint or voiceprint.

Follow standard password rules: There are a few basic rules on how to choose a strong password that you should closely follow.

  • Short passwords are very easy to crack. Use a minimum of 10 characters.
  • Include a mixture of numbers, capital letters, lower-case letters, and symbols to make the password difficult to crack.

Choose sufficiently random combinations of words: Yes, it is possible to use an easy-to-remember password and make it secure at the same time. The following are a few ways to do that:

  • Pick a sentence that you probably won't forget, like "When I was fifteen, I had my first international trip." Then use the first letters, add the numbers, and punctuation to make "wIw15,ihmfit."
  • Pick any three random words like Jack Book Pen. Choose your birth date, put the words together, and split up the date like 1jackbookpen4. Next, capitalize each letter and add a few special characters like 1J@ckBookPen4!

Pick something that does not make sense: How to choose a strong password? Go for something that has no meaning. For example, it could be:

  • A familiar word using odd characters like phnybon instead of funnybone.
  • A deliberately misspelled term like Win-G8 (Wooden Gate)
  • Replace letters with the least expected symbols. Like for "O" use "()" instead of "0".
  • Use phonetically pronounceable words that make no sense, like good-eits.

Change your passwords regularly: Also, do not reuse the same password for a long time. The more sensitive your data is, the more frequently you should change your password.

EB-buyers-GD-to-MFA

Always remember to log out of websites and devices once you are done using them.

The Don’ts

  • Do not use your name in your passwords in any form - first, last, spelled backward, or nicknames.
  • Do not use passwords that are fewer than eight characters.
  • Do not use the name of your pets, friends, or close relatives.
  • Do not use special dates like your birthdays and anniversaries.
  • Do not use your phone number or office number.
  • Do not use your user ID, even when spelled backward.
  • Do not use acronyms, technical terms, or names of places.
  • Do not use names from popular culture like Harry_Potter, Hogwarts.
  • Do not use all numeric passwords like your license plate numbers.
  • Do not use dictionary words.
  • Do not use commonly used passwords like 123456, qwerty, 11111111, asdfgh.
  • Do not write down your passwords or share them with anyone else.
  • Do not save your passwords in unfamiliar computers or browsers.
  • Do not use the secret question option. It does not make any sense to use a strong password and back it up with an easily guessable security question.
  • Do not use obvious substitutions like "H0me" for "Home" or "D00R8377" for "DOORBELL."

The 20 Worst Passwords of 2020

According to Nordpass.com, here are the 20 worst passwords of 2020. The list also offers an overview of how many times the password has been breached, among other parameters.

Disclaimer: Stay away from these passwords.

Position Password Number of users Time to crack it Times exposed
1 123456 2,543,285 Less than a second 23,597,311
2 123456789 961,435 Less than a second 7,870,694
3 picture1 371,612 Three hours 11,190
4 password 360,467 Less than a second 3,759,315
5 12345678 322,187 Less than a second 2,944,615
6 111111 230,507 Less than a second 3,124,368
7 123123 189,327 Less than a second 2,238,694
8 12345 188,268 Less than a second 2,389,787
9 1234567890 171,724 Less than a second 2,264,884
10 senha 167,728 Ten seconds 8,213
11 1234567 165,909 Less than a second 2,516,606
12 qwerty 156,765 Less than a second 3,946,737
13 abc123 151,804 Less than a second 2,877,689
14 Million2 143,664 Three hours 162,609
15 000000 122,982 Less than a second 1,959,780
16 1234 112,297 Less than a second 1,296,186
17 iloveyou 106,327 Less than a second 1,645,337
18 aaron431 90,256 Three hours 30,576
19 password1 87,556 Less than a second 2,418,984
20 qqww1122 85,476 Fifty two minutes 122,481

5 Tips on How to Choose a Strong Password Manager

how-to-choose-a-strong-password

A password manager helps you auto-generate strong passwords and stores them in encrypted, centralized locations on your behalf. You can access all your passwords with a master password.

A lot of password managers are free to use and provide optional features such as synchronizing new passwords across several devices. If allowed, they also audit users’ actions to ensure that they are not repeating their passwords in multiple locations.

So, (to be on the right track), how to choose a strong password manager? Well, it should at least have the following core features:

  • Storage: While some password managers store passwords in a local hard-drive, some others use cloud storage. The latter is usually preferable if your employees or users use multiple devices. They can access their account credentials from any device with an internet connection. Also, if their devices are stolen, they won't lose their passwords.
  • Encryption: Go for a strong encryption standard. The next time you wonder how to choose a strong password manager, go for the one that uses 256-bit Advanced Encryption Standard (AES) encryption.
  • Easy-to-use: The password manager you choose should have an intuitive interface so that it's easy to use. Otherwise, your users or employees will stick to their old habits of creating weak, familiar passwords. Some managers also offer automated password changers that automatically change old passwords to new stronger ones.
  • Security: It should support two-factor authentication, track password usage, and generate audit reports. The password manager should also end sessions when a device is idle for a predefined amount of time. Also, ensure it has a built-in VPN and the ability to restrict access to blacklisted Internet sites.
  • Value: The password manager should also have additional nice-to-have features:

    • Automated support for directory services integration.
    • The ability to generate a portable vault.
    • An account recovery feature in case of forgotten master passwords.
    • The ability to encrypt and store sensitive files in secure vaults.

Reduce Password Vulnerabilities Using the LoginRadius Password Management Solution

To answer the popular question "how to choose a strong password in 2021", LoginRadius offers a range of robust Password Policy features.

The CIAM platform captures the following categories of password management in the LoginRadius Admin Console:

  • Password Expiration: You can customize how often you want your consumers to reset their passwords. There's a password expiry configuration setting to help you out.
  • Password History: You can configure the number of unique passwords a consumer must set before allowing them to reuse one of their older passwords.
  • Password Complexity: You can configure the password complexity for your consumer's account by forcing validation rules, preventing them from using common passwords and dictionary words.
  • Password Compliance Check: You can identify which consumers are abiding by your password complexity requirements and flag those who aren't.

Conclusion

By now, you know how to choose a strong password. However, hackers will still try to crack your passwords, no matter how secure you are trying to make them.

Follow the steps listed above to make your passwords as strong and unique as possible. Remember, if your password is too easy to remember, it is probably not secure at all.

book-a-demo-loginradius

Rakesh Soni

Written by Rakesh Soni

Entrepreneur by Work. Artist by ❤️. Engineer by Trade. Human Being. Feminist. Proud Indian. CEO/Founder at LoginRadius, securing 1B+ IDs worldwide.

LoginRadius CIAM Platform

Our Product Experts will show you the power of the LoginRadius CIAM platform, discuss use-cases, and prove out ROI for your business.

Book A Demo Today