• Link to LinkedIn
  • Link to Facebook
  • Link to Youtube
  • GET YOUR INSTANT IT SECURITY ASSESSMENT
585-283-7102
IT Insights of Rochester LLC
  • Home
  • Services
    • Cybersecurity Protection
    • Network and System Services
    • Disaster Recovery
    • Cloud Services
    • Documentation Maintenance
    • 24/7 System Monitoring
  • Partners
  • Insights
  • About
    • Careers
  • Contact
  • Menu Menu

Insights

How to Create a Strong Password

Security, Tips and Recommendations

What is a Strong Password, and Why Does it Matter?

We live in a world where we are barraged with more online apps, virtual platforms, online services and digital accounts than ever before. And, every single one of them requires a password. Whether it’s your Hulu login credentials or online banking double encryption, you need strong passwords to protect yourself and your personal information no matter where you go on the internet. Combine your ever-growing list of digital accounts with the increasing frequency of data breaches and cybercriminals lying in wait, it is smart to ask yourself, “Just how strong is my password?” and “How many passwords do I really need?” Read our tips on what makes a strong password and how to make a good password to keep yourself, your data and your personal information protected.

How to Create a Strong Password

In reality, it’s common for people to use the same passwords for years. But, experts recommend using a different complex password for every site and account. Let’s face it, it’s less daunting to remember one or two passwords with slight variations. The problem is that many of us not only use similar passwords multiple times, but we use these same variations across multiple platforms too. There are two problems with this:

  1. If you’ve been using your password for more than a year, it’s likely already been part of a past data breach.
  2. If you’re reusing passwords across platforms, one breach puts all other platforms at risk.

That means if you’ve saved your personal data or forms of payment on one site, you’ve potentially opened yourself up to breaches on another site by using the same password in both places. For example, perhaps you use the password DogLover123 for your online bank account. Your bank likely has strong security. However, let’s say you have also used that password for your Yahoo email address. But, just a few years ago, Yahoo had one of the most significant data breaches in history, and if your password was compromised there, it could also be used to access your bank account. It is crucial that your passwords should be not only unique in terms of characters and symbols but also unique to the platform they’re being used on. While this might sound like a lofty goal, like your doctor telling you to exercise every day and get at least eight hours of sleep every night, we have some tips and strong password examples to help you keep your accounts secure.

How to Remember Your Passwords

Our number one tip for remembering all those passwords is to use a password manager. There are several advantages to using a password manager, like one of these recommended by PCMag. First, password managers use encryption to keep all your passwords secure in a single location. This beats any spreadsheet or handwritten list, because it provides secure, encrypted access. Second, most password managers have the option to autogenerate, save, and autofill your passwords. These features make it easy to remember, store and secure your passwords. But, if you’re looking for an alternative to generate your own strong passwords, we have some examples and tips to help with that, too.

Things to Avoid When Creating Passwords

Weak vs. Strong Passwords

Weak passwords are easy to spot and easy to hack. Our DogLover123 example above is a primary candidate of what to avoid. Here are examples that illustrate what not to do:

  • DO NOT USE common words, phrases or names. A good rule of thumb is to avoid using words found in the dictionary for your password. You also shouldn’t use any information a stranger could know about you. For example, your first or last name, date of birth, year you graduated, etc.
  • DO NOT USE sequential letters, numbers and symbols. No more ABC, 123 or !@#. These are easy to guess and leave you vulnerable to hacking.
  • DO NOT USE something that relates to our hobbies or interests. Reach outside your interests, especially for your password hints.

What is an Example of a Strong Password?

Strong Password Examples

An easy way to make a strong, memorable password is to make it a sentence. For example, if your password was DogLover123, an alternative making the password stronger would be I<3myGoldenDoodle! Here are some more strong password examples:

  • XVwlNNx4rh9W
  • N4]39#(^h{CV
  • pHRUn.[‘K&mU

They’re not always pretty to look at, but the degree of randomness and a mixture of unpredictable letters and symbols keep your personal data and account secure. Things to keep in mind when creating your password:

  • Make it long. At the very least, 8 characters. 12 characters are even better.
  • Use a mix of random characters. Uppercase and lowercase letters, numbers and symbols.
  • Use a password manager with a password generator. You can find some great recommendations here.

How Strong is Your Password?

Many people don’t see security as an investment, but cyberattacks can result in huge losses for your company. Along with strong passwords, you should also be using two-factor authentication (2FA). If you have questions or need help setting up a password manager or 2FA in your organization, that’s what we’re here for.

CONTACT US

August 24, 2022
Tags: Cyberattack, Encryption, Password Manager, Two-Factor Authentication (2FA)
Share this entry
  • Share on Facebook
  • Share on LinkedIn
  • Share on Reddit
  • Share by Mail
You might also like
Server Backup Solutions and Why They Matter Server Backup Solutions and Why They Matter
IT Security Services Enhance Digital Protection, Part 2 of 4 IT Security Services Enhance Digital Protection (Part 2 of 4)
IT Security Services Enhance Digital Protection IT Security Services Enhance Digital Protection (Part 4 of 4)
The Power of Two-Factor Authentication The Power of Two-Factor Authentication (2FA)
IT Security Services Enhance Digital Protection IT Security Services Enhance Digital Protection (Part 3 of 4)
How IT Insights Can Help Implement NIST CSF 2.0 How IT Insights Can Help You Implement NIST CSF 2.0

Categories

  • Business
  • Infrastructure
  • IT Careers
  • IT Insights Life
  • IT Services
  • News
  • Security
  • Team
  • Technology
  • Tips and Recommendations
  • Uncategorized

Tags

3-2-1 Rule Antivirus Autotask AWS Backups Client Technology Support Cloud Computing Cloud Migration Cloud Solutions Cyberattack Cybersecurity Cyber Threat Data Loss Data Protection Data Storage Datto Digital Protection Disaster Recovery Email Security Employee Recognition Encryption Hardware Inspection Infrastructure as a Service (IaaS) IT Glue IT Managed Service Provider (MSP) IT Support IT Team IT Tools Microsoft 365 Network Outsourcing Password Manager Phishing Phone System Platform as a Service (PaaS) Preventive Maintenance Project Management Project Planning Security Assessment Software as a Service (SaaS) Software Update System Administrator Telecommunications Two-Factor Authentication (2FA) VoIP

You need IT. We have the insights.

IT Insights provides managed IT services in Rochester, New York, the surrounding areas, and other regions.

585-283-7102

1150 Penfield Rd.
Rochester, NY 14625

Link to LinkedIn Link to Facebook Link to Youtube

Subscribe to Our Newsletter

Get important news, system recommendations and industry updates.

© 2025 IT Insights of Rochester LLC | Site design by KatieCreative
  • Privacy Policy
  • Terms of Use
  • W9
  • Submit a Ticket
  • Leave a Review
  • Brand Guidelines
  • Document Library
Link to: What are Firewalls? Link to: What are Firewalls? What are Firewalls?Firewalls Link to: WHY ROC: ‘IT Insights’ Expands in Rochester Providing Outsourced Technology Services Link to: WHY ROC: ‘IT Insights’ Expands in Rochester Providing Outsourced Technology Services WROC GRE IT Insights InterviewWHY ROC: ‘IT Insights’ Expands in Rochester Providing Outsourced Technology...
Scroll to top Scroll to top Scroll to top