How NOT to Create a Password

There is a ton of information out there about how to create that perfect password. As long as you follow the rules, your password should be strong and un-crackable. Or at the very least, your password should be strong enough to outlast a few rounds of brute force attacks – giving you enough time to change your login credentials.

But what people so often fail to account for, are all of those password no-nos. You see, even if you are following the password rules, you still might come out of it with a pretty awful password. This is because hackers have found a way to use these rules to their advantage. They’ve identified patterns and have started using these patterns to crack even the most rule-abiding of passwords.

So to avoid having your potentially solid password go to waste, here are three major things you should watch out for:

 

NUMBERS

Not only have we been told that numbers make passwords stronger, but most online accounts require numbers inside passwords. Unfortunately, numbers only make passwords stronger if you use them correctly.

Many people have the natural tendency to attach a sequence of numbers to the back of the password; however, hackers know this is going to happen, so they automatically check for it.

A better option for those numbers is to stick them inside the password. Hackers are less likely to crack this.

Or, if you’re absolutely dead set on attaching numbers to the back (or front) of your password, then just make sure the numbers are legitimately random. In other words, don’t use “123” or “9876.”

 

PHRASES

Phrases are perfect for passwords…but only if they’re unique.

Just like people naturally feel the need to throw “123” onto the backs of their passwords, people naturally want to use the same phrases. It really doesn’t make any sense. There are so many word combinations out there that it’s slightly amazing (in the worst possible way) that people feel the need to use the same phrases for their passwords.

Everyone always wants to claim their love for something (Ilovepizza, Ilovefootball, Ilovecamping), and people really love using famous movie quotes or songs. Don’t do that. These types of phrases are an automatic check for hackers.

REPLACEMENTS

Certain letters or words have common keyboard replacements. ‘E’ can be replaced with ‘3.’ ‘At’ can be replaced with ‘@.’ And ‘B’ can be replaced with ‘8.’ And if the rest of your password is pretty rock-solid, then that’s okay. But if you’re relying on these common replacements to push you through a hack, you’ll be sorry.

Again, hackers know people are going to do this, so of course, they’re going to check for it. Actually, their password-cracking software will automatically check it for them.

How to Create and Remember Strong Passwords

Take charge of 2025

IT is no longer a back-office function—it’s a driver of growth and innovation. By tackling this checklist, you can ensure your business is ready to thrive in the face of challenges and opportunities alike.

Ready to transform your IT strategy? Schedule a free consultation with Techvera today.

Techvera icon

Written by Team Techvera

l

March 13, 2020

You May Also Like…

IT Checklist: What Small Businesses Need To Prioritize in 2025

IT Checklist: What Small Businesses Need To Prioritize in 2025

Now is the perfect time to revisit your IT structure, processes, and strategy to ensure your small business operates at its fullest potential. From defending against evolving cyber threats to supporting hybrid teams and boosting productivity, a robust IT strategy is essential to staying ahead in today’s competitive market.

Here’s a refreshed IT checklist to set your business up for success in the year ahead.

Skip to content