top of page
Search
  • Writer's pictureMark van Vuuren

Password Strength: How to Create Strong Passwords for Credentials?


Password strength is one of the criteria considered when creating password policies. After all, this is one of the most efficient measures to prevent passwords from being breached. And worrying about this is of paramount importance for organizations today.

This is because the use of weak passwords is one of the major reasons for data leaks in Brazil, and many Brazilians still opt for passwords that are easy to discover, such as the sequence 123456, the password word itself, family and football team names.

With that in mind, we have broken down the subject in this article, explaining more details about password strength and its importance for information security. To facilitate your understanding, we divided our text into the following topics:

  • How Important is the Strength of a Password?

  • Five Steps to Create a Strong Password

  • Periodic Password Changes: Are or Are They Not Important to Ensure Security?

  • Two Tips for Memorizing Passwords

  • Use Two-Step Verification or Multifactor Authentication to Protect Credentials

  • Are Password Strength Meters Reliable?

How Important is the Strength of a Password? A strong password has the function of preventing your accounts from being hacked by malicious actors, as a weak password can easily be guessed by a malicious user, exposing you to data theft and extortion.

If you are at the head of an organization, you have the aggravating factor of losing data from customers, partners, suppliers, and employees, which can bring great financial damage and damage to the credibility of your company.

What’s more, with the constant evolution of technology, it is not enough to just worry about human hackers. Today, there is software capable of evaluating the behavior of users, in order to guess the chosen password.

Some programs even perform combinations of words found in dictionaries and imitate patterns based on easy-to-memorize passwords, harming password strength.

We also point out that personal information exposed on social media, such as birthdays and names, also works against you and in favor of those who want to discover your passwords. Five Steps to Create a Strong Password

Now that you know the importance of password strength, here’s what you should do to create a strong password and ensure its security:

  • Opt for long passwords: Short ones are easier to identify, so we recommend you set a password of at least 12 characters, however, we advise that the ideal is to use 14 digits or more;

  • Create a complex combination: One of the ways to ensure password strength is to gather numbers, upper and lower case letters, and symbols to make it difficult for cyberattackers;

  • Do not choose words that can be found in dictionaries, proper names, product or company names;

  • Do not reuse previously used passwords;

  • Words written backward are not an adequate solution to guarantee password complexity;

  • Think of a password you are able to memorize, even if it is difficult for others to guess.

Periodic Password Changes: Are or Are They Not Important to Ensure Security? Periodic password change is a widely recommended measure to ensure password strength, but it has been the subject of some debate. Microsoft, for example, which used to recommend changing them every 60 days, started to consider this method useless and dangerous.

That’s because people tend to create their passwords based on easy-to-identify references, as explained above, and when they change their passwords, they make minimal changes to the words or numbers used. That is, if the hacker knows the victims’ current password, they will have many chances to discover the new code.

In addition, the malicious actor can use passwords already leaked in other security incidents to reuse them in other services. This practice is called credential stuffing, or password reuse. Do you want to find out if your password has been breached to know if you need to replace it? senhasegura Hunter is the ideal service for you. It indicates leaked credentials and what data has been compromised. You can even make a free consultation by clicking here, with the assurance your email will be used exclusively for this purpose.

Two Tips for Memorizing Passwords To ensure password strength, you will have to create complex and unique passwords. Therefore, you may have difficulty remembering which numbers, letters, and symbols were chosen for each one. Therefore, we prepared some tips for you to memorize these characters. Check it out: Use a Password Manager We know remembering all passwords can be a burden for users. Therefore, we recommend using a password manager that allows you to store them, as well as suggest and create strong passwords. But remember you will need to remember at least one access, from the manager itself, and this must be difficult to identify, otherwise, the program could be violated and expose the other passwords. senhasegura is one of the solutions that can be used for the proper storage and management of passwords in your company. Create a Rule to Make Memorization Easier You know you must use a unique password for each platform or service you access, but you can follow a single logic to create all your passwords. Another tip is to think of a phrase and shorten it to take advantage of its initials to create a password that is not obvious. However, do not forget the need to mix uppercase and lowercase letters, numbers, and symbols in order to ensure password strength. By following these tips, you are more likely to memorize your accesses, even if they are complex codes. Use Two-Step Verification or Multifactor Authentication to Protect Credentials When it comes to protecting your credentials, you should not limit yourself to criteria that guarantee password strength. Some features can be very efficient to ensure your cybersecurity.

One of them is two-step verification, also known as two-factor authentication (2FA). This is a mechanism that requires a second piece of data to give access to accounts, commonly in the form of codes sent by SMS or even an application token. However, we recommend you do not use text messages, as your mobile number can also be hacked. To generate codes through a token, it is possible to use authentication applications, such as:

  • Authy;

  • Google Authenticator; and

  • Microsoft Authenticator.

Multifactor authentication (MFA) consists of a tool that uses at least two mechanisms to authorize access to online systems, inhibiting the action of criminals. The methods used are knowledge factors (passwords and codes), possession factors (tokens), and inheritance factors (such as fingerprint and facial recognition). Are Password Strength Meters Reliable? When you create a password and enter it on a platform, it can be classified by the password strength meter as weak or strong, receive a score, or even be associated with the colors green, yellow, and red. With this information, you have the opportunity to rethink your chosen password and adopt a more complex code.

However, it is very common for people to question the efficiency of these password strength meters, which use algorithms to tell you if the password is strong in a situation of brute force attacks. The most problematic thing is that this type of attack is already old and today there are even dictionaries with lists of the most used passwords and patterns.

One exception to the rule is zxcvbn, which includes these patterns in its analysis and, according to experts, is the best choice when it comes to a password strength meter. It is not an infallible technology, but it is certainly ahead of the rest.

Another feature you can use to ensure password complexity is a password generator. This tool makes it possible to create different combinations of characters automatically and randomly, making it difficult for intruders to work.

17 views0 comments
bottom of page