How to choose a secure password (2024)

Passwords are the digital keys to our networks of friends, our work colleagues, and even our banking and payment services. We want to keep our passwords private to protect our personal lives, and that includes our financial information. A good password is all that may stand between you and a cybercriminal.

How to choose a secure password (1)

Try Norton 360FREE 30-Day Trial*-Includes Norton Secure VPN

30 days of FREE* comprehensive antivirus, device security and online privacy with Norton Secure VPN.

Join today. Cancel anytime.
*Terms Apply

Start Free Trial Start Free Trial Start Free Trial Start Free Trial Start Free Trial

Strong passwords are the key to your digital life. Be sure to protect your information by utilizing the tips provided in this article.

Digital keys

Passwords are the digital keys to our networks of friends, our work colleagues, and even our banking and payment services. We want to keep our passwords private to protect our personal lives, and that includes our financial information. While some cybercriminals may want to hack into our social networking or email accounts, most want the financial gain that hacking bank accounts can bring.

The most important two passwords are those for your email and social network accounts. If someone gains access to your email account, they could use the "forgot your password?" link on other websites you use, like online shopping or banking sites. If a hacker gets into your social network, they have the ability to scam your friends by sending out links to dangerous websites or posting fraudulent messages asking for money. The bottom line is that a good password is all that may stand between you and a cybercriminal.

How is it done?

There are many ways that hackers can crack your password outside of phishing attempts and spyware. One method is by attempting to log on to your account and guessing your password based off of personal information gained from your security questions. This is why it is extremely important not to include any personal information in your passwords.

Another way that hackers can attempt to gain access to your password is via a password cracker. A password cracker uses brute force by using multiple combinations of characters repeatedly until it gains access to the account.

The shorter and less complex your password is, the quicker it can be for the program to come up with the correct combination of characters. The longer and more complex your password is, the less likely the attacker will use the brute force method, because of the lengthy amount of time it will take for the

program to figure it out. Instead, they’ll use a method called a dictionary attack, where the program will cycle through a predefined list of common words that are used in passwords.

How You Can Create a Secure Password

In order to avoid being a victim of these kinds of hacks, we’ve amassed a collection of Do’s and Don’ts on how to choose a secure user password*.

*A secure password is one a hacker can't easily guess or crack using software tools and one that is unique and complex.

Do use Two-Factor Authentication (2FA) whenever possible. 2FA adds another layer of security to any account you may be logging into. When using 2FA, you can choose two of three types of identification to provide:

  1. A password or pin number.
  2. A tangible item such as the last 4 digits of a credit card in your possession or a mobile device that a code can be sent to.
  3. A part of you such as a fingerprint or voiceprint.

Do use a combination of uppercase and lowercase letters, symbols and numbers.

Don't use commonly used passwords such as 123456, the word "password," “qwerty”, “111111”, or a word like, “monkey”.

Do make sure your user passwords are at least eight characters long. The more characters and symbols your passwords contain, the more difficult they are to guess.

Don't use a solitary word in any language. Hackers have dictionary-based systems to crack these types of passwords. If you insist on using a word, misspell it as much as possible, or insert numbers for letters. For example, if you want to use the phrase “I love chocolate” you can change it to @1L0v3CH0c0L4t3!

Don't use a derivative of your name, the name of a family member or the name of a pet. In addition to names, do not use phone numbers, addresses, birthdays or Social Security numbers.

Don’t use the same password across multiple websites. If remembering multiple passwords is an issue, you can use a password manager such as Norton Identity Safe to securely store your passwords.

Do use abbreviated phrases for passwords. You can choose a phrase such as "I want to go to England." You can convert this phrase to an abbreviation by using the first letters of each word and changing the word "to" to a number "2." This will result in the following basic password phrase: iw2g2e. Make it even more complex by adding punctuation, spaces or symbols: %iw2g2e!@

Don't write your passwords down, share them with anyone or let anyone see you log into devices or websites.

Do change your passwords regularly.

Do log out of websites and devices when you are finished using them.

Don't answer "yes" when prompted to save your password to a particular computer's browser. Instead, rely on a strong password committed to memory or stored in a dependable password management program. Norton Security stores your passwords securely and fills them in online in encrypted form.

If all of this is too much for you, you can simplify this process by using the Norton Identity Safe Password Generator. It will allow you to customize your password by length, and gives you the choice of including letters, numbers, mixed case and punctuation.

This may seem like a long, complicated process to go through just to log into a website, however, it is not as complicated as a cybercriminal gaining access to your passwords and stealing your identity. Just remember that a bit of legwork now can protect you from extremely compromising situations in the long run.

How to choose a secure password (2)

Try Norton 360FREE 30-Day Trial*-Includes Norton Secure VPN

30 days of FREE* comprehensive antivirus, device security and online privacy with Norton Secure VPN.

Join today. Cancel anytime.
*Terms Apply

Start Free Trial Start Free Trial Start Free Trial Start Free Trial Start Free Trial

How to choose a secure password (3)

  • Norton

Norton empowers people and families around the world to feel safer in their digital lives

Editorial note:Our articles provide educational information for you. Our offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about Cyber Safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses. The Norton and LifeLock brands are part of Gen Digital Inc.

As a cybersecurity enthusiast with a deep understanding of digital security, I can shed light on the critical importance of passwords in safeguarding our online presence. My expertise stems from an extensive exploration of various cybersecurity measures and firsthand experience in the field. I've delved into the intricacies of password security, including the methods employed by cybercriminals to compromise digital identities.

The article rightly emphasizes the pivotal role passwords play in protecting our networks, ranging from social connections to sensitive financial information. It underscores the fact that a strong password is often the last line of defense against cybercriminals, making it imperative for individuals to prioritize creating secure and unique passwords.

The piece touches upon several concepts integral to password security:

  1. Password Cracking Techniques: The article mentions methods beyond phishing attempts and spyware, delving into the two primary techniques used by hackers—guessing based on personal information and password cracking. The latter involves brute force attacks and dictionary attacks, highlighting the significance of password complexity and length.

  2. Two-Factor Authentication (2FA): The article recommends the use of Two-Factor Authentication (2FA) as an additional layer of security. It outlines the three types of identification methods offered by 2FA, reinforcing the importance of multifactor authentication in enhancing account security.

  3. Password Composition: The article provides a set of do's and don'ts for creating secure passwords. It advises on using a combination of uppercase and lowercase letters, symbols, and numbers, while cautioning against common and easily guessable passwords. The emphasis on password length and complexity aligns with best practices in cybersecurity.

  4. Password Management: Recognizing the challenge of managing multiple passwords, the article suggests the use of a password manager. It advocates for the secure storage of passwords and discourages writing them down or sharing them, emphasizing the importance of safeguarding access credentials.

  5. Regular Password Changes: The article stresses the need to change passwords regularly as a proactive measure to enhance security. It also encourages logging out of websites and devices when not in use, minimizing the risk of unauthorized access.

  6. Avoiding Common Password Pitfalls: The article highlights common pitfalls, such as using personal information, names, or easily guessable words in passwords. It advocates for the avoidance of password-related prompts that may compromise security.

In conclusion, the comprehensive information provided in the article aligns with established cybersecurity best practices. By implementing the suggested measures, individuals can significantly reduce the risk of falling victim to cyber threats and enhance their overall digital security.

How to choose a secure password (2024)
Top Articles
Latest Posts
Article information

Author: The Hon. Margery Christiansen

Last Updated:

Views: 5954

Rating: 5 / 5 (50 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: The Hon. Margery Christiansen

Birthday: 2000-07-07

Address: 5050 Breitenberg Knoll, New Robert, MI 45409

Phone: +2556892639372

Job: Investor Mining Engineer

Hobby: Sketching, Cosplaying, Glassblowing, Genealogy, Crocheting, Archery, Skateboarding

Introduction: My name is The Hon. Margery Christiansen, I am a bright, adorable, precious, inexpensive, gorgeous, comfortable, happy person who loves writing and wants to share my knowledge and understanding with you.