How secure is your password?
How to create a safe and easy to remember password

It's World Password Day, so it's the perfect time to see how secure your password is.
Remember, just because a password is hard for you to remember, doesn't mean that a computer won't crack it within minutes or hours.
If you take away one thing from this article, it should be this: A long, easy to remember password is better than a short, complex password.
Let's illustrate this with a couple of examples. The first from XKCD shows the complicated password "Trub4dor&3" might appear secure, but it will take 3 days to crack at an estimated rate of 1,000 guesses per second.
Tips for your password
Do
Experiment with creating a strong password here
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Make it as long as possible
Use a variety of characters
Use different passwords whenever possible
Sign-up for two-factor authentication
Don'tUse any factual information e.g. birthdays
Share your password over email or text
Use simple passwords like "12345", "password" or "qwerty"
Meanwhile, a password made up of four random but easily memorable words "correct horse battery staple" would take 550 years to crack at a rate of 1,000 guesses per second. The more characters a password has, the longer it takes to crack.
Sound too good to be true? Let's look at another example, courtesy of Steve Gibson, who hosts the Security Now podcast.
Which is more secure?
PrXyc.N(n4k77#L!eVdAfp9 (23 characters)
or
D0g.....................(24 characters long)
Look closely, you'll see both include an uppercase letter, lowercase letter, number, and "special" character. So the second is more secure because it is longer.
Gibson doesn't recommend adding dots into all your passwords, but does suggest you come up with unique padding to help increase the length of passwords.
Most websites require you to use capital letters and numbers so this can act as your padding between four or more random but memorable words.
"You could put some padding in front, and/or interspersed through the phrase, and/or add some more to the end. You could put some characters at the beginning, padding in the middle, and more characters at the end. And also mix-up the padding characters by using simple memorable character pictures like "<->" or "[*]" or "^-^" . . . but do invent your own," Gibson noted.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
I love magic links – why aren’t more services using them?
Opinion Using magic links instead of passwords is safe and easy but they’re still infuriatingly underused by businesses
By Solomon Klappholz Published
-
Password management startup Passbolt secures $8 million to shake up credential security
News Password management startup Passbolt has secured $8 million in funding as part of a Series A investment round.
By Ross Kelly Published
-
LastPass breach comes back to haunt users as hackers steal $12 million in cryptocurrency
News The hackers behind the LastPass breach are on a rampage two years after their initial attack
By Solomon Klappholz Published
-
GitHub launches passkeys beta for passwordless authentication
News Users can now opt-in to using passkeys, replacing their password and 2FA method
By Daniel Todd Published
-
Microsoft SQL password-guessing attacks rising as hackers pivot from OneNote vectors
News Database admins are advised to enforce better controls as attacks ending in ransomware are being observed
By Rory Bathgate Published
-
No, Microsoft SharePoint isn’t cracking users’ passwords
News The discovery sparked concerns over potentially invasive antivirus scanning practices by Microsoft
By Ross Kelly Published
-
Microsoft Authenticator mandates number matching to counter MFA fatigue attacks
News The added layer of complexity aims to keep social engineering at bay
By Connor Jones Published
-
As Google launches passwordless authentication for all, what are the business benefits of passkeys?
News Google follows Apple in its latest shift to passwordless authentication, but what are the benefits?
By Ross Kelly Published