Why Weak Passwords Are Still a Major Problem

Despite years of warnings, weak passwords remain one of the leading causes of account breaches. Common passwords like "123456", "password", or a pet's name are cracked in seconds by automated tools. If a single password is reused across multiple sites and one site gets breached, every account sharing that password is suddenly at risk.

The good news: building strong password habits doesn't require a computer science degree. It just requires a few simple rules.

What Makes a Password Strong?

A strong password has these characteristics:

  • Length: At least 12–16 characters. Length matters more than complexity.
  • Unpredictability: Avoids dictionary words, names, dates, or keyboard patterns (like "qwerty").
  • Mix of character types: Uppercase, lowercase, numbers, and symbols.
  • Uniqueness: Never reused across different accounts.

The Passphrase Method

One of the best techniques for creating memorable, strong passwords is using a passphrase — a string of random words combined together. For example:

BlueTractor$Marble99Clouds

This is long, hard to guess, includes varied character types, and is far easier to remember than a random string like x@7Kp!2qW. The key is to choose words that have no logical connection to each other or to you personally.

Use a Password Manager

The most practical solution to the password problem is a password manager. These tools generate, store, and autofill unique complex passwords for every site — you only need to remember one strong master password.

Popular options include:

  • Bitwarden: Open-source, free tier, cross-platform — an excellent starting point
  • 1Password: Strong family and team features, polished interface
  • KeePassXC: Fully offline, open-source, for those who prefer local storage

With a password manager, you can have a truly random 20-character password for every account without ever needing to memorize them.

Enable Two-Factor Authentication (2FA)

Even a strong password can be stolen through phishing or a data breach. Two-factor authentication (2FA) adds a second layer of protection — even if your password is compromised, an attacker still can't log in without your second factor.

Types of 2FA, ranked from most to least secure:

  1. Hardware security key (e.g., YubiKey) — most secure
  2. Authenticator app (e.g., Authy, Google Authenticator) — highly recommended
  3. Email or SMS code — better than nothing, but vulnerable to SIM swapping

Password Dos and Don'ts

DoDon't
Use a unique password per siteReuse passwords across accounts
Use a password managerStore passwords in a plain text file
Enable 2FA everywhere possibleUse your name, birthday, or pet's name
Update passwords after a breachShare passwords via email or text

Check If You've Been Breached

Visit haveibeenpwned.com — a free, reputable service — to check if your email address has appeared in any known data breaches. If it has, change the passwords for affected accounts immediately and enable 2FA.

Strong password habits are the foundation of your online security. Start with one account, build the habit, and work your way through the rest.