Using Strong Passwords

  • Home
  • Using Strong Passwords
Using Strong Passwords
Using Strong Passwords | Safety Is A Mindset — Cybersecurity
Safety Is A
Mindset
CYBERSECURITY · ACTIVE TOPIC
safetyisamindset.com
Cybersecurity · Password Security

Strong Pass words.

Your password is the lock on every digital door you own. Most people use locks that can be picked in seconds. Safety Is A Mindset teaches the science, the habits, and the tools that turn weak locks into unbreakable ones — and makes those habits stick across your entire organisation.

81% Of hacking-related breaches use stolen or weak passwords (Verizon DBIR)
24B Username/password combos available on dark web in 2022 (Digital Shadows)
123456 Most used password globally — cracked in under 1 second.
$4.9M Average cost of a breach involving compromised credentials (IBM 2024)

Interactive Tool

Test Your Password Strength

Type any password to see its real-time strength analysis — entropy score, estimated crack time, and specific improvement tips. Nothing is stored or transmitted. This tool runs entirely in your browser.

// password_strength_analyser — live analysis

Nothing stored · Nothing transmitted · Runs in browser only

Strength:
At least 16 characters long
Contains uppercase letters (A–Z)
Contains lowercase letters (a–z)
Contains numbers (0–9)
Contains symbols (!@#$%^&*)
Not a common dictionary word or pattern
// Start typing to see analysis...

// Estimated Crack Time

Enter a password to calculate crack time based on brute-force at 100 billion guesses per second.

// Entropy Score

0bits
// Length: —
// Charset size: —
// Combinations: —

The Better Alternative

Password vs Passphrase — The Data

Complex passwords are hard to remember and easier to crack than most people realise. Passphrases — random sequences of common words — are significantly more secure and dramatically easier to remember.

Complex Password

P@ssw0rd2024!
Length13 chars
Character set~72 chars
Entropy~43 bits
Crack time (100B/s)~3 hours
In breach databasesVariants exist
MemorabilityHard to recall
⚠ "P@ssw0rd" is a known substitution pattern. Attackers' dictionaries include all l33t-speak variations. Letter substitutions add almost no real entropy.

Random Passphrase

correct-horse-battery-staple-77
Length31 chars
Word pool7,776 words (EFF)
Entropy~82 bits
Crack time (100B/s)> 50,000 years
In breach databasesUnique combination
MemorabilityVisual story-form
✓ Four random words chosen from the EFF Diceware list creates a memorable mental image and provides dramatically more entropy than any complex 13-character password.

Know Your Enemy

How Attackers Actually Crack Passwords

Understanding the attack methods your password must withstand is the only way to evaluate whether it's actually strong enough. Safety Is A Mindset teaches defenders to think like attackers.

// ATTACK_01📖

Dictionary Attack

Automated tools test millions of common words, phrases, and known leaked passwords. Modern dictionaries include all common words, every leaked password from major breaches, and all obvious variations.

⚡ Cracks "Summer2023!" in under 10 seconds
// Defence: Never use dictionary words in sequence. Passphrases must use RANDOM word selection.
// ATTACK_02💻

Brute Force Attack

Every possible character combination is tried systematically. Modern hardware can attempt 100 billion+ guesses per second. Short passwords — even complex ones — fall quickly.

⚡ 8-char all-type password: cracked in < 1 day
// Defence: Length defeats brute force. Every character multiplies complexity exponentially. 16+ minimum.
// ATTACK_03🌊

Credential Stuffing

Billions of username/password combinations from previous breaches are tested against thousands of websites simultaneously. One reused password compromises everything.

⚡ 24B credentials on dark web (2022)
// Defence: Unique password for every account. Non-negotiable. Use a password manager.
// ATTACK_04🎨

Rainbow Table Attack

Pre-computed tables map every password to its hashed value, allowing instant lookup. If a database is breached and passwords are stored as unsalted hashes, they're cracked in milliseconds.

⚡ MD5 tables cover all 8-char passwords
// Defence: Strong unique passwords + properly salted hashing. Length and uniqueness defeat rainbow tables.
// ATTACK_05🎭

Phishing & Credential Harvest

No cryptographic strength matters if you type your password into an attacker's fake login page. The strongest password is worthless if it's phished.

⚡ 91% of cyberattacks begin with phishing
// Defence: MFA + password manager autofill + phishing awareness training.
// ATTACK_06🔑

Password Spraying

Attackers try one common password across thousands of accounts simultaneously — bypassing lockout policies entirely.

⚡ Bypasses lockout policies entirely
// Defence: Unique passwords + MFA makes spraying attacks irrelevant.

The Rules

7 Golden Rules of Password Security

These are not guidelines — they are the minimum standard. Safety Is A Mindset trains individuals and teams to make these habits automatic, not aspirational.

// RULE_01

Use 16+ Characters — Minimum

Length is the single most important factor in password security. Every additional character multiplies the number of possible combinations exponentially.

✓ DO: "correct-horse-battery-staple-river" (37 chars, impossible to brute force)
✗ DON'T: "P@ssw0rd!" (9 chars, cracked in minutes despite complexity)
// RULE_02

Never Reuse Passwords — Ever

Password reuse is the single most dangerous password behaviour. When one site is breached, every other account using that password is immediately compromised through credential stuffing.

✓ DO: Unique password for every account — use a password manager
✗ DON'T: Use the same password (even modified) across multiple sites
// RULE_03

Use a Password Manager

A password manager generates, stores, and autofills unique cryptographically strong passwords for every account. It won't autofill on phishing sites — providing automatic domain verification.

✓ DO: Use Bitwarden, 1Password, or Dashlane with a strong master password + MFA
✗ DON'T: Store passwords in plain text files, spreadsheets, or sticky notes
// RULE_04

Enable MFA on Every Account

MFA blocks 99.9% of automated account attacks (Microsoft research). Even if your password is compromised, MFA stops the attacker at the next gate.

✓ DO: Use authenticator apps (Google Authenticator, Authy) — stronger than SMS
✗ DON'T: Rely on SMS MFA for high-value accounts — SIM swapping can intercept codes
// RULE_05

Check Against Breach Databases

Your password may already be in attackers' hands from a past breach. haveibeenpwned.com lets you check whether your credentials appear in known breach databases.

✓ DO: Check haveibeenpwned.com regularly and change any flagged passwords immediately
✗ DON'T: Assume your accounts are safe because you've never been directly notified
// RULE_06

Never Share Passwords Insecurely

A strong password shared via email or Slack is immediately as weak as those channels. If sharing is required, use encrypted channels designed for it.

✓ DO: Use shared password manager team vaults (1Password Teams, Bitwarden Org)
✗ DON'T: Email, text, or verbally share passwords
// RULE_07

Change After Any Suspected Breach

NIST 2024 guidelines recommend changing passwords when compromise is suspected or confirmed — not on an arbitrary 90-day rotation schedule.

✓ DO: Change passwords immediately on receiving breach notifications or after clicking a suspicious link
✗ DON'T: Follow arbitrary 90-day rotation that leads to predictable changes ("Password1" → "Password2")

The Second Layer

Multi-Factor Authentication — The Non-Negotiable

MFA adds a second verification step that an attacker cannot bypass even with your correct password. Safety Is A Mindset treats MFA as a non-negotiable personal safety behaviour.

MFA Blocks 99.9% of Automated Account Attacks

Microsoft's analysis of hundreds of millions of accounts shows that enabling MFA reduces automated account compromise rate by 99.9%. No password policy achieves anything close to this level of protection on its own.

🔐
Hardware Security Key (FIDO2/WebAuthn)Physical USB or NFC key (YubiKey, Google Titan). Cryptographically unphishable. The gold standard — immune to all remote attacks.
📱
Authenticator App (TOTP)Time-based 6-digit code from Google Authenticator, Authy, or Microsoft Authenticator. Significantly stronger than SMS. Recommended for all business accounts.
💬
SMS / Text CodeBetter than no MFA but vulnerable to SIM-swapping. Not recommended for high-value accounts.
🔔
Push Notification (App Approval)Convenient but vulnerable to MFA fatigue attacks. Use number matching where available.
99.9%Automated attacks blocked

Microsoft analysis across hundreds of millions of accounts

76%Accounts with MFA never compromised

Even with password exposed in breaches — MFA held the line

30 secAverage additional login time

The entire cost of MFA — 30 seconds to block 99.9% of attacks

$0Cost of an authenticator app

Google Authenticator, Authy, and Microsoft Authenticator are all free.

Related Topics

safetyisamindset.com — related_topics/

Frequently Asked Questions

Password managers are significantly safer than the alternatives. Reputable managers (Bitwarden, 1Password, Dashlane) use zero-knowledge architecture: your data is encrypted locally before it ever leaves your device. Even in a server-side breach, properly encrypted vaults require your master password to decrypt. The risk of using a password manager is far lower than the risk of not using one.
Yes — NIST SP 800-63B guidelines (updated 2024) no longer recommend mandatory periodic password rotation without evidence of compromise. Research showed forced rotation leads to predictable, incrementally modified passwords that are actually weaker. NIST now recommends changing passwords immediately when compromise is suspected or confirmed — not on a fixed schedule.
IT policies that block password managers force employees to rely on memory or insecure alternatives — measurably worse for security. The solution is to mandate an approved, enterprise-grade password manager (1Password Business, Bitwarden for Business, Keeper Enterprise) rather than blocking all password managers. If your IT policy currently blocks all password managers, that policy needs to be updated — not enforced.
Passkeys are a FIDO2/WebAuthn-based method that replaces passwords entirely. They're phishing-resistant by design — bound to the specific website domain, so a phishing site cannot capture them. Yes, organisations should be moving toward passkeys — major platforms (Google, Apple, Microsoft, GitHub) already support them. For accounts not yet supporting passkeys, strong password + MFA remains the standard.
The answer is not more reminders — it's reducing the friction of safe behaviour. Three approaches that work: First, provide the tools — supply an approved password manager at no cost. Second, make it personal — show employees how to check their own emails on haveibeenpwned.com. When someone sees their own credentials in a breach, behaviour change follows. Third, make MFA normal before mandatory — run adoption as opt-in first, then require it with sufficient lead time.
Browser-based password managers are significantly better than no password manager. For personal use, they are an adequate baseline. However, for organisational use a dedicated password manager with enterprise controls is the appropriate standard — shared vaults, access management, offboarding control, and audit logs are not available in browser managers.

$ ./safetyisamindset --topic=password-security

Build the Habit.
Lock the Door.

Strong passwords are only as strong as the habits that maintain them. Safety Is A Mindset's cybersecurity awareness programmes turn password security from a policy on paper into a reflex your team carries every day.

Explore Training →

Tier: 2

Course ID: 8029

Language: English

Get Started with Safety Is A Mindset Training

Complete the form below to request more information, schedule your training, or ask questions about any of our professional safety programs. Let us help you take the next step toward a safer and more compliant workplace.