Office, Karriere und IT Blog

Office, Karriere und IT Blog

Anzeige

How to create secure passwords

The number of online accounts that everyone in the meantime has in tow is steadily increasing. These include social media accounts, e-mail accounts, and countless access to online shops. Many, however, always use one and the same password for the various accesses, which makes it easy for hackers – once the password has been breached – to make some nonsense with their access data in no time at all.

According to Statista data, only very few Germans use a sufficient number of different passwords.

This may be due to the fact that many are not aware of the importance of password security, and on the other hand, of course, because it seems almost impossible to remember so many different passwords that should ideally be as complex as possible.

How to create secure passwords for your online accounts

Topic Overview

Anzeige

How to create secure passwords

The number of online accounts that everyone in the meantime has in tow is steadily increasing. These include social media accounts, e-mail accounts, and countless access to online shops. Many, however, always use one and the same password for the various accesses, which makes it easy for hackers – once the password has been breached – to make some nonsense with their access data in no time at all.

According to Statista data, only very few Germans use a sufficient number of different passwords.

This may be due to the fact that many are not aware of the importance of password security, and on the other hand, of course, because it seems almost impossible to remember so many different passwords that should ideally be as complex as possible.

How to create secure passwords for your online accounts

Topic Overview

Anzeige

The length of the password is important

When assigning a password, you are often asked to use at least one uppercase letter and a special character like % or /. However, what is not sufficiently checked is that the password is long enough. Although there is a minimum number of characters required, this is often too short, according to the National Institute of Standards and Technology (NIST).

Because a password should be at least 8 characters. And this is really only the absolute minimum! Better are 12 or 16 characters. It would also be desirable to allow the providers spaces in passwords, which would increase the possibilities of complexity, and thus the security again.

A short password with, for example, only 8 characters, even if you spam them with special characters, can be detected in a relatively short time by computers that do nothing but try out passwords. And already the culprits have gotten a hit again to drive Schindluder with your data. If the same password applies to other accounts then the damage can be considerable.

For if you buy at your expense on the Internet, and the goods are delivered to any packing stations you may not notice this at first, or very late. Then it will be difficult if not impossible to find the perpetrators who often sit abroad, while you stay at high cost. Because it was not hacked the portal where your access data were tapped, but you yourself were the victim of a hacker attack, which you have apparently made possible by insufficient security arrangements.

Ads

The length of the password is important

When assigning a password, you are often asked to use at least one uppercase letter and a special character like % or /. However, what is not sufficiently checked is that the password is long enough. Although there is a minimum number of characters required, this is often too short, according to the National Institute of Standards and Technology (NIST).

Because a password should be at least 8 characters. And this is really only the absolute minimum! Better are 12 or 16 characters. It would also be desirable to allow the providers spaces in passwords, which would increase the possibilities of complexity, and thus the security again.

Ads

A short password with, for example, only 8 characters, even if you spam them with special characters, can be detected in a relatively short time by computers that do nothing but try out passwords. And already the culprits have gotten a hit again to drive Schindluder with your data. If the same password applies to other accounts then the damage can be considerable.

For if you buy at your expense on the Internet, and the goods are delivered to any packing stations you may not notice this at first, or very late. Then it will be difficult if not impossible to find the perpetrators who often sit abroad, while you stay at high cost. Because it was not hacked the portal where your access data were tapped, but you yourself were the victim of a hacker attack, which you have apparently made possible by insufficient security arrangements.

How do I remember long passwords?

As we said before, with strong passwords, the creativity and convenience of many users are failing to come up with a sensible password. Many then resort to password generators, which are however not particularly recommendable, because here the passwords created at some point are the same, and can easily be spied out.

Another option is to use a password manager for all your passwords. Here then a single master password is sufficient to get to all other data. But the BSI has come to the conclusion that this alternative is risky. Because if only a single password is needed to then get sorted by a variety of passwords with the associated portals that may not be the right solution.

Your passwords should be as individual as possible, and preferably consist of a whole sentence, in which you then exchange certain letters for numbers (for example, an E against a 3, or a B against an 8, etc.). The sentence should also be really individual and not something like “youcannot getinhere”.

It is best to form sentences that have emerged from personal life events that really only you and maybe a handful of people from your personal environment can know, and convert them by exchanging letters for numbers and / or special characters, and uppercase and lowercase letters ,

So take the time to invest in your online security, because the damage caused by inadequate security measures can bring you much more trouble.

Blogverzeichnis Bloggerei.de
Ads

How do I remember long passwords?

As we said before, with strong passwords, the creativity and convenience of many users are failing to come up with a sensible password. Many then resort to password generators, which are however not particularly recommendable, because here the passwords created at some point are the same, and can easily be spied out.

Another option is to use a password manager for all your passwords. Here then a single master password is sufficient to get to all other data. But the BSI has come to the conclusion that this alternative is risky. Because if only a single password is needed to then get sorted by a variety of passwords with the associated portals that may not be the right solution.

Ads

Your passwords should be as individual as possible, and preferably consist of a whole sentence, in which you then exchange certain letters for numbers (for example, an E against a 3, or a B against an 8, etc.). The sentence should also be really individual and not something like “youcannot getinhere”.

It is best to form sentences that have emerged from personal life events that really only you and maybe a handful of people from your personal environment can know, and convert them by exchanging letters for numbers and / or special characters, and uppercase and lowercase letters ,

So take the time to invest in your online security, because the damage caused by inadequate security measures can bring you much more trouble.

Blogverzeichnis Bloggerei.de

Search for:

About the Author:

Michael W. SuhrDipl. Betriebswirt | Webdesign- und Beratung | Office Training
After 20 years in logistics, I turned my hobby, which has accompanied me since the mid-1980s, into a profession, and have been working as a freelancer in web design, web consulting and Microsoft Office since the beginning of 2015. On the side, I write articles for more digital competence in my blog as far as time allows.

Search by category:

Search for:

About the Author:

Michael W. SuhrDipl. Betriebswirt | Webdesign- und Beratung | Office Training
After 20 years in logistics, I turned my hobby, which has accompanied me since the mid-1980s, into a profession, and have been working as a freelancer in web design, web consulting and Microsoft Office since the beginning of 2015. On the side, I write articles for more digital competence in my blog as far as time allows.

Search by category:

Popular Posts:

2010, 2025

Blocking websites on Windows using the hosts file

October 20th, 2025|Categories: Shorts & Tutorials, Homeoffice, Microsoft Office, Windows 10/11/12|Tags: , , , |

Want to block unwanted websites in Windows? You can do it without extra software using the hosts file. We'll show you how to edit the file as an administrator and redirect domains like example.de to 127.0.0.1. This will block them immediately in all browsers.

2010, 2025

The “Zero Inbox” method with Outlook: How to permanently get your mailbox under control.

October 20th, 2025|Categories: Shorts & Tutorials, Data Protection, Homeoffice, Microsoft Office, Microsoft Outlook, Office 365, Windows 10/11/12|Tags: , , , |

Caught red-handed? Your Outlook inbox has 1000+ emails? That's pure stress. Stop the email deluge with the "Zero Inbox" method. We'll show you how to clean up your inbox and regain control using Quick Steps and rules.

2010, 2025

5 simple security rules against phishing and spam that everyone should know

October 20th, 2025|Categories: Shorts & Tutorials, Data Protection, Homeoffice, Internet, Finance & Shopping, Microsoft Office, Office 365, Software, Windows 10/11/12|Tags: , , , |

Deceptively authentic emails from your bank, DHL, or PayPal? That's phishing! Data theft and viruses are a daily threat. We'll show you 5 simple rules (2FA, password managers, etc.) to protect yourself immediately and effectively and help you spot scammers.

1810, 2025

The 5 best tips for a clean folder structure on your PC and in the cloud

October 18th, 2025|Categories: Shorts & Tutorials, Homeoffice, Microsoft Office, Windows 10/11/12|Tags: , |

Say goodbye to file chaos! "Offer_final_v2.docx" is a thing of the past. Learn 5 simple tips for a perfect folder structure on your PC and in the cloud (OneDrive). With proper file naming and archive rules, you'll find everything instantly.

1710, 2025

Never do the same thing again: How to record a macro in Excel

October 17th, 2025|Categories: Shorts & Tutorials, Homeoffice, Microsoft Excel, Microsoft Office, Office 365|Tags: , , |

Tired of repetitive tasks in Excel? Learn how to create your first personal "magic button" with the macro recorder. Automate formatting and save hours – no programming required! Click here for easy instructions.

1710, 2025

IMAP vs. Local Folders: The secret to your Outlook structure and why it matters

October 17th, 2025|Categories: Shorts & Tutorials, Homeoffice, Microsoft Office, Microsoft Outlook, Microsoft Word, Office 365|Tags: , , |

Do you know the difference between IMAP and local folders in Outlook? Incorrect use can lead to data loss! We'll explain simply what belongs where, how to clean up your mailbox, and how to archive emails securely and for the long term.

Offers 2024: Word & Excel Templates

Anzeige

Popular Posts:

2010, 2025

Blocking websites on Windows using the hosts file

October 20th, 2025|Categories: Shorts & Tutorials, Homeoffice, Microsoft Office, Windows 10/11/12|Tags: , , , |

Want to block unwanted websites in Windows? You can do it without extra software using the hosts file. We'll show you how to edit the file as an administrator and redirect domains like example.de to 127.0.0.1. This will block them immediately in all browsers.

2010, 2025

The “Zero Inbox” method with Outlook: How to permanently get your mailbox under control.

October 20th, 2025|Categories: Shorts & Tutorials, Data Protection, Homeoffice, Microsoft Office, Microsoft Outlook, Office 365, Windows 10/11/12|Tags: , , , |

Caught red-handed? Your Outlook inbox has 1000+ emails? That's pure stress. Stop the email deluge with the "Zero Inbox" method. We'll show you how to clean up your inbox and regain control using Quick Steps and rules.

2010, 2025

5 simple security rules against phishing and spam that everyone should know

October 20th, 2025|Categories: Shorts & Tutorials, Data Protection, Homeoffice, Internet, Finance & Shopping, Microsoft Office, Office 365, Software, Windows 10/11/12|Tags: , , , |

Deceptively authentic emails from your bank, DHL, or PayPal? That's phishing! Data theft and viruses are a daily threat. We'll show you 5 simple rules (2FA, password managers, etc.) to protect yourself immediately and effectively and help you spot scammers.

1810, 2025

The 5 best tips for a clean folder structure on your PC and in the cloud

October 18th, 2025|Categories: Shorts & Tutorials, Homeoffice, Microsoft Office, Windows 10/11/12|Tags: , |

Say goodbye to file chaos! "Offer_final_v2.docx" is a thing of the past. Learn 5 simple tips for a perfect folder structure on your PC and in the cloud (OneDrive). With proper file naming and archive rules, you'll find everything instantly.

1710, 2025

Never do the same thing again: How to record a macro in Excel

October 17th, 2025|Categories: Shorts & Tutorials, Homeoffice, Microsoft Excel, Microsoft Office, Office 365|Tags: , , |

Tired of repetitive tasks in Excel? Learn how to create your first personal "magic button" with the macro recorder. Automate formatting and save hours – no programming required! Click here for easy instructions.

1710, 2025

IMAP vs. Local Folders: The secret to your Outlook structure and why it matters

October 17th, 2025|Categories: Shorts & Tutorials, Homeoffice, Microsoft Office, Microsoft Outlook, Microsoft Word, Office 365|Tags: , , |

Do you know the difference between IMAP and local folders in Outlook? Incorrect use can lead to data loss! We'll explain simply what belongs where, how to clean up your mailbox, and how to archive emails securely and for the long term.

Offers 2024: Word & Excel Templates

Anzeige
Ads

Popular Posts:

Search by category:

Autumn Specials:

Anzeige
Go to Top