How to Create Strong Passwords

Explore top LinkedIn content from expert professionals.

Summary

Creating strong passwords is essential for safeguarding your digital life. A strong password or passphrase prioritizes length over complexity, reduces reliance on frequent changes, and incorporates additional security measures like multi-factor authentication (MFA).

  • Prioritize length over complexity: Use passphrases of at least 12-15 characters, which are more secure and easier to remember than shorter, complex passwords.
  • Adopt multi-factor authentication: Add an extra layer of security by enabling MFA, which protects your accounts even if your password is compromised.
  • Avoid outdated practices: Skip security questions, password hints, and frequent password changes unless there’s evidence of a breach.
Summarized by AI based on LinkedIn member posts
  • View profile for Rosalia H.

    Global CISO | AI Governance & Cyber Resilience Leader | Eternal Learner

    25,586 followers

    The National Institute of Standards and Technology (NIST) has updated its cybersecurity framework, offering six key recommendations to enhance password security. Here’s a concise summary of the article, featuring the six key takeaways from NIST’s updated cybersecurity framework regarding passwords: • Password Length Over Complexity: NIST prioritizes longer passphrases over complex passwords. A 12-character passphrase is more secure and easier to remember than a shorter, complicated password. • Support for Long Passwords: Organizations are encouraged to allow passwords up to 64 characters to give users flexibility in creating secure passphrases. • Multi-Factor Authentication (MFA): MFA is a must for adding an extra layer of security, protecting accounts even if passwords are compromised. • No Mandatory Password Expiration: NIST advises against requiring users to frequently change passwords unless there’s evidence of a breach, as this often leads to weaker replacements. • Screen Passwords Against Breached Databases: Organizations should compare new passwords against lists of compromised credentials to prevent users from reusing unsafe passwords. • Avoid Security Questions and Password Hints: These methods are considered insecure. Instead, use secure email recovery links or MFA during password recovery processes. These updated guidelines aim to create a balance between security and usability, reducing the risk of breaches while making password management less burdensome for users. https://lnkd.in/gk2hzH32

  • View profile for Ali ISIKLI

    Cyberspace Capability Development Engineer / CISSP, CCSP, CCSK

    5,974 followers

    NIST's second public draft version of its password guidelines (SP 800-63-4) outlines technical requirements as well as recommended best practices for password management and authentication. With this draft dicument; NIST now recommends prioritizing password length, suggesting passwords or passphrases of at least 12 characters. Complexity, such as requiring special characters or mixed case, is less critical than overall length. Unlike older practices, frequent password changes are discouraged unless there is evidence of a security breach. This helps prevent users from creating predictable, easily guessable passwords. NIST stresses the use of MFA as an essential layer of security, reducing reliance on passwords alone. The use of password managers is endorsed to generate and store strong, unique passwords for each account, simplifying management for users. More in https://lnkd.in/dxmuK53v #NIST #passwordsecurity

Explore categories