{"id":6720,"date":"2017-03-27T20:35:29","date_gmt":"2017-03-27T18:35:29","guid":{"rendered":"https:\/\/www.combell.com\/en\/blog\/?p=6720"},"modified":"2021-06-22T14:33:39","modified_gmt":"2021-06-22T12:33:39","slug":"secure-passwords-complex-or-long","status":"publish","type":"post","link":"https:\/\/www.combell.com\/en\/blog\/secure-passwords-complex-or-long\/","title":{"rendered":"Secure passwords: short and complex or long and memorable?"},"content":{"rendered":"<p>When you check your e-mail, when you place an order with\u00a0<a href=\"https:\/\/www.amazon.com\" target=\"_blank\" rel=\"noopener\">Amazon.com<\/a>, and even when you register for a group fitness session, you are constantly required to enter your password. Often, you are also requested to include at least <strong>several digits, capital letters and special characters<\/strong> in that password. But, honestly, who is going to remember \u201cj!l_U-7_k.cr\u201d? It is therefore not surprising that the most common password is simply \u201c123456\u201d. Obviously, such a password is <strong>much easier to hack<\/strong>. But do not worry; everyone can come up with memorable and secure passwords\u2026 And it is quite easy!<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>\u201cPassword\u201d as a password<\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-6721 size-full\" title=\"Secure passwords: short and complex or long and memorable?\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/2017\/03\/Secure-passwords-short-and-complex-or-long-and-memorable.png\" alt=\"Secure passwords: short and complex or long and memorable?\" width=\"256\" height=\"256\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/2017\/03\/Secure-passwords-short-and-complex-or-long-and-memorable.png 256w, https:\/\/www.combell.com\/en\/blog\/files\/2017\/03\/Secure-passwords-short-and-complex-or-long-and-memorable-50x50.png 50w, https:\/\/www.combell.com\/en\/blog\/files\/2017\/03\/Secure-passwords-short-and-complex-or-long-and-memorable-60x60.png 60w\" sizes=\"(max-width: 256px) 100vw, 256px\" \/><\/p>\n<p>We\u00a0generally tend to use a password that is easy to remember. Often, we use <strong>birthdays, (family) names or simple key combinations<\/strong>, such as \u201cqwertyuiop\u201d. But such passwords are <strong>easy to guess<\/strong> by malicious people. Personal information is indeed easy to find on the Internet, as well as lists of the most commonly used password combinations.<\/p>\n<p>Furthermore, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/pushing-string-dont-care-region-password-strength\/\" target=\"_blank\" rel=\"noopener\">Microsoft<\/a> has reported that an average person has no less than <strong>25 online accounts<\/strong>, for which he or she uses\u00a0<strong>6.5 different passwords<\/strong>. This means that the majority of people use a single key to open several digital doors. And the risk is even greater if the password is easy to guess. If someone manages to crack the password of your (harmless) library account, he or she will be able to access your mailbox in no time and then request and\/or change passwords for other websites. And that, of course, is something you want to avoid at all costs.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>How can you crack a password?<\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-6722 alignright\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/2017\/03\/Secure-passwords-short-and-complex-or-long-and-memorable.jpg\" alt=\"Secure passwords: short and complex or long and memorable?\" width=\"290\" height=\"290\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/2017\/03\/Secure-passwords-short-and-complex-or-long-and-memorable.jpg 290w, https:\/\/www.combell.com\/en\/blog\/files\/2017\/03\/Secure-passwords-short-and-complex-or-long-and-memorable-50x50.jpg 50w, https:\/\/www.combell.com\/en\/blog\/files\/2017\/03\/Secure-passwords-short-and-complex-or-long-and-memorable-60x60.jpg 60w\" sizes=\"(max-width: 290px) 100vw, 290px\" \/><\/p>\n<p>As previously stated, many passwords are guessed by people who <strong>crack passwords<\/strong>, who are also known as <strong>crackers<\/strong>. After all, many people use simple key combinations or personal information that is easy to find on the Internet. Many passwords are also stolen using <strong>phishing<\/strong> methods (your passwords are simply <strong>requested via e-mail or over the telephone<\/strong>). Criminals often pretend to be someone else (e.g. a bank employee, but you can also <a href=\"https:\/\/www.combell.com\/en\/blog\/fake-combell-emails\/\" target=\"_blank\" rel=\"noopener\">read more about a recent situation with which Combell has recently been faced<\/a>), hoping to steal your personal information. Unfortunatly, this little scam often still works.<\/p>\n<p>Then again, in addition to simply guessing or requesting passwords, crackers also use other methods to perform attacks. Your password can e.g. also be guessed through a <a href=\"https:\/\/www.combell.com\/en\/blog\/brute-force-attacks-how-to-protect-yourself\/\" target=\"_blank\" rel=\"noopener\"><strong><em>brute force attack<\/em><\/strong><\/a>. <strong>For this, they run an automatic script that continuously attempts to log in using different character variations<\/strong>. If, for instance, your password is \u201cben\u201d, the script will first attempt to log in using \u201caaa\u201d, then \u201caab\u201d, \u201cabb\u201d, and so on. This way, it does not take long to use \u201cbel\u201d, \u201cbem\u201d and \u201cben\u201d. And bingo! So much for your password! Two common types of such attacks are <a href=\"https:\/\/en.wikipedia.org\/wiki\/Dictionary_attack\" target=\"_blank\" rel=\"noopener\">dictionary and common word attacks<\/a>. As the terms suggest, such methods use a list of commonly used words, or even the entire dictionary, which the script uses to attempt to log in.<\/p>\n<p><strong>SEE ALSO: \u201c<\/strong><a href=\"https:\/\/www.combell.com\/en\/blog\/brute-force-attacks-how-to-protect-yourself\/\" target=\"_blank\" rel=\"noopener\"><strong>Brute force attacks: how<\/strong><strong> to protect yourself?<\/strong><\/a>\u201d<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Ch0053 a 5ecur3 passw0rd<\/strong><\/h2>\n<p>So, what secure passwords are so strong\u00a0that crackers cannot guess them? <strong>Many experts are convinced that the most secure passwords include both small and capital letters, digits and special characters. In addition, they must be at least 8 characters long<\/strong>. Just to give you an idea: \u201cD(9_*!3N\u201d should be a great password. According to <a href=\"https:\/\/www.grc.com\/haystack.htm\" target=\"_blank\" rel=\"noopener\">Gibson Research Corporation<\/a>, this password would resist for 2.13 thousand centuries when trying to crack it (assuming 1,000 login attempts per second). That sounds pretty secure! But who will remember \u201cD(9_*!3N\u201d? Many Internet users will most probably have to <strong>write down<\/strong> this password somewhere, which is even more risky.<\/p>\n<div class=\"bs-callout bs-callout-success\">\n<p><strong>Tip:<\/strong> feel free to test your password using the <a href=\"https:\/\/www.grc.com\/haystack.htm\" target=\"_blank\" rel=\"noopener\">handy calculator<\/a> developed by Gibson Research Corporation!<\/p>\n<\/div>\n<p>So, how can you find a password that is both strong and memorable? Here is the solution: <strong>go for a long password instead of a complex one!<\/strong> Think of two or three random words and put them together. What about a password like \u201cBearWithBeard\u201d? Quite easy to remember, isn\u2019t it? This password is 13 characters long, and thanks to the combination of small and capital letters, you have 52 possibilities. That means <strong>285 quadrillions (!!!) of possible combinations<\/strong>. Attempting to crack this password manually is obviously out of the question, and even using a brute force attack, you would need 7 million centuries to succeed. Now, that is impressive!<\/p>\n<p>\n<table id=\"tablepress-bruteforceattack\" class=\"tablepress tablepress-id-bruteforceattack\">\n<thead>\n<tr class=\"row-1 odd\">\n\t<th class=\"column-1\">Characters<\/th><th class=\"column-2\">Number of possible combinations<\/th><th class=\"column-3\">Brute force time<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-hover\">\n<tr class=\"row-2 even\">\n\t<td class=\"column-1\">1<\/td><td class=\"column-2\">62<br \/>\n<\/td><td class=\"column-3\">Immediate<\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n\t<td class=\"column-1\">2<\/td><td class=\"column-2\">3,844<\/td><td class=\"column-3\">Immediate<\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n\t<td class=\"column-1\">3<\/td><td class=\"column-2\">238,328<\/td><td class=\"column-3\">Immediate<\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n\t<td class=\"column-1\">4<\/td><td class=\"column-2\">14,776,336<\/td><td class=\"column-3\">Immediate<\/td>\n<\/tr>\n<tr class=\"row-6 even\">\n\t<td class=\"column-1\">5<\/td><td class=\"column-2\">916,132,832<\/td><td class=\"column-3\">42 seconds<\/td>\n<\/tr>\n<tr class=\"row-7 odd\">\n\t<td class=\"column-1\">6<\/td><td class=\"column-2\">56,800,235,584<\/td><td class=\"column-3\">43 minutes<\/td>\n<\/tr>\n<tr class=\"row-8 even\">\n\t<td class=\"column-1\">7<\/td><td class=\"column-2\">3,521,614,606,208<\/td><td class=\"column-3\">44 hours<\/td>\n<\/tr>\n<tr class=\"row-9 odd\">\n\t<td class=\"column-1\">8<\/td><td class=\"column-2\">218,340,15,584,896<\/td><td class=\"column-3\">115 days<\/td>\n<\/tr>\n<tr class=\"row-10 even\">\n\t<td class=\"column-1\">9<\/td><td class=\"column-2\">13,537,086,546,263,600<\/td><td class=\"column-3\">20 years<\/td>\n<\/tr>\n<tr class=\"row-11 odd\">\n\t<td class=\"column-1\">10<br \/>\n<\/td><td class=\"column-2\">839,299,365,868,340,000<\/td><td class=\"column-3\">12 centuries<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-bruteforceattack from cache --><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>One password, but slightly different<\/strong><\/h2>\n<p>This is how you can come up with a memorable and virtually unbreakable password, which is impossible to crack, even using a brute force attacks. Nevertheless, there are other ways other people can get hold of your password. How?<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>People can obtain your password because<\/strong><\/h3>\n<p><div class=\"su-list\" style=\"margin-left:0px\"><\/p>\n<ul>\n<li><i class=\"sui sui-angle-double-right\" style=\"color:#1dc05b\"><\/i> you told them by accident,<\/li>\n<li><i class=\"sui sui-angle-double-right\" style=\"color:#1dc05b\"><\/i> they managed to see it, in real life or using <a href=\"https:\/\/nl.wikipedia.org\/wiki\/Malware\" target=\"_blank\" rel=\"noopener\">malware<\/a><\/li>\n<li><i class=\"sui sui-angle-double-right\" style=\"color:#1dc05b\"><\/i> or they got hold of it some other way.<\/li>\n<\/ul>\n<p><\/div><\/p>\n<p>Should this happen, you most probably want to avoid that they can access all your accounts. <strong>Therefore, make sure that you slightly change your password for each website on which you use it.<\/strong><\/p>\n<div class=\"bs-callout bs-callout-success\">\n<p><strong>Tip:<\/strong> You can e.g. do this by adding the name of a website or a few letters in that name to your password.<\/p>\n<\/div>\n<p>You can e.g. put the first letter of that website at the beginning of your password, and the last letter at the end of your password. For Facebook, you will get \u201cfBearWithBeardk\u201d. <strong>This way, you will have a single password for all your accounts (which is easy to remember), which is just different enough to avoid that intruders can access all your accounts should something go wrong<\/strong>. Moreover, such words cannot be cracked with a dictionary or common word attack. In any case, we have never found fBearWithBeardk in the dictionary.<\/p>\n<p>Here is a last tip for you to generate the ultimate password: some websites want you to make sure that your password includes <strong>at least one special character or digit<\/strong>. Unfortunately, it is quite difficult to remember for which websites that was necessary, and for which not.<\/p>\n<blockquote><p>The best way to avoid having to try different password combinations is to add a special character or digit to your standard password.<\/p><\/blockquote>\n<p>So, going back to our password example, you could use \u201cBearWith1Beard\u201d. For Facebook, for instance, your password would become \u201cfBearWith1Beardk\u201d. Not so difficult, right? Even better: that extra figure opens the doors to 476 sextillions (36 zeros) of possibilities and a cracking time of 15,000 trillion centuries. Good luck, dear crackers!<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Do you have your own website or web store? Make sure it is secure!<\/strong><\/h2>\n<p>Creating secure passwords is not only useful to users. Website and web store owners should also take extra precautions. You can <img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-6726 alignright\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/2017\/03\/Secure-passwords-for-webshops.png\" alt=\"Secure passwords for webshops\" width=\"300\" height=\"254\" \/>do this easily and efficiently:<\/p>\n<p><div class=\"su-list\" style=\"margin-left:0px\"><\/p>\n<ul>\n<li><i class=\"sui sui-play\" style=\"color:#1D88C0\"><\/i> Make sure you allow <strong>no more than 1 login attempt every 5 seconds.<\/strong><\/li>\n<li><i class=\"sui sui-play\" style=\"color:#1D88C0\"><\/i> Set a <strong>lock-out period<\/strong>\u00a0after a certain number of failed login attempts, so that the user needs to wait before trying to log in again.<\/li>\n<\/ul>\n<p><\/div><\/p>\n<p>With at least one of these security measures, you can <strong>efficiently<\/strong> <strong>protect<\/strong> <strong>your website<\/strong> against brute force attacks (or any other type of attack). This way, you make sure that crackers cannot access your website using the front door.<\/p>\n<p><strong>It is safer for you, and therefore also for your visitors, who will certainly appreciate your efforts.<\/strong><\/p>\n<p><strong>SEE ALSO: \u201c<\/strong><a href=\"https:\/\/www.combell.com\/en\/blog\/brute-force-attacks-how-to-protect-yourself\/\" target=\"_blank\" rel=\"noopener\"><strong>Brute force attacks: how<\/strong><strong> to protect yourself?<\/strong><\/a>\u201d<\/p>\n<p><span style=\"color: #c9c7c7;\"><em>source: byte<\/em><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When you check your e-mail, when you place an order with\u00a0Amazon.com, and even when you register for a group fitness session, you are constantly required to enter your password. Often,...<\/p>\n","protected":false},"author":1,"featured_media":6727,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","footnotes":""},"categories":[62],"tags":[351,41],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.combell.com\/en\/blog\/files\/2017\/03\/Secure-passwords.png",750,256,false],"thumbnail":["https:\/\/www.combell.com\/en\/blog\/files\/2017\/03\/Secure-passwords-50x50.png",50,50,true],"medium":["https:\/\/www.combell.com\/en\/blog\/files\/2017\/03\/Secure-passwords-300x102.png",300,102,true],"medium_large":["https:\/\/www.combell.com\/en\/blog\/files\/2017\/03\/Secure-passwords.png",750,256,false],"large":["https:\/\/www.combell.com\/en\/blog\/files\/2017\/03\/Secure-passwords.png",750,256,false],"1536x1536":["https:\/\/www.combell.com\/en\/blog\/files\/2017\/03\/Secure-passwords.png",750,256,false],"2048x2048":["https:\/\/www.combell.com\/en\/blog\/files\/2017\/03\/Secure-passwords.png",750,256,false],"post-featured":["https:\/\/www.combell.com\/en\/blog\/files\/2017\/03\/Secure-passwords.png",750,256,false],"post-featured-opt":["https:\/\/www.combell.com\/en\/blog\/files\/2017\/03\/Secure-passwords.png",750,256,false],"post-featured-opt-md":["https:\/\/www.combell.com\/en\/blog\/files\/2017\/03\/Secure-passwords.png",750,256,false],"post-featured-opt-sm":["https:\/\/www.combell.com\/en\/blog\/files\/2017\/03\/Secure-passwords-485x165.png",485,165,true],"post-featured-opt-xs":["https:\/\/www.combell.com\/en\/blog\/files\/2017\/03\/Secure-passwords-375x128.png",375,128,true],"post-most-popular":["https:\/\/www.combell.com\/en\/blog\/files\/2017\/03\/Secure-passwords-50x50.png",50,50,true],"post-author":["https:\/\/www.combell.com\/en\/blog\/files\/2017\/03\/Secure-passwords-60x60.png",60,60,true]},"uagb_author_info":{"display_name":"Combell","author_link":"https:\/\/www.combell.com\/en\/blog\/author\/blogadmin\/"},"uagb_comment_info":0,"uagb_excerpt":"When you check your e-mail, when you place an order with\u00a0Amazon.com, and even when you register for a group fitness session, you are constantly required to enter your password. Often,...","_links":{"self":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/6720"}],"collection":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=6720"}],"version-history":[{"count":7,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/6720\/revisions"}],"predecessor-version":[{"id":9110,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/6720\/revisions\/9110"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/media\/6727"}],"wp:attachment":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=6720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=6720"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=6720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}