Security Articles & Guides

Advertisement

Password Security

How to Create Strong Passwords You Can Actually Remember

Last updated: June 15, 2023 8 min read

In today's digital world, strong passwords are your first line of defense against cyber threats. But creating passwords that are both secure and memorable can be challenging. This guide will walk you through proven techniques to achieve both.

The Problem with Common Password Strategies

Many people resort to weak password strategies that leave them vulnerable:

  • Using personal information (birthdays, pet names)
  • Simple patterns (123456, qwerty)
  • Reusing the same password across multiple sites
  • Minimal changes when forced to update (password1, password2)

Characteristics of Strong Passwords

A truly strong password has these qualities:

  • Length: At least 12 characters (longer is better)
  • Complexity: Mix of uppercase, lowercase, numbers, and symbols
  • Unpredictability: Not based on dictionary words or personal info
  • Uniqueness: Used for only one account

Memorable Password Techniques

Try these methods to create passwords you won't forget:

1. The Sentence Method

Take a memorable sentence and use the first letters of each word:

"My first car was a red Toyota Camry in 2005!" → MfcwarTCi2005!

2. The Keyboard Shift Method

Type a word while holding the Shift key, then add unshifted characters:

"coffee" with Shift held becomes %$$RTT (plus you could add "123") → %$$RTT123

3. The Padding Technique

Choose a core word and pad it with consistent patterns:

"apple" with padding becomes [email protected]@pple##

Password Managers: The Ultimate Solution

While these techniques help, the most secure approach is using a password manager:

  • Generates and stores strong, unique passwords for every site
  • Auto-fills passwords so you don't need to remember them
  • Encrypts your password database with one master password
  • Popular options include Bitwarden, 1Password, and KeePass

Common Password Mistakes to Avoid

Warning: Avoid these dangerous password practices

  • Using the same password across multiple sites
  • Writing passwords on sticky notes
  • Sharing passwords via email or text
  • Never changing important passwords
  • Using answers to security questions that can be found online

Final Tips for Password Security

  • Enable two-factor authentication wherever possible
  • Change passwords immediately after a data breach
  • Use our password generator for truly random passwords
  • Consider using passphrases for your most important accounts
  • Regularly review your password hygiene (at least annually)

Remember: Your password habits directly impact your online security. Taking time to implement these strategies will significantly reduce your risk of account compromise.

Online Security

The Complete Guide to Two-Factor Authentication (2FA)

Last updated: July 22, 2023 10 min read

Two-factor authentication (2FA) adds an essential layer of security to your online accounts. Even if someone steals your password, they won't be able to access your account without the second factor. This comprehensive guide explains everything you need to know about 2FA.

What is Two-Factor Authentication?

2FA requires two different types of credentials to verify your identity:

  1. Something you know (password, PIN)
  2. Something you have (phone, security key) or something you are (fingerprint, face scan)

Why 2FA is Essential

Passwords alone are no longer sufficient because:

  • Data breaches expose billions of passwords
  • Phishing attacks trick users into revealing passwords
  • Weak or reused passwords are common
  • Brute force attacks can crack simple passwords

2FA blocks 99.9% of automated attacks according to Microsoft.

Types of 2FA Methods

SMS/Text Message

A code sent to your phone via text message.

Pros:

  • Easy to use
  • No app required

Cons:

  • Vulnerable to SIM swapping
  • Not encrypted
  • Requires cell service
Authenticator Apps

Time-based one-time passwords (TOTP) generated by an app.

Pros:

  • Works offline
  • More secure than SMS
  • Supports multiple accounts

Cons:

  • Requires app installation
  • Need to backup codes
Security Keys

Physical devices that use FIDO/U2F standards.

Pros:

  • Most secure option
  • Phishing-resistant
  • No batteries needed

Cons:

  • Costs money to purchase
  • Can be lost
  • Not all services support
Biometrics

Fingerprint, face recognition, or iris scan.

Pros:

  • Convenient
  • Hard to replicate
  • No codes to enter

Cons:

  • Not all devices support
  • Potential privacy concerns
  • Can't be changed if compromised

How to Set Up 2FA on Major Services

Service 2FA Options How to Enable
Google Authenticator app, SMS, security key, Google prompt Security > 2-Step Verification
Facebook Authenticator app, SMS, security key Settings > Security and Login
Apple Device verification, SMS Apple ID > Password & Security
Microsoft Authenticator app, SMS, email, security key Security > More security options
Twitter Authenticator app, SMS, security key Settings > Security

Best Authenticator Apps

These apps generate time-based one-time passwords (TOTP) for 2FA:

Authy

Cloud-synced, multi-device support, encrypted backups.

Free iOS, Android, Desktop
Google Authenticator

Simple, no-frills authenticator from Google.

Free iOS, Android
Microsoft Authenticator

Passwordless login for Microsoft accounts, cloud backup.

Free iOS, Android

Security Key Recommendations

For maximum security, consider these hardware security keys:

YubiKey 5 Series

Industry standard, supports multiple protocols, durable design.

$45-$70 USB-A, USB-C, NFC options
Google Titan Security Key

Google's solution with Bluetooth option, good for mobile.

$30-$50 USB-A, USB-C, Bluetooth

Backup Strategies for 2FA

Losing access to your 2FA method can lock you out of accounts. Protect yourself:

  • Print backup codes and store them securely
  • Use multiple 2FA methods when possible (e.g., app + SMS)
  • For authenticator apps, export or backup your accounts
  • Consider a secondary device for authentication
  • For security keys, buy two and register both

Final Thoughts

Implementing 2FA is one of the most effective security upgrades you can make. While it adds a small step to your login process, the security benefits far outweigh the minor inconvenience.

Start by enabling 2FA on your most critical accounts (email, banking, social media), then gradually add it to other services. Our password generator can help you create strong master passwords to complement your 2FA setup.

Action Items: Enable 2FA today on at least 3 important accounts. Choose authenticator apps over SMS when possible, and consider investing in a security key for your most sensitive accounts.