Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Password Length is More Important Than Complexity

Why Password Length is More Important Than Complexity

With automated threats on the rise and taking over the cyberthreat landscape, you need as many ways to stay safe online as possible. Naturally, one of the most talked about topics is login security. There’s a lot of good password advice out there, but the most helpful piece isn’t repeated often enough: just make it longer.

Are complex passwords as secure as people think, and is a complex password more important than a long password? That’s what we’re exploring today.

Complexity Over Length is Just Not Good Password Advice

While complexity can improve your password security, it’s no substitute for a long password.

Think about it this way: A password like “P@ssw0rd1!” follows predictable patterns that hackers can use against you. A hacker can use dictionary attacks and pattern masks to find common letter substitutions in common password elements, undermining the effort you made to create a complex password. Now, complex passwords tend to be shorter, and that’s because they are easier to remember, but if you compare the level of security you get from a long, complex password, you get a credential that is exponentially more secure.

So if you take any piece of advice from this article at all, it’s that you should implement a minimum of eight-character passwords.

Sprinkle In a Little Chaos

Passwords don’t have to be boring. They can even be fun if you add a little entropy to your credentials.

In this use case, entropy means adding an element of randomness to your passwords, effectively making them both longer and more difficult to crack. A long password made up of simple words is going to be far more secure than a simple password with complex symbols. Imagine how much more secure your passwords will be if you opt for something that’s 16 characters long and made up of a simple passphrase!

It’s helpful to remember that you’re trying to outsmart an algorithm, not a human. The algorithm relies on mathematical computations to determine the most likely combination of characters, so if you’re using things that don’t make sense, you’re actually the one outsmarting the logic-driven machines.

Passphrases Make Security More Human-Friendly

When you start adding in words that don’t make sense next to each other, in combination with special characters and a longer password length, you create something magical.

Passphrases are the go-to standard for cybersecurity for a reason, and that’s because they can tap into human memory. A string of random words can be memorable when you make it absurd and fun to picture in your head. This, again, adds to the length of the password. If you create a passphrase that is four or more words, you will have a password that’s 20 or more characters long.

The passphrase actually solves two problems: your passphrases are effectively bulletproof while becoming easier to remember.

Does your business need help with its password management? Voyage Technology can equip you with technology to make using long, complex passphrases effortless. Learn more today by calling us at 800.618.9844.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Managed Service Ransomware Mobile Device Microsoft Productivity Passwords Saving Money Quick Tips AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Automation Facebook Miscellaneous Holiday Artificial Intelligence Training Covid-19 Gadgets Compliance Cloud Computing Server Remote Work Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Bandwidth Blockchain Business Technology Windows 10 Wi-Fi Virtualization Vendor Mobile Office Managed Services Data Security Two-factor Authentication Apps Budget Apple Tip of the week Mobile Device Management App Gmail Networking WiFi Voice over Internet Protocol Employer-Employee Relationship BYOD Chrome Hacker Access Control Password Avoiding Downtime HIPAA Marketing Applications Managed IT Services How To Computing BDR Conferencing Information Technology Office 365 Physical Security Computers Storage Health Bring Your Own Device Router Website Retail Help Desk Operating System 2FA Healthcare Risk Management Big Data Analytics Office Tips Augmented Reality Virtual Private Network Printer Paperless Office Solutions Infrastructure Document Management Going Green Firewall Scam Monitoring Data loss Windows 11 Cybercrime The Internet of Things Remote Workers Excel Managed IT Service Patch Management Social Save Money Telephone Remote Monitoring Vulnerability End of Support Free Resource Vendor Management Project Management Cooperation Windows 7 Customer Service Microsoft 365 Display Telephone System Data Privacy Presentation Computer Repair Cost Management Sports Wireless Technology Mouse Employees Integration Machine Learning Administration User Tip Modem Word Holidays Processor Mobile Security Data Storage Maintenance Antivirus Video Conferencing Settings Wireless Smart Technology Managed Services Provider Printing Safety Virtual Machines Professional Services Content Filtering Saving Time YouTube Supply Chain Cryptocurrency iPhone Robot Downloads Virtual Desktop Data storage Vulnerabilities LiFi Licensing Entertainment Customer Relationship Management IT Management VPN Outlook Meetings Images 101 Money Mobility Multi-Factor Authentication Humor Hacking Scary Stories Social Networking Remote Working Legislation Memory Hacks Data Breach User Tech Support Google Play Fileless Malware Fun Google Apps Network Management Videos Wearable Technology Electronic Health Records Deep Learning Monitors Content IT Maintenance Health IT Business Intelligence Motherboard Comparison Wasting Time Trend Micro Websites Security Cameras Directions Education Assessment Shortcuts Permissions IP Address Software as a Service Ransmoware Vendors SharePoint Specifications Managing Costs Mobile Computing Electronic Medical Records eCommerce Recovery SSID Microchip Internet Exlporer Search Be Proactive Fraud Lenovo Surveillance Hard Drives Virtual Assistant Best Practice Writing Username Workforce Buisness Threats Black Friday Domains Virtual Machine Virtual Reality Server Management Legal Private Cloud Medical IT IT solutions Database Workplace Strategies Reviews IT Technicians Superfish Development Refrigeration Identity Theft Transportation Business Growth Meta Twitter Proxy Server Amazon Cookies Cyber Monday Public Speaking Hypervisor Lithium-ion battery Optimization Error PowerPoint Tactics Cortana Shopping Hotspot Mirgation Employer/Employee Relationships Alt Codes Entrepreneur Social Engineering Outsource IT Remote Computing Navigation Downtime Environment Nanotechnology Media PCI DSS Hosted Solution Addiction Gig Economy Language Small Businesses Chatbots Internet Service Provider Undo Tablet Teamwork Typing Management Alert Evernote Displays Screen Reader Regulations Compliance Distributed Denial of Service Managed IT Memes Google Drive File Sharing Dark Data Service Level Agreement Knowledge Computing Infrastructure Outsourcing Identity Net Neutrality SQL Server How To Notifications Bookmark Smart Tech 5G Financial Data History IT Google Docs Application Travel Unified Communications Download Experience Workplace Smartwatch Alerts Running Cable Hiring/Firing Techology Procurement Google Maps Azure Bitcoin Google Wallet Tech Browsers Connectivity Paperless Telework Break Fix IBM Cyber security Communitications Unified Threat Management Upload Co-managed IT CES Social Network Laptop Technology Care Unified Threat Management Supply Chain Management Multi-Factor Security Windows 8 Drones Term IoT Business Communications FinTech Dark Web IT Assessment Network Congestion Trends Scams Customer Resource management Halloween Hybrid Work Regulations User Error Flexibility Google Calendar Competition Value Data Analysis Star Wars Human Resources Organization Microsoft Excel Digital Security Cameras Staff Smart Devices Point of Sale Gamification Cables

Blog Archive