Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Password Length is More Important Than Complexity

Why Password Length is More Important Than Complexity

With automated threats on the rise and taking over the cyberthreat landscape, you need as many ways to stay safe online as possible. Naturally, one of the most talked about topics is login security. There’s a lot of good password advice out there, but the most helpful piece isn’t repeated often enough: just make it longer.

Are complex passwords as secure as people think, and is a complex password more important than a long password? That’s what we’re exploring today.

Complexity Over Length is Just Not Good Password Advice

While complexity can improve your password security, it’s no substitute for a long password.

Think about it this way: A password like “P@ssw0rd1!” follows predictable patterns that hackers can use against you. A hacker can use dictionary attacks and pattern masks to find common letter substitutions in common password elements, undermining the effort you made to create a complex password. Now, complex passwords tend to be shorter, and that’s because they are easier to remember, but if you compare the level of security you get from a long, complex password, you get a credential that is exponentially more secure.

So if you take any piece of advice from this article at all, it’s that you should implement a minimum of eight-character passwords.

Sprinkle In a Little Chaos

Passwords don’t have to be boring. They can even be fun if you add a little entropy to your credentials.

In this use case, entropy means adding an element of randomness to your passwords, effectively making them both longer and more difficult to crack. A long password made up of simple words is going to be far more secure than a simple password with complex symbols. Imagine how much more secure your passwords will be if you opt for something that’s 16 characters long and made up of a simple passphrase!

It’s helpful to remember that you’re trying to outsmart an algorithm, not a human. The algorithm relies on mathematical computations to determine the most likely combination of characters, so if you’re using things that don’t make sense, you’re actually the one outsmarting the logic-driven machines.

Passphrases Make Security More Human-Friendly

When you start adding in words that don’t make sense next to each other, in combination with special characters and a longer password length, you create something magical.

Passphrases are the go-to standard for cybersecurity for a reason, and that’s because they can tap into human memory. A string of random words can be memorable when you make it absurd and fun to picture in your head. This, again, adds to the length of the password. If you create a passphrase that is four or more words, you will have a password that’s 20 or more characters long.

The passphrase actually solves two problems: your passphrases are effectively bulletproof while becoming easier to remember.

Does your business need help with its password management? Voyage Technology can equip you with technology to make using long, complex passphrases effortless. Learn more today by calling us at 800.618.9844.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Computer Phishing Google Email Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money AI Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Artificial Intelligence Holiday Automation Facebook Miscellaneous Compliance Gadgets Cloud Computing Covid-19 Training Server Remote Work Managed Service Provider Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Blockchain Bandwidth Business Technology Windows 10 Wi-Fi Virtualization Two-factor Authentication Apps Data Security Vendor Mobile Office Managed Services Networking Employer-Employee Relationship Chrome BYOD Budget Apple Mobile Device Management App Gmail Tip of the week WiFi Voice over Internet Protocol Managed IT Services How To BDR Office 365 Hacker HIPAA Avoiding Downtime Password Physical Security Applications Marketing Access Control Conferencing Computing Information Technology Analytics Office Tips Augmented Reality Computers Router Storage Website Virtual Private Network Bring Your Own Device Health 2FA Help Desk Operating System Retail Big Data Healthcare Risk Management Cooperation Free Resource Project Management Windows 7 Patch Management Customer Service Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Display Printer Paperless Office Windows 11 Infrastructure Firewall Monitoring Going Green Excel Document Management The Internet of Things Remote Workers Cybercrime Managed IT Service Telephone Scam Social Data loss Entertainment Vulnerabilities Virtual Desktop Data Privacy LiFi Customer Relationship Management Data storage Images 101 Telephone System Multi-Factor Authentication Robot Mobility Outlook Cost Management Hacking Presentation Money Humor Wireless Technology IT Management VPN Employees Meetings Sports Integration Mouse User Tip Modem Processor Computer Repair Mobile Security Word Administration Holidays Data Storage Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Saving Time Safety Virtual Machines Settings Professional Services Printing Wireless Content Filtering Maintenance YouTube Downloads Antivirus Cryptocurrency iPhone Licensing Unified Communications IBM Cyber security Experience Multi-Factor Security Tech Human Resources Google Docs Social Network Telework CES Bitcoin Tablet IoT Communitications Running Cable Dark Web Cables Google Wallet Trends Supply Chain Management Alert Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps Data Analysis Windows 8 Star Wars IT Assessment Laptop How To Microsoft Excel IT Maintenance Notifications Staff Value Business Intelligence Drones Gamification Flexibility Competition Organization Travel Social Networking Legislation Shortcuts Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Halloween Ransmoware Wearable Technology Memory Vendors Content Remote Working Health IT Unified Threat Management Motherboard Data Breach User Comparison Google Play Be Proactive Unified Threat Management Directions Videos Hacks Assessment Electronic Health Records Scary Stories Permissions Workforce Wasting Time Threats Fun Deep Learning IP Address Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies User Error Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Username Education Point of Sale eCommerce Recovery Black Friday SSID Mobile Computing Database Surveillance Hard Drives Virtual Assistant Outsource IT Domains Tech Support IT Technicians Virtual Machine Environment Search Media Network Management Proxy Server Reviews Best Practice Cookies Monitors Cyber Monday Medical IT Tactics Development Buisness Refrigeration Hotspot Transportation Small Businesses Public Speaking Websites Mirgation Hypervisor Displays Legal IT solutions Shopping Business Growth Lithium-ion battery Nanotechnology Optimization PowerPoint Entrepreneur SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Chatbots Cortana Navigation Management PCI DSS Lenovo Gig Economy Alt Codes Screen Reader Writing Distributed Denial of Service Workplace Service Level Agreement Internet Service Provider Downtime Undo Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Hosted Solution Private Cloud Identity Evernote Paperless Server Management Regulations Compliance Superfish Bookmark Typing Identity Theft Smart Tech Memes Co-managed IT Download Net Neutrality Twitter Alerts SQL Server Technology Care Error History Knowledge Business Communications Google Drive Financial Data Browsers Smartwatch Connectivity IT Application Social Engineering Break Fix Scams 5G Upload Procurement Remote Computing Azure Hybrid Work

Blog Archive