Best practices for passphrases and passwords (ITSAP.30.032) - Canadian Centre for Cyber Security (2024)

Alternate format: Best practices for passphrases and passwords (ITSAP.30.032) (PDF,954KB)

You have passwords for everything: your devices, your accounts (like banking, social media, and email), and the websites you visit. By using passphrases or strong passwords you can protect your devices and information. Review the tips below to learn how you can create passphrases, strengthen your passwords, and avoid common mistakes that could put your information at risk.

For passwords, we recommend that you use a minimum of 12 characters. Keep in mind that websites and applications have different password creation rules that you will have to follow (for example, letters, numbers, punctuation marks and special characters that a password must and must not contain). This will impact your ability to follow our recommended guidance.

Use passphrases

We recommend that you use passphrases, as they are longer and easier to remember than a password made up of random, mixed characters. A passphrase is a memorized phrase consisting of a sequence of mixed words with or without spaces. Your passphrase should be at least 4 words and 15 characters in length. For example, you might create a passphrase by using association techniques, such as scanning a room in your home and creating a passphrase that uses words to describe what you see (for example, “Closet lamp Bathroom Mug”).

Protect passphrases and passwords

Threat actors send phishing emails to trick you into giving your personal information and, in some cases, installing malware, such as a keylogger. If a keylogger is installed on your device, a threat actor can use it to capture the keystrokes you use when entering your passphrases and passwords. Phishing attacks are common, but you can protect yourself by reading the tips in Spotting malicious email messages (ITSAP.00.100) and Don’t take the bait: Recognize and avoid phishing attacks (ITSAP.00.101).

Create complex passwords

Use a password that is as complex as possible if you cannot use a passphrase (for example, when a website requires that your password is less than 15 characters). A password made up of lowercase and uppercase letters, as well as numbers and special characters, is more complex than a password containing only lowercase letters.

You can also think up a phrase and then use the first letters of each word to create a complex password that is more memorable. For example, the phrase “My jersey number when I played competitive soccer was 27!” can be used to remember the password “Mj#wIpcsw27!”.

Use passcodes or personal identification numbers

A passcode or personal identification number (PIN) is a sequence of numbers that is at least 4 digits. Passcodes use a minimum of 4 digits because there are other protection mechanisms in place to protect your device or account. For example, to access your bank account, a threat actor would need to know your PIN or passcode and have physical access to your bank card. Always make sure your PIN is made of random numbers.

Multi-factor authentication

Multi-factor authentication strengthens your device and account security. Multi-factor authentication makes accounts more secure by requiring at least two items of authentication such as something you know, something you have, or something you are (like a password and a token or a password and a fingerprint) to log in. If you use multi-factor authentication, you could use a password that is 6 to 8 characters in length because the extra authentication adds another layer of protection.

Not all multi-factor solutions are equal, but all will improve your overall cyber security posture. Your organization should have user authentication policies that balance security with usability. For more information on multi-factor authentication see Secure your accounts and devices with multi-factor authentication (ITSAP.30.030).

Protect passwords, passphrases, and personal identification numbers

Passphrases, complex passwords, passcodes, and PINs must be handled and stored carefully so that they are not compromised. Keep the following tips in mind:

  • Be aware of your surroundings when entering passwords, passphrases, passcodes, or PINs in public
  • Do not enter passwords when using public Wi-Fi
  • Use a different password, passphrase, or PIN for each device and account, especially for accounts with sensitive information
  • Do not give out passwords, passphrases, passcodes, or PINs online or over the phone
  • Do not share passwords, passphrases, passcodes, or PINs with others, even family
  • Log off and sign out of accounts and websites when you are done using them
  • Ensure your sensitive accounts, such as those used for banking or for the Canada Revenue Agency, are protected by the strongest passphrase or password possible

Avoid common password mistakes

If created and protected properly, passwords, passphrases, or PINs are an effective way to protect your devices, accounts, and information. Below are some examples of common mistakes to avoid:

  • Do not use easily guessed passwords, passphrases, or PINs, such as “password”, “let me in”, or “1234”, even if they include character substitutions like “p@ssword”
  • Do not use common expressions, song titles or lyrics, movie titles, or quotes
  • Do not use your personal details such as your birthday, hometown, or pet’s name
  • Do not use the passwords assigned by the vendor when installing or enabling new hardware or software
  • Do not use passwords found on known data breaches

For more advice on passwords, see Rethink your password habits to protect your accounts from hackers (ITSAP.30.036).

Know the reasoning behind the rules

The rules around creating passphrases and passwords exist for a reason. If you’re not careful to take precautions with your passphrases and passwords, threat actors can choose from an ever‑growing list of methods to break into your devices and accounts, and access your information. Many of these methods use a password hash, which is an encoded version of your clear text password. The hash is what is often used to verify your passwords on apps and websites.

Threat actors can use the following methods:

  • Brute force is a method of trial and error where all common passwords are entered until one works. This method usually uses password dictionary tables.
  • Rainbow tables are precompiled lists of password combinations and their associated hashes. These are used to match a known hash to a password that grants access to an account.

Shorter passwords are much easier to hack. You can make it more difficult for threat actors to hack into your devices and accounts if you use lengthy passphrases or more complex passwords.

Password managers

If you feel overwhelmed by the number of passwords that you have, you can use a password manager to generate and track your many passwords. To protect the passwords stored on a password manager, consider the following tips:

  • Use a password manager to store passwords for your lower sensitivity accounts but not for sensitive accounts such as those with administrative privileges or banking credentials
  • Use a strong password and multi-factor authentication to secure a password manager
  • Ensure the password manager is from a secure website and that it is updated regularly

Before using a password manager, check out Password managers: Security tips (ITSAP.30.025).

Best practices for passphrases and passwords (ITSAP.30.032) - Canadian Centre for Cyber Security (2024)

FAQs

Best practices for passphrases and passwords (ITSAP.30.032) - Canadian Centre for Cyber Security? ›

Combine three random words to create a password that's 'long enough and strong enough'. Weak passwords can be cracked in seconds. The longer and more unusual your password is, the harder it is for a cyber criminal to crack.

What is the best advice from the National Cyber security Centre for picking a secure password? ›

Combine three random words to create a password that's 'long enough and strong enough'. Weak passwords can be cracked in seconds. The longer and more unusual your password is, the harder it is for a cyber criminal to crack.

What are the best practices for knowbe4 passwords? ›

Keep your passwords private – never share a password with anyone else. Do not write down your passwords. Use passwords of at least eight (8) characters or more (longer is better). Use a combination of upper case letters, lower case letters, numbers, and special characters (for example: !, @, &, %, +) in all passwords.

Which of the following are best practices for having a secure password? ›

These 7 tips will help make your digital life more secure.
  • Never reveal your passwords to others. ...
  • Use different passwords for different accounts. ...
  • Use multi-factor authentication (MFA). ...
  • Length trumps complexity. ...
  • Make passwords that are hard to guess but easy to remember.
  • Complexity still counts. ...
  • Use a password manager.

What is a good example of a passphrase? ›

Your passphrase should be at least 4 words and 15 characters in length. For example, you might create a passphrase by using association techniques, such as scanning a room in your home and creating a passphrase that uses words to describe what you see (for example, “Closet lamp Bathroom Mug”).

What is the 3 word password rule? ›

The National Cyber Security Centre (NCSC) have been championing the three random words method as a strategy to help with this problem. This method involves choosing three words at random and combining them to make a password, for example: paperhumbleconnect.

How to choose a passphrase? ›

Choose
  1. Create a passphrase by taking a short phrase and: Change the capitalization of some of the letters. ...
  2. Choose several shorter words and add some numbers in the center, then change the capitalization and substitute symbols for letters. ...
  3. Choose a memorable quote or phrase and use only the first letter from each word.

What are the best practices for passphrases and passwords? ›

We recommend that you use passphrases, as they are longer yet easier to remember than a password of random, mixed characters. A passphrase is a memorized phrase consisting of a sequence of mixed words with or without spaces. Your passphrase should be at least 4 words and 15 characters in length.

What is the best security practice for storing passwords? ›

Hashing and encryption can keep sensitive data safe, but in almost all circ*mstances, passwords should be hashed, NOT encrypted. Because hashing is a one-way function (i.e., it is impossible to "decrypt" a hash and obtain the original plaintext value), it is the most appropriate approach for password validation.

Are passphrases better than passwords? ›

In fact, passphrases are so much better at securing accounts that both the FBI and the National Institute of Standards and Technology (NIST) officially suggest using passphrases over passwords as length has become much a much more influential factor in password security than just complexity.

What makes a strong passphrase? ›

The less predictable your passphrase, the better

A good passphrase is made up of four or more random words. Sentences don't make great passphrases as they can be easier to guess. For example, it is predictable to have spaces between words, a capital letter at the beginning and punctuation at the end.

How to make a passphrase? ›

Create a passphrase by taking a short phrase and: • Change the capitalization of some of the letters • Replace some of the letters with numerical and symbolic substitutions ($ for S, 8 for B) Misspell or abbreviate some words (E.g., the phrase “iced tea is great for summer” becomes “! cedTisgr84$umm3R”.)

What is a passphrase in cyber security? ›

A passphrase is a memorized secret consisting of a sequence of words or other text that a claimant uses to authenticate their identity. A passphrase is similar to a password in usage, but is generally longer for added security.

Which rules must be applied when creating a strong passphrase? ›

A strong password is:
  • At least 12 characters long but 14 or more is better.
  • A combination of uppercase letters, lowercase letters, numbers, and symbols.
  • Not a word that can be found in a dictionary or the name of a person, character, product, or organization.
  • Significantly different from your previous passwords.

How safe is a 24 word passphrase? ›

Your 24-word recovery phrase (sometimes also called a mnemonic phrase, Secret Recover Phrase or seed phrase) is the master key to all your crypto accounts. Anyone gaining access to your recovery phrase can very easily clone your accounts on their own device (or software wallet) and spend your funds.

Which is the most effective way to choose a secure password? ›

Choosing a Strong Password
  • Make your password into a passphrase . The longer a password is, the more difficult it will be to attack the password by guessing (or brute force). ...
  • Use unique passwords. ...
  • Avoid publicly available information. ...
  • Avoid common words. ...
  • Change it periodically.

What is the password advice for NCSC? ›

Avoid the most common passwords that criminals can easily guess (like 'passw0rd'). To create a memorable password that's also hard for someone else to guess, you can combine three random words to create a single password (for example cupfishbiro). Don't re-use the same password across important accounts.

What is the best advice for cyber security? ›

"Top 10" List of Secure Computing Tips
  • Tip #1 - You are a target to hackers. ...
  • Tip #2 - Keep software up-to-date. ...
  • Tip #3 - Avoid Phishing scams - beware of suspicious emails and phone calls. ...
  • Tip #4 - Practice good password management. ...
  • Tip #5 - Be careful what you click. ...
  • Tip #6 - Never leave devices unattended.

Top Articles
What happens when you delete files in the cloud
8 Effective Fixes to OneDrive Not Running on Windows 10
Strange World Showtimes Near Amc Brazos Mall 14
Jody Plauche Wiki
Busted Mugshots Rappahannock Regional Jail
Warren County Skyward
Becu Turbotax Discount Code
What does JOI mean? JOI Definition. Meaning of JOI. OnlineSlangDictionary.com
Edward Scissorhands 123Movies
Tamara Lapman
Pierced Universe Coupon
Pokemon Infinite Fusion Good Rod
Restaurant-grevesmuehlen in Freiburg im Breisgau
Karen Canelon Only
How 'The Jordan Rules' inspired template for Raiders' 'Mahomes Rules'
Amazing Lash Bay Colony
The Exorcist: Believer Showtimes Near Regal Waugh Chapel
Battlenet We Couldn't Verify Your Account With That Information
Coleman Funeral Home Olive Branch Ms Obituaries
Weather Arlington Radar
Eaglecraft Minecraft Unblocked
Antonios Worcester Menu
Reptile Expo Spokane
Pennys Department Store Near Me
Dell Optiplex 7010 Drivers Download and Update for Windows 10
Perry County Mugshots Busted
Calamity Shadow Fish
Why Zero Raised to the Zero Power is defined to be One « Mathematical Science & Technologies
Adventhealth Employee Handbook 2022
Minor Additions To The Bill Crossword
Should Jenn Tran Join 'Bachelor in Paradise'? Alum Mari Pepin Weighs In
Sentara Norfolk General Visiting Hours
Ontpress Fresh Updates
Late Bloomers Summary and Key Lessons | Rich Karlgaard
Walgreens Rufe Snow Hightower
Hospice Thrift Store St Pete
Warrior Badge Ability Wars
Craigslist Pinellas County Rentals
Smarthistory – Leonardo da Vinci, “Vitruvian Man”
Scarabaeidae), with a key to related species – Revista Mexicana de Biodiversidad
Rage Of Harrogath Bugged
Limestone Bank Hillview
Congdon Heart And Vascular Center
Z93 Local News Monticello Ky
Incident Manager (POS & Kiosk) job in Chicago, IL with McDonald's - Corporate
4225 Eckersley Way Roseville Ca
Green Press Gazette Obits
4Myhr Mhub
Busted Newspaper Lynchburg County VA Mugshots
Akc Eo Tryouts 2022
Transportationco.logisticare
C Weather London
Latest Posts
Article information

Author: Tuan Roob DDS

Last Updated:

Views: 5568

Rating: 4.1 / 5 (62 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Tuan Roob DDS

Birthday: 1999-11-20

Address: Suite 592 642 Pfannerstill Island, South Keila, LA 74970-3076

Phone: +9617721773649

Job: Marketing Producer

Hobby: Skydiving, Flag Football, Knitting, Running, Lego building, Hunting, Juggling

Introduction: My name is Tuan Roob DDS, I am a friendly, good, energetic, faithful, fantastic, gentle, enchanting person who loves writing and wants to share my knowledge and understanding with you.