Password Security Best Practices for 2026
This guide has a free tool → Open Password Generator
# Password Security Best Practices for 2026
The State of Password Security
Despite decades of relentless advice, passwords remain the single weakest link in most security chains. The 2025 Verizon Data Breach Investigations Report found that over 60% of confirmed breaches involved compromised credentials. Attackers did not break encryption, did not exploit zero-day vulnerabilities, and did not write sophisticated malware. They simply used a password that was guessed, phished, or found in a leaked database.
The problem is not that people do not care about security. The problem is that most password advice given over the past two decades has been wrong. Policies designed to increase security have, in practice, made it worse. This guide covers what modern research and updated guidance from the National Institute of Standards and Technology (NIST) actually recommends, and how to put it into practice today.
---
Password Generator
Strong password generator online - generate secure random passwords that never leave your browser
Hash Generator
Free online hash generator - generate MD5, SHA-1, SHA-256 hashes from any input text
AES Encryption Tool
Free online AES encryption tool - encrypt and decrypt text using AES-256 encryption
Why Your Old Password Habits Are Failing You
The Complexity Trap
Traditional corporate password policies demanded uppercase letters, lowercase letters, numbers, and symbols, all crammed into 8 characters. The result was entirely predictable: passwords like P@ssw0rd!, Summer2024!, and Tr0ub4dor&3. These technically satisfy every complexity checkbox while appearing in every breach database on the internet.
Here is why complexity without length fails. A random 8-character password using all character types has approximately 6 quadrillion possible combinations. That sounds enormous. But modern graphics processing units used for password cracking can test billions of hashes per second. At 10 billion guesses per second, 6 quadrillion combinations takes under a week of dedicated cracking time. More importantly, people do not pick truly random characters. They pick patterns that are psychologically comfortable, and attackers know exactly what those patterns are.
Credential Stuffing: Your Reused Password's Biggest Threat
Even if your password is reasonably strong, reusing it across sites creates a compounding risk. When any one of those sites is breached - and major breaches happen constantly - attackers take the leaked username-password pairs and automatically test them against hundreds of other services. This attack is called credential stuffing, and it is highly automated and highly effective.
In 2024 and 2025, credential stuffing attacks against major financial institutions, streaming services, and SaaS tools resulted in millions of account takeovers. The victims were not hacked individually. Their password from a forgotten forum account from 2019 was still valid on their bank login.
Password Rotation Fatigue
Mandatory 90-day password rotation policies were based on the theory that rotating passwords limits how long a stolen password is useful. In practice, users respond by making minimal changes: Password1 becomes Password2, then Password3. The attacker who cracks one can trivially guess the next. Worse, frequent rotation trains users to treat passwords as temporary and unimportant, reducing overall care in choosing them.
NIST now explicitly recommends against mandatory periodic rotation unless there is evidence of actual compromise. You should change a password when you know it has been breached, not on an arbitrary calendar schedule.
---
Length Beats Complexity: The Math
Modern cryptographic guidance is unambiguous: length is the primary determinant of password strength, not character set complexity.
Weak (despite meeting complexity rules):
P@ssw0rd! -- In breach databases, cracked instantly by lookup
Tr0ub4dor&3 -- Estimated cracking time: a few days
Summer2024! -- Common pattern, cracked in seconds
Strong (through length alone):
correct-horse-battery-staple -- Estimated cracking time: centuries
marble-telephone-sunset-garden -- Estimated cracking time: centuries
purple-engine-doorstep-rainfall -- Estimated cracking time: centuriesA 16-character lowercase-only passphrase has over 43 septillion combinations. A 20-character passphrase from a vocabulary of 2,000 common words has more combinations than there are atoms in the observable universe for all practical purposes.
Entropy: The Right Metric
Security professionals measure password strength in bits of entropy. Each bit of entropy doubles the difficulty of brute-force cracking. Here is how common password strategies compare:
| Password Type | Example | Entropy (approx.) | Crack Time at 10B/sec |
|---|---|---|---|
| 8-char complex | P@ss1234 | ~30 bits | Minutes to hours |
| 10-char complex | MyP@ss123! | ~40 bits | Days to weeks |
| 12-char random | xK7#mQ9!vR2z | ~72 bits | Millions of years |
| 4-word passphrase (common words) | correct-horse-battery-staple | ~44 bits | ~500 years |
| 4-word passphrase (random from 7776 words) | tambourine-fjord-ostrich-lunar | ~51 bits | ~70,000 years |
| 6-word Diceware passphrase | six random words from Diceware list | ~77 bits | Far beyond brute force |
The 4-word passphrase wins on both security and memorability. You can actually remember correct-horse-battery-staple. You cannot remember xK7#mQ9!vR2z.
---
The Passphrase Method
A passphrase is four to six truly random words strung together. The keyword is random. Not a quote, not a phrase you associate with something, not words picked by consciously "mixing it up." Human-chosen randomness is not random. People gravitate toward nouns, avoid unusual letters, pick words they like the sound of. Attackers know this.
Diceware: Genuinely Random Passphrases
The Diceware method generates verifiably random passphrases using physical dice and a publicly available word list containing 7,776 words (one for every combination of five dice rolls):
- Roll five dice and read the result as a five-digit number (e.g., 23456)
- Look up that number in the Diceware word list - it maps to a word
- Repeat four to six times to build your passphrase
- Optionally add a separator character between words
The result is a passphrase that no human bias entered into. You can also use a trustworthy password generator set to passphrase mode, provided the generator uses a cryptographically secure random number generator (CSPRNG).
What Makes a Good Passphrase
- At least four truly random words
- 16 or more characters total
- No personal information (pet names, birthdays, addresses, favorite bands)
- Not a famous quote, song lyric, or movie line
- Not an idiom or common phrase
What Does Not Count as a Passphrase
iloveyouforever -- Common phrase, top of every dictionary attack
letmein123456 -- Top 10 most common passwords worldwide, leaked billions of times
starwarsyoda -- Pop culture is heavily targeted in wordlist attacks
mydog'snameis fluffy -- Personal information, guessable from social media---
Use a Password Manager
The single most impactful security change most people can make is adopting a password manager. A password manager generates, stores, and auto-fills passwords so you only need to remember one master password. Make that master password a strong six-word Diceware passphrase.
What a Password Manager Gives You
- A unique, randomly generated 20-plus-character password for every account
- Auto-fill that is phishing-resistant because it checks the domain before filling
- Secure encrypted vault storage that syncs across devices
- Breach monitoring that alerts you when a stored password appears in a known leak
- Secure sharing of specific credentials with family members or team members
- One-click generation of new passwords when you need to create an account
Reputable Password Manager Options
| Manager | Type | Cost | Key Features |
|---|---|---|---|
| Bitwarden | Open source, cloud | Free / $10/yr premium | Audited, self-hostable, excellent browser extension |
| 1Password | Proprietary, cloud | ~$36/yr | Travel Mode, excellent team features, Watchtower breach alerts |
| KeePassXC | Open source, local | Free | Fully offline, no cloud dependency, highly auditable |
| Dashlane | Proprietary, cloud | ~$60/yr | Built-in VPN, live dark web monitoring |
| Proton Pass | Open source, cloud | Free / premium | End-to-end encrypted, integrated with ProtonMail |
All of these are dramatically better than the alternative of reusing passwords. Built-in browser password managers (Chrome, Safari, Firefox, Edge) have also improved significantly in recent years. They are far better than reusing passwords, though they lack some advanced features like cross-device security auditing.
The Master Password Is Everything
Your password manager's master password is the key to every other password you have. Treat it accordingly:
- Make it a 6-word Diceware passphrase (minimum)
- Never write it down digitally - if you must write it down, do so on paper and store it physically securely
- Enable biometric unlock (fingerprint, Face ID) for convenience on trusted devices
- Set up account recovery options before you need them
- Never use the same master password anywhere else, ever
---
Enable Two-Factor Authentication
Even the strongest password can be compromised through phishing, server breaches, SIM swapping, or malware. Two-factor authentication (2FA) adds a second verification layer so that a stolen password alone is not enough to access your account. An attacker needs both your password AND your second factor.
2FA Methods Ranked by Security
| Method | Security Level | Phishing Resistant | Notes |
|---|---|---|---|
| Hardware key (FIDO2/WebAuthn) | Highest | Yes | YubiKey, Google Titan. Cannot be phished. |
| Passkeys | Very High | Yes | Device-bound cryptographic credential, no password needed |
| Authenticator app (TOTP) | High | No | Google Authenticator, Authy, 1Password, Aegis |
| Authenticator app (push) | Medium-High | No | Vulnerable to push bombing attacks |
| SMS code | Low | No | Vulnerable to SIM swapping, but better than no 2FA |
| Email code | Low | No | Only as secure as your email account |
Hardware security keys implementing the FIDO2/WebAuthn standard are the gold standard. When you authenticate with a hardware key, the device performs a cryptographic challenge-response with the specific site's origin. Even if you are on a perfect clone of your bank's login page, your YubiKey will not authenticate because the origin does not match. Phishing is mathematically impossible.
Passkeys - the newer standard supported by Apple, Google, Microsoft, and most major platforms - work on the same principle but are bound to your device rather than a separate hardware key. They replace passwords entirely rather than supplementing them.
For most people, an authenticator app running TOTP (Time-based One-Time Passwords) is the practical recommendation. It is far better than SMS and does not require purchasing hardware.
Where to Enable 2FA First
Prioritize accounts that can be used to access everything else:
- Email - If an attacker controls your email, they can reset every other account's password
- Password manager - The vault holding all your other credentials
- Banking and financial accounts - Direct financial risk
- Work accounts - SSO providers like Okta, Google Workspace, Microsoft 365
- Cloud storage - Google Drive, Dropbox, iCloud often hold sensitive documents
- Domain registrar and DNS - Especially important if you run websites or services
- GitHub/GitLab/Bitbucket - Code repositories may contain secrets and API keys
---
Check If Your Passwords Have Been Breached
Have I Been Pwned (haveibeenpwned.com), created by security researcher Troy Hunt, aggregates leaked credential databases and lets you check whether your email address or specific passwords have appeared in known breaches. The site uses a k-Anonymity model for password checking, meaning your password is never sent to the server in plain form.
How the k-Anonymity Password Check Works
1. Your client hashes your password with SHA-1
Password "hunter2" -> SHA-1 hash: F3BBBD...
2. Only the first 5 characters of the hash are sent to the API
API request: GET https://api.pwnedpasswords.com/range/F3BBB
3. The API returns all hashes starting with F3BBB (thousands of them)
4. Your client checks locally if your full hash is in the returned list
No other information leaves your deviceThis means even the HIBP service never sees enough information to identify which password you checked. The Password Generator tool on ToolBox uses a similar approach to ensure generated passwords are not among common leaked passwords.
What to Do If Your Password Appears in a Breach
- Change the password on the breached site immediately
- Change it on every other site where you used the same or similar password
- Enable 2FA on the breached account if you have not already
- Watch for suspicious activity - unauthorized logins, password reset emails you did not request, unexpected charges
- If the breach involved financial information, consider a credit freeze
---
What NIST Actually Recommends in 2025
The NIST Special Publication 800-63B Digital Identity Guidelines, updated with the most recent revision, makes recommendations that contradict most corporate password policies that are still in use:
NIST Recommends
- Allow passwords up to 64 characters minimum length (and ideally higher)
- Check new passwords against a list of known compromised passwords before accepting them
- Allow all printable ASCII characters and spaces in passwords
- Support paste-into-password-field functionality so password managers work properly
- Rate-limit failed authentication attempts
- Offer secure account recovery mechanisms that do not rely on security questions
NIST No Longer Recommends
- Mandatory periodic password rotation (change every 90 days) unless there is evidence of compromise
- Complex composition rules requiring uppercase, lowercase, numbers, and symbols
- Password hints or knowledge-based authentication questions (mother's maiden name, first pet)
- Maximum password ages
The Reasoning Behind These Changes
Forced complexity rules and rotation cycles lead to highly predictable patterns. When people must include a number and symbol, they put them at the end: Summer2024!. When they must change their password every 90 days, they increment: Password1 to Password2. When they must answer security questions, they use publicly discoverable information from social media.
NIST's research found that a single strong password that is not rotated is more secure than a series of marginally changed passwords cycling every 90 days. The focus has correctly shifted to breach detection, multi-factor authentication, and length over complexity.
---
Common Password Attack Methods (And How to Defend Against Them)
Understanding how attackers work helps you understand why specific defenses matter.
Dictionary Attacks
Attackers use lists of known words, common passwords, and previously leaked passwords. These lists contain billions of entries. Any password that could appear on such a list - including lightly modified versions like P@ssw0rd - is vulnerable.
Defense: Use randomly generated passwords or randomly generated passphrases. Truly random output does not appear in dictionaries.
Brute Force Attacks
Every possible character combination is tried sequentially. This is only practical for short passwords.
Defense: Length. A 16-character password makes brute force computationally infeasible regardless of hardware.
Credential Stuffing
Leaked username-password pairs from one breach are tested against other services automatically.
Defense: Never reuse passwords. A unique password for each account means a single breach does not cascade.
Phishing
You are tricked into entering your credentials on a fake site that looks identical to the real one. The fake site captures what you type.
Defense: Hardware security keys and passkeys are cryptographically phishing-resistant. Password manager auto-fill also helps because managers check the domain before filling - they will not auto-fill your bank password on bank-clone-phish.com.
Social Engineering and SIM Swapping
An attacker calls your carrier, convinces them they are you, and has your phone number transferred to their SIM card. They then receive your SMS 2FA codes.
Defense: Use an authenticator app or hardware key instead of SMS. Some carriers offer port freeze or SIM lock features for customers who request them.
Keyloggers and Malware
Malware on your device logs every keystroke, capturing passwords as you type them.
Defense: Keep your devices updated and use endpoint security software. Password manager auto-fill does not type characters one by one, which makes some keyloggers less effective. Hardware keys authenticate without ever typing a password, providing strong protection even on a compromised device.
---
Building a Practical Password Security System
Here is a complete, actionable setup that provides strong security without being unusable:
Step 1: Choose and Set Up a Password Manager
Pick Bitwarden (free and open source), 1Password, or another reputable manager. Install the browser extension and the mobile app. Create an account with a 6-word Diceware master passphrase. Write the master passphrase on paper and store it somewhere physically secure.
Step 2: Enable 2FA on the Password Manager Itself
Add an authenticator app or hardware key as the second factor on your password manager account. This is critical - your vault holds everything.
Step 3: Audit Your Existing Passwords
Most password managers have a built-in audit feature that identifies:
- Reused passwords
- Weak passwords
- Passwords that appeared in known breaches
Work through the list systematically, changing the most critical accounts first.
Step 4: Use Generated Passwords Going Forward
Every time you create a new account or change an existing password, let the password manager generate a 20-plus character random password. You never need to see or remember it.
Step 5: Enable 2FA on Critical Accounts
Go through your email, banking, work accounts, and other critical services and enable 2FA. Use an authenticator app at minimum. Buy a hardware key for your highest-value accounts if you are willing to make the investment.
Step 6: Set Up Breach Monitoring
Enable breach monitoring in your password manager, or set up email monitoring at haveibeenpwned.com. You want to know immediately if a credential you use appears in a new breach.
---
Enterprise and Team Password Security
Password Policies That Actually Work
For organizations setting password policy, align with NIST 800-63B:
Minimum length: 12 characters (prefer 16+)
Maximum length: At least 64 characters (do not cap low)
Character requirements: None mandatory - focus on length and breach checking
Rotation: Only when there is evidence of compromise
2FA: Required on all critical systems
Password manager: Provide a team license (1Password Teams, Bitwarden for Business)Managing Shared Credentials
Shared account passwords (social media, shared service accounts, vendor portals) are a major risk vector. When an employee leaves, those credentials are often not rotated. Mitigations:
- Use a team password manager with shared vaults and access revocation
- Implement SSO (Single Sign-On) so shared service credentials are managed centrally
- Audit shared credentials quarterly and rotate when anyone with access leaves
- Prefer individual accounts with RBAC over shared accounts wherever possible
Secrets in Code and Infrastructure
Hardcoded passwords and API keys in source code are a persistent problem. They appear in public repositories constantly.
# Never do this -- this exact pattern is scanned by attackers on GitHub
DATABASE_URL=postgresql://admin:password123@db.internal:5432/prod
# Use environment variables and secrets management instead
DATABASE_URL=$DATABASE_URLUse tools like git-secrets, HashiCorp Vault, AWS Secrets Manager, or your CI/CD platform's native secrets management to handle credentials in code. Rotate any secret that has ever been committed to version control, even if the commit was immediately removed. Git history is permanent.
---
Password Security for Specific Account Types
Email Accounts
Your email account is the master key to everything else. Anyone who controls your email can request password resets for every service linked to it. Treat your email password as the most important credential you have:
- Use a unique, randomly generated password
- Enable the strongest 2FA available - hardware key if possible
- Set up recovery codes and store them securely offline
- Review active sessions regularly and revoke unknown devices
Banking and Financial
Most financial institutions now offer strong 2FA. Enable it immediately on every financial account. Monitor accounts for unauthorized transactions. Consider account alerts for any transaction over a small threshold (even $1) to catch unauthorized activity quickly.
Developer and Infrastructure Accounts
GitHub, AWS, Google Cloud, Azure, Cloudflare, your domain registrar. Compromise of these accounts can result in complete infrastructure takeover, data exfiltration, cryptocurrency mining on your servers, and supply chain attacks against your users. These accounts warrant hardware key 2FA, access auditing, and the strongest available authentication settings.
Social Media
Often overlooked, social media accounts are high-value targets for takeover (for spam, fraud, and social engineering attacks targeting your followers). Enable 2FA. Do not use social media OAuth logins as the primary authentication for important services - if your social account is compromised, you lose access to everything linked to it.
---
Password Security Quick Reference
The Non-Negotiable Rules
Rule 1: One unique password per account - never reuse
Rule 2: Minimum 16 characters - longer is always better
Rule 3: Use a password manager - this is not optional
Rule 4: Enable 2FA on every account that supports it
Rule 5: Check breaches - know when to actQuick Checklist
- [ ] Password manager installed and set up with a strong master passphrase
- [ ] 2FA enabled on password manager
- [ ] Unique password for every account
- [ ] All passwords at least 16 characters
- [ ] 2FA enabled on email accounts
- [ ] 2FA enabled on banking and financial accounts
- [ ] 2FA enabled on work and developer accounts
- [ ] Breach monitoring configured
- [ ] Existing passwords audited for reuse and weakness
- [ ] No passwords written in plaintext digitally (notes apps, spreadsheets, chat)
- [ ] No passwords shared via email or chat
Password Strength at a Glance
| Characteristic | Weak | Strong |
|---|---|---|
| Length | Under 12 characters | 16+ characters |
| Uniqueness | Reused across sites | Unique per account |
| Generation | Human-chosen | Randomly generated |
| Pattern | Word + number + symbol | Truly random or passphrase |
| Exposure | In breach databases | Never exposed |
---
Advanced Topics
The Future: Passkeys
Passkeys are the next generation of authentication and may eventually replace passwords entirely. A passkey is a cryptographic key pair where the private key stays on your device and is protected by your device biometrics (fingerprint, face). The server stores only the public key.
When you authenticate, your device signs a challenge with the private key. The server verifies the signature with the public key. No password is ever created, stored, or transmitted. Passkeys cannot be phished, cannot be breached from the server, and cannot be guessed.
Major platforms already support passkeys: Apple ID, Google Account, Microsoft Account, GitHub, and hundreds of other services. If a service you use offers passkeys as an option, consider enabling them. They are both more secure and more convenient than passwords with 2FA.
Zero-Knowledge Proof Systems
Some authentication systems use zero-knowledge proofs to verify that you know a password without ever transmitting the password itself, even in hashed form. While not yet mainstream, these systems represent a significant security improvement over traditional password transmission and are increasingly available in security-conscious platforms.
Biometric Authentication
Biometrics (fingerprint, face recognition) are convenient and increasingly common, but they have important security properties that differ from passwords:
- Biometrics are not secret - your fingerprint is left on everything you touch
- Biometrics cannot be changed if compromised
- Biometrics authenticate the person, not knowledge
Most secure implementations use biometrics as a convenience layer that unlocks a device-stored cryptographic key rather than as the primary authenticator. Your phone's fingerprint sensor does not send your fingerprint to Apple or Google - it unlocks the device locally, which then authenticates using a key stored in the Secure Enclave. This is the correct model.
---
Generate Strong Passwords Instantly
Need a strong password right now? The Password Generator on ToolBox creates cryptographically random passwords and passphrases using the Web Crypto API - the same standard cryptographic interface used by banks and security software.
You can customize:
- Password length (up to 128 characters)
- Character sets (uppercase, lowercase, numbers, symbols)
- Passphrase mode with customizable word count and separator
- Exclusion of ambiguous characters (0/O, l/1, etc.) for easier manual entry
Everything runs entirely in your browser. No passwords are transmitted to any server, no requests appear in the network tab, no data is stored anywhere. Generate a password, copy it into your password manager, and your account is secured in seconds.
For deeper security work, the Hash Generator lets you verify hashes and understand how password hashing algorithms like SHA-256 and bcrypt work - useful for developers building authentication systems. The AES Encryption tool handles symmetric encryption for scenarios where you need to protect data with a passphrase.
Strong passwords are the foundation of digital security. With a password manager and 2FA, the actual security burden on you personally goes down dramatically - you only need to remember one strong master passphrase and carry one authenticator app. The rest becomes automatic. That is what good security infrastructure does: it makes the secure path the easy path.
---
How Password Hashing Works (For Developers)
If you are building any system that stores user credentials, understanding how password hashing works is essential. Storing passwords in plaintext or with weak hashing is negligent and exposes your users to serious harm when your database is inevitably breached.
Never Store Plaintext Passwords
// WRONG -- never store passwords like this
const user = {
email: "alice@example.com",
password: "hunter2" // plaintext stored in database
};
// WRONG -- MD5 and SHA-1 are not password hashing algorithms
const md5Hash = crypto.createHash("md5").update("hunter2").digest("hex");
// 2ab96390c7dbe3439de74d0c9b0b1767 -- lookups take milliseconds
// WRONG -- raw SHA-256 without salting
const sha256Hash = crypto.createHash("sha256").update("hunter2").digest("hex");
// Still vulnerable to rainbow table attacksCorrect Approach: Use a Password Hashing Algorithm
Password hashing algorithms are specifically designed to be slow and memory-intensive. This is intentional - they need to be computationally expensive so that brute forcing cracked databases takes years instead of hours.
// Node.js with bcrypt
const bcrypt = require("bcrypt");
// Hashing a password
const saltRounds = 12; // work factor -- higher is slower and more secure
const hash = await bcrypt.hash("hunter2", saltRounds);
// $2b$12$... -- includes salt, algorithm identifier, and hash
// Verifying a password
const isValid = await bcrypt.compare("hunter2", hash);
// true
// Using argon2 (recommended for new applications)
const argon2 = require("argon2");
const hash = await argon2.hash("hunter2", {
type: argon2.argon2id,
memoryCost: 65536, // 64 MB
timeCost: 3, // iterations
parallelism: 4,
});
const isValid = await argon2.verify(hash, "hunter2");Choosing the Right Algorithm
| Algorithm | Recommended | Notes |
|---|---|---|
| Argon2id | Yes (best) | Winner of Password Hashing Competition. Tunable memory, time, parallelism. |
| bcrypt | Yes | Battle-tested, widely supported. Limited to 72-byte passwords. |
| scrypt | Yes | Good memory-hardness. Used by Litecoin, various security tools. |
| PBKDF2 | Acceptable | NIST-approved. Less memory-hard than the above. Use with SHA-256, 600,000+ iterations. |
| SHA-256 (raw) | No | Fast hash, not designed for passwords |
| MD5 / SHA-1 | No | Broken, never use for any security purpose |
The work factor (iterations, memory cost) should be set so that hashing takes approximately 100-300ms on your server hardware. Benchmark on your actual deployment hardware and adjust accordingly. As hardware gets faster, increase the work factor for new hashes.
Salting
All modern password hashing libraries automatically generate and store a unique salt per password. A salt is random data prepended to the password before hashing, ensuring that two users with the same password produce completely different hashes. Never implement password hashing without salts, and never reuse salts across users.
// The hash stored in your database includes the salt:
// $2b$12$[22-char-salt][31-char-hash]
//
// bcrypt.compare() extracts the salt from the stored hash automatically
// and hashes the candidate password with the same salt for comparison---
Frequently Asked Questions
Should I change my password every 90 days?
No. NIST explicitly recommends against mandatory rotation on a fixed schedule. Change your password when you have reason to believe it has been compromised - if the site is breached, if you logged in on a compromised device, or if you shared it (even accidentally). Routine rotation without cause does not improve security and leads to predictable password patterns.
Is it safe to save passwords in Chrome or Safari?
Built-in browser password managers are significantly better than reusing passwords. They generate strong passwords, sync across your devices, and provide breach notifications. Their main limitations are that they do not work as well across different browsers, they are less auditable than standalone tools, and they lack features like team sharing and granular access control. If the choice is between the browser's password manager and reusing passwords, use the browser's password manager without hesitation.
What if I forget my master password?
This is a real risk. Most reputable password managers have account recovery options, but some (particularly KeePass and some Bitwarden configurations) cannot recover your vault if you lose the master password. Set up recovery codes when you create your account, store them physically (printed or handwritten), and test the recovery process before you need it. Some people also store a sealed copy of their master passphrase in a bank safe deposit box.
Are password managers themselves a security risk?
They concentrate your credentials in one place, which is a legitimate concern. But the alternative - weak, reused passwords - is objectively worse. The risk of using a reputable, audited password manager is substantially lower than the certainty of credential stuffing attacks targeting reused passwords. Choose a manager with public security audits, bug bounty programs, and a transparent security model. Avoid obscure managers that have not been audited.
Can a website's password length limit affect my security?
Yes. Websites that cap passwords at 8, 10, or 12 characters are actively reducing your security. They may also be storing passwords insecurely (plaintext or weak hashing) if they need to impose such low limits. Report this to the site's security team. If a site caps your password below 16 characters, your maximum security on that site is constrained by their policy, not your choices.
Is SMS 2FA better than nothing?
Yes, meaningfully so. SIM swapping attacks, while real, require significant effort and typically target high-value accounts. SMS 2FA still blocks the vast majority of automated credential stuffing attacks. If SMS is the only option available, use it. But upgrade to an authenticator app or hardware key whenever better options are available.
---
Summary: The Security Hierarchy
Ranked from most impactful to least, here is how to prioritize your password security improvements:
- Stop reusing passwords - this is the single highest-impact change
- Use a password manager - enables unique passwords for every account
- Enable 2FA on email - protects your account recovery mechanism
- Enable 2FA on all other critical accounts - banking, work, cloud
- Audit your existing passwords for reuse and weakness
- Set up breach monitoring - know when to act
- Consider hardware keys for highest-value accounts
- Migrate to passkeys where available
No single measure is perfect. The goal is defense in depth: multiple independent layers so that no single failure compromises everything. A breached password is not catastrophic if 2FA is enabled. A compromised 2FA device is not catastrophic if your passwords are unique and you can still authenticate with recovery codes. Build your security system so that any one component failing does not result in total loss.
The Password Generator is a good starting point - generate strong credentials for your most important accounts today.
You might also like
Want higher limits, batch processing, and AI tools?