9 Tips to Create A Strong That You’ll Never Forget
A that can be cracked/guessed by a hacker isn’t very good. If you use a predictable on your VPN, it does no good for you as a security tool.

There are a variety of ways hackers can figure out your , such as the “dictionary attack” used to figure out s that are words in a dictionary.
If you use the same for everything, then if these hackers figure out the for one , now all of your s can be accessed.
Your email needs to be particularly strong, as hackers can use your email to change the s for other s linked to your email address.
Without unbreakable and unique s, you are basically inviting people into your s. You could lose all access to your , hackers could steal your personal information, credit card and bank details, or even your identity.
Creating a strong, complex though is only part of the solution, the other is ing your . There are a number of tips that can help you create a memorable, almost unbreakable, complex to keep your information safe. Editor’s Note: We value our relationship with our readers, and we strive to earn your trust through transparency and integrity. We are in the same ownership group as some of the industry-leading products reviewed on this site: ExpressVPN, Cyberghost, Private Internet Access, and Intego. However, this does not affect our review process, as we adhere to a strict testing methodology.
Tips for Creating a Strong
Use these tips to create strong and memorable s that are nearly unbreakable to hackers and significantly increase the security of your s and personal information.
1 Create Strong s
While this tip may seem obvious, there are many people who may not know what “strong” really means when it comes to creating s. The following are three features of secure, strong s:
- Your should be at least 11 characters long.
- It should include at least 3 different character types: uppercase letters, lowercase letters, symbols, and numbers.
- Try to avoid real words as they are easier to figure out. (Ex: Dog5815)
2 Use Unique s for Each
How many of your s can hackers break into if they figure out your details on one of your s? If your answer is more than just the one they already broke the for, you need to change your s.
You should also never reuse s for any important s, such as your bank and email.
3 Enable Two-Factor Authentication
Two-factor authentication provides an additional layer of security to your for s. With two-factor authentication, your will need the for the , as well as a device for the authentication process, usually your phone.
You will receive a request for verification, typically as a text message or push notification. If using the same device each time you , you will probably only need to do this once for an .
You will have to your again if you access the from a different, unknown device. It’s wise to at least use two-factor authentication for your bank s, email, and manager (if you use one).
4 Personal Dates
Using personal dates is one way to create a strong that’s easy for you to and difficult for hackers to break.
However, don’t use your birthday. It’s too easy today for people to figure out your birthday online.
Use important family dates that are important to you, but ones that others won’t know about, such as the date you got your first car or your first date. You can make your even more secure by adding multiple dates together or adding a space or special character between them.
5 Nursery Rhymes
The nursery rhyme technique is one of the most preferred methods with IT security policies. First, take the first letter of each word, then you capitalize the first letter in the sentence, then replace specific letters with numbers, and end with a special character, such as “!” or “_”.
For example, take the Jack and Jill nursery rhyme:
“Jack and Jill went up the hill to fetch a pail of water..” You would capitalize the “J” in Jack, then you couple replace any “a” with 3 and “t” with 5, then end with an exclamation mark. Your would turn out to be: J3jwu5h5f3pow!
6 Industry Lingo
Another way to create a strong is using specialized industry in a similar way as the nursery rhyme technique. You can string several words together, or create a sentence and use the first letter of each word as your .
Replace one letter in the phrase, such as “a,” with a number to create an even more secure .
7 Favorite Line of a Movie or Song
Using your favorite movie line or line from a song with the nursery rhyme technique can actually make for a better . Some nursery rhymes are very popular, so they may be easier to guess, depending on how much you changed letters or other variations.
If you’re favorite movie or song isn’t well-known, this could be an even better technique for your.
8 Establish a Hardware Key
One method to ing a complex is the hardware key technique. Write down part of your on a piece of paper or card. For example, you could write down “ThatIsThe?” if your is “2BeOrNot2BeThatIsThe?”.
This method helps you your , but keeps someone from knowing your complete if they found it written down.
9 Use a Manager
You may have difficulties ing all of your s if each one is unique and complex. Fortunately, there are several managers that can help you create and s for each of your s.
The only you will need to is the one to access the manager.
Best Managers
I can recommend these leading five management tools to assist you in generating and recalling robust, intricate s tailored individually for all your online s.
1. RememBear
- Syncs across multiple devices
- Secure AES 256-bit encryption
- Autofills forms, including credit card info.
2. Last

- Stores unlimited s
- Generates strong s
- Automatic form completion
3. Dashlane

- One-click generation
- Automatic form completion
- Digital wallet feature
4. Kee

- Excellent generator
- Highly customizable
- Expandable via plugins
5. Sticky

- Two-factor authentication
- Strong generator
- Cross-platform
Conclusion
Using unique, complex s for your online s you significantly decrease the chances of someone breaking your and stealing your information.
managers are a also great way to help you not forget those strong s. By using these tips for creating strong s, you will be making yourself a much more difficult target for hackers.
Leave a Comment
Cancel