{"id":5215,"date":"2024-12-03T06:00:06","date_gmt":"2024-12-03T14:00:06","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=5215"},"modified":"2025-01-24T01:20:42","modified_gmt":"2025-01-24T09:20:42","slug":"4-tips-for-creating-secure-passwords","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/","title":{"rendered":"4 Tips for Creating Secure Passwords"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/secure-passwords\/\" rel=\"attachment wp-att-5426\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-5426\" title=\"secure-passwords\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/secure-passwords.jpg\" alt=\"\" width=\"560\" height=\"450\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/secure-passwords.jpg 560w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/secure-passwords-150x120.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/secure-passwords-300x241.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/secure-passwords-100x80.jpg 100w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/><\/a><\/p>\n<p>In a previous article, I outlined <a href=\"https:\/\/www.intego.com\/mac-security-blog\/4-types-of-passwords-you-shouldnt-create-unless-you-want-your-account-hacked\/\">four types of passwords you shouldn\u2019t create unless you want your account hacked<\/a>. Given how valuable your passwords are, it\u2019s important that they be secure, yet not too hard to remember. Not only do passwords protect your e-mail account, your social media accounts, and any web services you use, but also many accounts linked to your credit card, such as your Amazon, eBay, and PayPal accounts.<\/p>\n<p>Here are four tips showing how you can create secure passwords:<\/p>\n<h3>Tip #1: Size Matters<\/h3>\n<p>With passwords, bigger is better. With the power of todays computers, a 6-character password can be cracked easily using \u201cbrute force\u201d techniques (where a computer simply tries every possible combination of characters) in mere seconds. An 8-character password may take hours if it&#8217;s complex enough; 10 characters would take even longer. If you want to be really secure, go for 12 characters or longer. But also make sure that your passwords aren\u2019t of the type that are commonly used, such as those listed on <a href=\"https:\/\/en.wikipedia.org\/wiki\/List_of_the_most_common_passwords\">this Wikipedia page<\/a>.<\/p>\n<h3>Tip #2: Variety is the Spice of Life<\/h3>\n<p>There are four types of characters you can use in passwords:<\/p>\n<ol>\n<li>lower-case letters (a, b, c, etc.)<\/li>\n<li>upper-case letters (A, B, C, etc.)<\/li>\n<li>digits (1, 2, 3, etc.)<\/li>\n<li>\u201cspecial characters,\u201d which include punctuation (. ; ! etc.) and other characters (# * &amp; etc.)<\/li>\n<\/ol>\n<p>There are 26 lowercase letters, 26 uppercase letters, 10 digits and, depending on the web site, as many as a couple dozen special characters (most sites won\u2019t let you use certain characters).<\/p>\n<p>If you create a password with 8 random digits (that is, numerals only), there are 10<sup>8<\/sup> (100 million) possibilities \u2014 everything from 00000000 through 99999999. If you use, however, 8 random lower-case letters, the number jumps to 26<sup>8<\/sup> (over 208 billion, with a b). With a combination of numbers, upper- and lower-case letters, and special characters, the number of possibilities for an 8-character, pseudorandomly generated password can be in the trillions.<\/p>\n<p>Combine this with tip #1, using a longer password, and see these numbers expand faster than the universe during the Big Bang. Of course, these numbers assume truly pseudorandomly generated passwords. For example, if you were to choose an 10-character password like <code>Password1!<\/code>, it wouldn&#8217;t take long to brute-force crack the password. But a 10-character password like <code>y8E&amp;@.o3Tc<\/code> \u2014 which is just as long and also uses upper, lower, numbers, and special characters \u2014 would be significantly more difficult to crack, because it doesn&#8217;t incorporate words or predictable patterns.<\/p>\n<h3>Tip #3: Create Unique Passwords<\/h3>\n<p>The best way to create unique passwords is to generate pseudorandom ones and store them in your password manager\u2014but we&#8217;re getting ahead of ourselves; that&#8217;s tip #4.<\/p>\n<p>Let&#8217;s assume that you need to come up with a password that you&#8217;re going to need to type often, so it needs to be memorable, but you also want it to be relatively strong. Here\u2019s an easy way to create unique, memorable passwords that are difficult to crack. You can use a password like this for the user account on your iPhone or your Mac, which is very important: if anyone can get into your phone or computer, they can access your e-mail, your files, and all your personal information.<\/p>\n<p>To start with, try to come up with a short phrase or sentence that will be memorable to you, but preferably isn&#8217;t an axiom or anything in any public record like a book. As an example, let\u2019s say you\u2019re a big fan of the <em>Game of Thrones<\/em> TV series, and you think it&#8217;s the greatest of all time (&#8220;the GOAT,&#8221; as the kids say). You shouldn&#8217;t use <code>gameofthrones<\/code> or a variation thereof as your password, which could quite plausibly be in password cracking dictionaries (databases of known or likely passwords). But your first thought might be to create a password similar to this \u2014 <em><strong>please don&#8217;t use any of these examples<\/strong><\/em>:<\/p>\n<blockquote><p><code>gotisthegoat<\/code><\/p><\/blockquote>\n<p>That\u2019s 12 characters, so it\u2019s fairly long, but it\u2019s all lower-case letters. Let\u2019s throw in a couple of upper-case letters to make it more complex, but not in predictable locations (such as the first letter of the password or a word within it):<\/p>\n<blockquote><p><code>gOtistHegoAt<\/code><\/p><\/blockquote>\n<p>That\u2019s a bit better. But now, let\u2019s spice it up with a couple of digits. These have to still be easy to remember, right? How about this:<\/p>\n<blockquote><p><code>g0tistH3goAt<\/code><\/p><\/blockquote>\n<p>And the addition of even one special character theoretically makes this much harder to crack:<\/p>\n<blockquote><p><code>g0tistH3g@At<\/code><\/p><\/blockquote>\n<p>If something like that is too difficult to remember, you can simplify it a bit. To make it a bit more memorable, let\u2019s just use one capital letter, one digit, and one special character, and add a 13th character on the end for good measure:<\/p>\n<blockquote><p><code>g0tistHeg@atz<\/code><\/p><\/blockquote>\n<p>Again, <strong>don&#8217;t use these specific password examples.<\/strong> But if you&#8217;ve gone through this exercise on your own, you now have a password that is relatively secure while also being memorable. According to the site <a href=\"https:\/\/www.security.org\/how-secure-is-my-password\/\">How Secure Is My Password<\/a>, the last example above would supposedly take about 1 hundred quintillion years for a single computer to crack\u2014but computer technology is getting faster, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/ai-is-everywhere-and-how-to-set-up-an-old-mac-as-a-server-intego-mac-podcast-episode-289\/#:~:text=AI%20can%20crack%20passwords%20really,%20really%20fast\">AI is being used to crack passwords<\/a>, and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-quantum-computing-will-affect-computer-security-and-passwords\/\">quantum computing is on the horizon<\/a>. Even setting aside future advancements, relatively inexpensive technologies are easily available to attackers today, such as cloud computing clusters. <a href=\"https:\/\/www.grc.com\/haystack.htm\">GRC&#8217;s Password Haystacks page<\/a> estimates that it would take a &#8220;massive cracking array&#8221; up to 1.65 hundred centuries to crack this password based on today&#8217;s tech.<\/p>\n<p>A password like the last example above is also complex enough that an average person watching you type it (an attack called &#8220;shoulder surfing&#8221;) may have a hard time comprehending what you&#8217;re typing, let alone memorize it. So a password like this should be good enough for logging into your computer or your phone.<\/p>\n<p>One downside is that this password is difficult to type, but the next tip explains how to get around that.<\/p>\n<h3>Tip #4: Use Your Keychain to Store Passwords, or Use a Password Manager<\/h3>\n<p>Even if you have one really secure password memorized, you shouldn\u2019t reuse it for all your web sites and services. This is because of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/\">credential stuffing attacks<\/a>; if one site&#8217;s database gets breached, hackers may try to reuse publicly exposed username and password combinations to log into other sites. Since remembering several dozen complex passwords is implausible, you&#8217;ll need a secure way to store all those unique passwords. That&#8217;s where a password manager comes in.<\/p>\n<p>If you primarily use Apple devices, you can use <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-and-ios-keychain-tutorial-how-apples-icloud-keychain-works\/\"> the Passwords app in macOS and iOS<\/a> to store passwords. The Passwords app (which leverages Apple&#8217;s Keychain technology) is what \u201cremembers\u201d passwords when you enter them in Safari, along with the passwords you use for Mail and other programs. You can also <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-choose-the-right-password-manager-for-you\/\">use one of many password managers available<\/a> (choose one that&#8217;s reputable and well-known\u2014but <a href=\"https:\/\/www.intego.com\/mac-security-blog\/lastpass-password-manager-suffers-massive-data-breach\/\">not LastPass<\/a>). Just make sure that the master password you use for this software is as strong as the example above.<\/p>\n<p>Some password managers give you the option to choose &#8220;easy to type&#8221; passwords, which is a nice bonus. So, for example, you could generate something like <code>Egad-FIERY6-jesters<\/code> \u2014 which is both longer and easier to type on an iPhone or other digital keyboard than the <code>g0tistHeg@atz<\/code> example from earlier, and it&#8217;s not terribly difficult to memorize if you need to.<a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/x.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The passwords you use regularly need to be strong, but also memorable. Learn these four simple ways to ensure that your passwords are secure. <\/p>\n","protected":false},"author":46,"featured_media":35575,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10],"tags":[353,96,106],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The passwords you use regularly need to be strong, but also memorable. Learn these four simple ways to ensure that your passwords are secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 Tips for Creating Secure Passwords - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The passwords you use regularly need to be strong, but also memorable. Learn these four simple ways to ensure that your passwords are secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-03T14:00:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-24T09:20:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/how-to-create-secure-passwords.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/how-to-create-secure-passwords.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/how-to-create-secure-passwords.jpg\",\"width\":400,\"height\":260,\"caption\":\"how to create secure passwords\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/\",\"name\":\"4 Tips for Creating Secure Passwords - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/#primaryimage\"},\"datePublished\":\"2024-12-03T14:00:06+00:00\",\"dateModified\":\"2025-01-24T09:20:42+00:00\",\"description\":\"The passwords you use regularly need to be strong, but also memorable. Learn these four simple ways to ensure that your passwords are secure.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"4 Tips for Creating Secure Passwords\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"4 Tips for Creating Secure Passwords\",\"datePublished\":\"2024-12-03T14:00:06+00:00\",\"dateModified\":\"2025-01-24T09:20:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/#webpage\"},\"wordCount\":1284,\"commentCount\":8,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/how-to-create-secure-passwords.jpg\",\"keywords\":[\"Password Security\",\"Passwords\",\"Privacy\"],\"articleSection\":[\"How To\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The passwords you use regularly need to be strong, but also memorable. Learn these four simple ways to ensure that your passwords are secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/","og_locale":"en_US","og_type":"article","og_title":"4 Tips for Creating Secure Passwords - The Mac Security Blog","og_description":"The passwords you use regularly need to be strong, but also memorable. Learn these four simple ways to ensure that your passwords are secure.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/","og_site_name":"The Mac Security Blog","article_published_time":"2024-12-03T14:00:06+00:00","article_modified_time":"2025-01-24T09:20:42+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/how-to-create-secure-passwords.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/how-to-create-secure-passwords.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/how-to-create-secure-passwords.jpg","width":400,"height":260,"caption":"how to create secure passwords"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/","name":"4 Tips for Creating Secure Passwords - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/#primaryimage"},"datePublished":"2024-12-03T14:00:06+00:00","dateModified":"2025-01-24T09:20:42+00:00","description":"The passwords you use regularly need to be strong, but also memorable. Learn these four simple ways to ensure that your passwords are secure.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"4 Tips for Creating Secure Passwords"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"4 Tips for Creating Secure Passwords","datePublished":"2024-12-03T14:00:06+00:00","dateModified":"2025-01-24T09:20:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/#webpage"},"wordCount":1284,"commentCount":8,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/how-to-create-secure-passwords.jpg","keywords":["Password Security","Passwords","Privacy"],"articleSection":["How To"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/how-to-create-secure-passwords.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-1m7","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5215"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=5215"}],"version-history":[{"count":23,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5215\/revisions"}],"predecessor-version":[{"id":102934,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5215\/revisions\/102934"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/35575"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=5215"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=5215"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=5215"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}