How Strong Should My Password Be?
Password strength is measured by how long it would take an attacker to crack it through brute force. Modern computing can test billions of password combinations per second.
| Password Type | Example | Length | Time to Crack | Rating |
|---|---|---|---|---|
| Common word | password123 | 11 | Instant | Terrible |
| Simple substitution | P@ssw0rd! | 9 | Minutes to hours | Poor |
| Random mixed case + numbers | kT7mR2xP9w | 10 | Days to weeks | Moderate |
| Long random mixed | jK8#mR2x$P9wLn4 | 15 | Centuries | Strong |
| Passphrase | correct-horse-battery-staple | 28 | Millions of years | Excellent |
Password Best Practices
- Minimum 12 characters: Longer is always better. Each additional character multiplies the number of possible combinations.
- Mix character types: Use uppercase, lowercase, numbers, and special characters.
- Use unique passwords: Never reuse a password across multiple sites. If one site is breached, all accounts with the same password are compromised.
- Avoid personal information: Don't use your name, birthday, pet name, or any information available on social media.
- Consider passphrases: Four or more random words strung together (e.g., "mango-bicycle-sunset-compass") are both strong and memorable.
What is Two-Factor Authentication?
Two-Factor Authentication (2FA) adds a second layer of security beyond your password. Even if an attacker obtains your password, they cannot access your account without the second factor.
The three categories of authentication factors are:
- Something you know: Password, PIN, security question.
- Something you have: Phone (SMS code), authenticator app, hardware key.
- Something you are: Fingerprint, face recognition, iris scan.
2FA combines two different categories. The most common combinations for online platforms:
| 2FA Method | Security Level | Convenience | Notes |
|---|---|---|---|
| SMS code | Good | High | Vulnerable to SIM swapping; still much better than no 2FA |
| Authenticator app (Google Authenticator, Authy) | Very Good | Medium | Time-based codes; doesn't require cell service |
| Hardware security key (YubiKey) | Excellent | Lower | Physical device; virtually unphishable |
| Email code | Moderate | High | Better than nothing, but email accounts can also be compromised |
| Biometric | Very Good | Very High | Device-specific; convenient and secure |
How to Enable 2FA?
The exact steps vary by platform, but the general process is:
- Log in to your account on the platform.
- Navigate to Security Settings (usually under Account, Profile, or Settings).
- Find "Two-Factor Authentication" or "2-Step Verification" and click Enable.
- Choose your method (SMS, Authenticator App, or Hardware Key).
- For Authenticator App:
- Download Google Authenticator, Authy, or Microsoft Authenticator on your phone.
- Scan the QR code displayed by the platform.
- Enter the 6-digit code from the app to confirm.
- Save backup codes: The platform will provide backup/recovery codes. Store these securely offline (printed on paper in a safe place). These are your last resort if you lose your phone.
- Confirm activation by entering a test code.
Critical: Always save your backup codes in a secure offline location. If you lose your phone and don't have backup codes, recovering your account can take days or weeks — and may require additional identity verification.
How to Spot Phishing Attempts?
| Red Flag | What It Looks Like | How to Verify |
|---|---|---|
| Suspicious sender address | support@earn7-net.com instead of support@earn7.net | Check the exact domain character by character |
| Urgent language | "Your account will be suspended in 24 hours!" | Legitimate companies rarely use extreme urgency |
| Generic greeting | "Dear Customer" instead of your actual name | Legitimate services usually know your name |
| Suspicious links | Link text says "earn7.net" but URL points elsewhere | Hover over (don't click) to see the actual URL |
| Requests for credentials | "Please verify your password by clicking here" | No legitimate service asks for passwords via email |
| Poor grammar/spelling | Unusual phrasing, typos, formatting errors | Compare with previous legitimate communications |
| Unexpected attachments | Invoice.pdf, Verification.exe, Document.zip | Never open unexpected attachments; contact the sender directly |
| Too-good-to-be-true offers | "You've won $10,000! Claim now!" | If you didn't enter a contest, you didn't win |
What is Session Management?
Session management controls how long you stay logged in and on how many devices simultaneously:
- Session timeout: Auto-logout after inactivity (typically 15-30 minutes). This protects you if you forget to log out on a shared device.
- Active sessions view: Many platforms let you see all devices currently logged into your account. Review this regularly.
- Remote logout: The ability to sign out of all other sessions from your current device. Use this if you suspect unauthorized access.
- Login notifications: Get alerts when your account is accessed from a new device or location.
Best practice: Always log out of your account when using shared or public devices. Don't rely on closing the browser — use the platform's logout function.
Should I Use a Password Manager?
Yes, a password manager is the most practical solution for maintaining strong, unique passwords across dozens of accounts. Benefits include:
- Generates strong passwords: Creates truly random, complex passwords that humans couldn't memorize.
- Stores securely: Encrypted vault protected by one master password.
- Auto-fills safely: Only fills passwords on the correct website, preventing phishing.
- Cross-device sync: Access your passwords on phone, laptop, and tablet.
- Breach monitoring: Many managers alert you if your credentials appear in known data breaches.
Reputable password manager options (all offer free tiers):
- Bitwarden (open source, free tier is excellent)
- 1Password (strong family/team features)
- KeePass (open source, offline-only option)
- Apple Keychain / Google Password Manager (built into ecosystems)
What to Do If My Account is Compromised?
- Immediately change your password on the affected platform. Use a new, strong, unique password.
- Enable 2FA if not already active.
- Log out of all sessions using the platform's security settings.
- Check for unauthorized transactions. Review your deposit/withdrawal history and any recent activity.
- Contact platform support. Report the breach immediately. They can freeze your account, reverse unauthorized transactions, and help secure it.
- Change passwords on other sites if you reused the compromised password anywhere else (another reason to use unique passwords).
- Check your email account. If attackers accessed your email, they may try to reset passwords on other services. Secure your email with 2FA immediately.
- Monitor for follow-up attacks. Compromised accounts are often used for further phishing or social engineering targeting your contacts.
Sources & References
NIST Special Publication 800-63B "Digital Identity Guidelines: Authentication and Lifecycle Management." OWASP (Open Web Application Security Project) Authentication Cheat Sheet. Hive Systems Password Table (2025 edition) for crack time estimates. Google Security Blog on 2FA effectiveness (2FA blocks 99.9% of automated attacks). ENISA (European Union Agency for Cybersecurity) phishing prevention guidelines.