Password Generator

Your Random Password:

LUE2T6lou5Z1jQnLCEdp

Generate Password  Copy Password

How To Generate A Strong Password

There are four unique characteristics of a strong password:

  • Password Length – You’ll want to always have a password that’s at least 12 characters.
  • Mixed Case – You’ll want to include both upper and lower case characters throughout.
  • Numbers – You’ll want to include numbers in your password.
  • Special Characters – You’ll want to include special characters in your password.

Password Best Practices

  • Two-Factor Authentication (2FA) – virtually every platform now offers a means for you to use a password in combination either biometric data, a PIN or security question or pattern, or a real-time code that’s generated by email, by text message, or with an authenticator app.
  • Password Vault – If you’re on an Apple device, you can store all of your passwords securely in iCloud. This is a fantastic way to manage passwords because you can pick a strong, unique password for every service you have but you don’t have to remember them. Just use Safari and your Apple device will pre-fill the passwords. An alternative on Google is to use Google Chrome as your browser. As long as you’re logged into Google on your browser, your passwords are available across any device you’re logged into Google with.
  • Password Apps – Mobile and desktop applications like 1Password, Dashlane, Keeper, or Roboform allow you to store every password securely in their platform. They have browser plugins and mobile apps to help you retrieve them or pre-fill password fields. Another nice feature of these platforms is that they typically have an emergency contact that can gain access to your passwords in the event of an emergency.
  • Suggested Passwords – Password vaults and applications offer suggested passwords that are difficult to guess either manually or programmatically. I would encourage you to always use and store a suggested password rather than writing your own.
  • Don’t Share – Do not share your password with anyone. As a business, you should be utilizing enterprise platforms that enable you to create users who have limited access with their own passwords.
  • Change Your Passwords – Periodically changing your passwords can help increase their strength and protect your accounts. Some security experts recommend changing your passwords every few months or so.

Disclosure: We are using affiliate links to promote other services on this page.

Latest Password and Data Breach News

Article Image

Exclusive: Malware stole internal PowerSchool passwords from engineer's hacked computer

The theft of a PowerSchool engineer's passwords prior to the breach raises further doubts about the company's security practices.

Article Image

The Great Cannabis Hack—380,000 Pot Users Impacted By Attack

A Californian cannabis brand has confirmed that customer information was compromised following a data breach at a vendor—here’s what 380,000 pot users need to know.

Article Image

Apple Passwords password manager review

A simple yet consistent built-in password manager with plenty of room to grow

Article Image

Hackers leak configs and VPN credentials for 15,000 FortiGate devices

A new hacking group has leaked the configuration files, IP addresses, and VPN credentials for over 15,000 FortiGate devices for free on the dark web, exposing a great deal of sensitive technical information to other cybercriminals.

Article Image

Threat actor leaked config files and VPN passwords for over Fortinet Fortigate devices

A previously unknown threat actor released config files and VPN passwords for Fortinet Fortigate devices on a popular cybercrime forum.

Article Image

Proton Pass Review

Proton Pass is at the forefront of free password management, syncing unlimited passwords across all your devices while adding features such as credential hygiene management and email alias creation.

Article Image

Denver DA won't file charges over leak of Colorado voting system passwords

“There is no indication that the passwords were published in an effort to influence the outcome of an election,” the DA concluded.

Article Image

All affected election equipment updated after password leak, Colorado officials say

Employees were deployed to affected counties across the state to make the changes under the supervision of local elections officials.

Article Image

What to know about protecting your identity, personal information after a data breach

Exposed information in data breaches can be used for fraud and identity theft.

Article Image

PowerSchool Reportedly Pays Ransom to Prevent Student Data Leak

A school district said that PowerSchool paid a ransom to prevent the attackers releasing data it accessed of students and teachers in North America

Article Image

New Facebook Security Alert—Your Account Is Safe, Your Password Is Not

Rather than save your Facebook account from deletion, this scary attack will steal your password and take it over.

Article Image

The HIPAA Password Requirements

It is important covered entities and business associates understand the HIPAA password requirements and the best way to comply with them.