{"id":16681,"date":"2020-10-15T10:27:31","date_gmt":"2020-10-15T14:27:31","guid":{"rendered":"https:\/\/www.knownhost.com\/blog\/?p=16681"},"modified":"2022-08-19T16:06:53","modified_gmt":"2022-08-19T20:06:53","slug":"the-power-of-a-strong-password","status":"publish","type":"post","link":"https:\/\/www.knownhost.com\/blog\/the-power-of-a-strong-password\/","title":{"rendered":"The Power Of A Strong Password"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\"><strong>Updated October 15, 2020<\/strong><\/h3>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Complete Guide to Strong Passwords<\/strong><\/h2>\n\n\n<p>Passwords have been around for more than 2,000 years though it&#8217;s only been since the 1960&#8217;s that they&#8217;ve been utilized in computing, such as logins.  Read on to find out what gives a password strength, how they can be cracked or engineered, popular passwords to avoid and some handy resources to help generate strong passwords in this Complete Guide to Strong Passwords.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What Makes a Password Strong<\/strong><\/h2>\n\n\n<p>Passwords are designed to uniquely identify the person logging in or using a computer system.  Because the string of characters is known only to one individual, the identity of the user can be confirmed through use of a particular string.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Passwords that rely on common words or phrases, names or initials, birth dates and relatives names all can be compromised with a bit of guesswork.  The whole point of password strength is in making it so that someone cannot guess it with common information or by using brute force trial and error of every possible combination.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Weak passwords can have few characters, all upper or lowercase and thus be easily guessed with enough tries.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p><strong>Strong passwords rely on:<\/strong><br>\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211;&nbsp;10+ characters (some recommend 15+)<br>\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211;&nbsp;upper and lower case characters<br>\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211;&nbsp;numbers<br>\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211;&nbsp;punctuation (special characters)<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p><strong>Weak passwords are characterized by the use of:<\/strong><br>\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211;&nbsp;your name or initials<br>\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211;&nbsp;birth date<br>\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211;&nbsp;pet name<br>\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211;&nbsp;social security number<br>\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211;&nbsp;address<br>\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211;&nbsp;dictionary words<br>\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211;&nbsp;repeating digits (like ZZZ111)<br>\n&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &#8211;&nbsp;any of the above with number replacement (3 instead of E, 1 instead of I, etc)<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Password Best Practices<\/strong><\/h2>\n\n\n<p>Writing your passwords down and taping under the keyboard or mouse pad isn&#8217;t any more secure than writing on a sheet of paper and laying it on top of your personal effects in the top desk drawer.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Using the same password on multiple sites is an invitation to have your accounts hacked.  If any one of the sites you use gets compromised, then all of them where you&#8217;ve used a common password are subject to hacking.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Telling your password to someone defies the whole point of a password.  It&#8217;s designed to be known only to you so that you can be uniquely identified.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How Easy are Passwords to Crack<\/strong><\/h2>\n\n\n<p>Whether you call it hacking, cracking, breaking, deciphering, guessing or just plain breaking in to a system with your credentials, passwords can be brute forced through enough time and computing power over time.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Want to know how long your password will take to crack?<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Here&#8217;s a few different places to check your password strength &#8211; be sure to alter any you test before using them directly on anything important.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p><strong>Password Cracking Time Checkers<\/strong><br><a href=\"https:\/\/www.my1login.com\/resources\/password-strength-test\/\">www.my1login.com\/resources\/password-strength-test\/<\/a><br><a href=\"https:\/\/password.kaspersky.com\/\">password.kaspersky.com\/<\/a><br><a href=\"https:\/\/thycotic.com\/resources\/password-strength-checker\/\">thycotic.com\/resources\/password-strength-checker\/<\/a><br><a href=\"https:\/\/nordpass.com\/secure-password\/\" rel=\"nofollow\">nordpass.com\/secure-password\/<\/a><br><a href=\"https:\/\/howsecureismypassword.net\">howsecureismypassword.net<\/a><\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p><strong>Password Length vs Approximate Time to Crack**<\/strong><\/p>\n<p>1 digit&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;.0000000008 seconds<br>\n2 digits&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;.000000044 seconds<br>\n3 digits&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;.0000009 seconds<br>\n4 digits&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;.000045 seconds<br>\n5 digits&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;.036 seconds<br>\n6 digits&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;10 seconds<br>\n7 digits&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;15 minutes<br>\n8 digits&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;1 day<br>\n9 digits&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;3 months<br>\n10 digits&nbsp;&nbsp;&nbsp;&nbsp;18 years<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>**Cracking time will vary based on choice of characters and available computing power for the task.  These ballpark figures are based on use of upper, lower, numeric and special characters, none of which are repeating.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Common Passwords to Avoid<\/strong><\/h2>\n\n\n<p>In addition to the most popular passwords to avoid lists that come out each year, it might be fun to check and see if the great password you&#8217;re wanting to use has been used before &#8211; and whether it was exposed in a data breach, check out the <a href=\"https:\/\/haveibeenpwned.com\/Passwords\" rel=\"nofollow\">haveibeenpwned.com<\/a> password checker.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>With growth of technology, comes growth of security breaches. Millions of internet users each year have their information stolen from (seemingly) a &#8216;reliable&#8217; website. When these hackers breach your account, how many of your accounts in total are they really gaining access to if you continually use the same password? You wouldn&#8217;t want one key to unlock every door you enter, so keep the same concept in mind when choosing a password. <\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Most data breached set of logins have been picked up and circulated across countless hacking communities and is likely being used just like dictionary passwords are via automated tools. In other words, if your password is found on the leaklist, odds are it&#8217;s going to be tried time and time again against a number of websites. This is especially true if your email address is found in the leaked data!&nbsp;<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How Social Engineering is Used to Get Passwords<\/strong><\/h2>\n\n\n<p>There are brute force computer scripts designed to keep trying passwords until they hit upon the right one, guessing your login details and circumventing the secure password you put in place.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p><a href=\"https:\/\/www.imperva.com\/learn\/application-security\/social-engineering-attack\/\">Social engineering<\/a>, on the other hand, is where human interaction is used to get you to give up your password without a fight. By convincing you that they&#8217;re someone other than a malicious hacker and that they have legitimate needs for that information, you end up giving them exactly the information that you&#8217;re trying to protect.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Strong Password Generators<\/strong><\/h2>\n\n\n<p>Rather than trying to continually come up with 10+ character passwords that follow all the best practices, using a strong password generator can make life easier.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Take your pick from a wide selection of password generators &#8211; there are plenty of them to choose from across the internet.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p><a href=\"https:\/\/my.norton.com\/extspa\/passwordmanager?path=pwd-gen\">my.norton.com\/extspa\/passwordmanager?path=pwd-gen<\/a><br><a href=\"https:\/\/1password.com\/password-generator\/\">1password.com\/password-generator\/<\/a><br><a href=\"https:\/\/www.dashlane.com\/features\/password-generator\">www.dashlane.com\/features\/password-generator<\/a><br><a href=\"https:\/\/www.avast.com\/en-gb\/random-password-generator\">www.avast.com\/en-gb\/random-password-generator<\/a><\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Where to Store Your Passwords &#8211; Password Managers<\/strong><\/h2>\n\n\n<p>Choose an online password manager and you&#8217;ll be able to secure hundreds of impossibly difficult to remember, unique passwords for each of all your online logins, easily.  There are paid options on the market, but some free password managers are loaded with features and generally include strong password generators.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h2>\n\n\n<p>Using strong passwords and following best practices can give you a fighting chance at maintaining security amid a sea of automated script attacks and creative human social engineers who&#8217;d like to impersonate you. The four following factors are most important when setting up your password:<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p><strong> 1. Get an online password manager<\/strong><\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p><strong> 2. Set strong, unique passwords for every site<\/strong><\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p><strong> 3. Don&#8217;t re-use old passwords<\/strong><\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p><strong> 4. Don&#8217;t delay, start today<\/strong><\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Updated October 15, 2020 Complete Guide to Strong Passwords Passwords have been around for more than 2,000 years though it&#8217;s only been since the 1960&#8217;s that they&#8217;ve been utilized in computing, such as logins. Read on to find out what gives a password strength, how they can be cracked or engineered, popular passwords to avoid [&hellip;]<\/p>\n","protected":false},"author":182,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1452],"tags":[2399,2396,107,2397],"class_list":["post-16681","post","type-post","status-publish","format-standard","hentry","category-basics","tag-breaches","tag-password","tag-security","tag-strength"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Power Of A Strong Password - KnownHost How To Keep Your Account Safe<\/title>\n<meta name=\"description\" content=\"The point of a strong password is so that someone cannot guess it or by using brute force trial and error of every possible combination.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.knownhost.com\/blog\/the-power-of-a-strong-password\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Power Of A Strong Password - KnownHost How To Keep Your Account Safe\" \/>\n<meta property=\"og:description\" content=\"The point of a strong password is so that someone cannot guess it or by using brute force trial and error of every possible combination.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.knownhost.com\/blog\/the-power-of-a-strong-password\/\" \/>\n<meta property=\"og:site_name\" content=\"KnownHost\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/KnownHost\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-15T14:27:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-19T20:06:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2020\/10\/PASSWORD-ft-IMAGE.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Emily Moore\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@KnownHost\" \/>\n<meta name=\"twitter:site\" content=\"@KnownHost\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emily Moore\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/the-power-of-a-strong-password\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/the-power-of-a-strong-password\\\/\"},\"author\":{\"name\":\"Emily Moore\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/person\\\/b15716b5af83cfb7bfd5bd13ecf985fc\"},\"headline\":\"The Power Of A Strong Password\",\"datePublished\":\"2020-10-15T14:27:31+00:00\",\"dateModified\":\"2022-08-19T20:06:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/the-power-of-a-strong-password\\\/\"},\"wordCount\":1155,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\"},\"keywords\":[\"breaches\",\"password\",\"security\",\"strength\"],\"articleSection\":[\"Basics\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/the-power-of-a-strong-password\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/the-power-of-a-strong-password\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/the-power-of-a-strong-password\\\/\",\"name\":\"The Power Of A Strong Password - KnownHost How To Keep Your Account Safe\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#website\"},\"datePublished\":\"2020-10-15T14:27:31+00:00\",\"dateModified\":\"2022-08-19T20:06:53+00:00\",\"description\":\"The point of a strong password is so that someone cannot guess it or by using brute force trial and error of every possible combination.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/the-power-of-a-strong-password\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/the-power-of-a-strong-password\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/the-power-of-a-strong-password\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Power Of A Strong Password\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\",\"name\":\"KnownHost.com\",\"description\":\"Quality Managed Web Hosting by KnownHost\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\",\"name\":\"KnownHost, LLC\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo.png\",\"width\":1200,\"height\":400,\"caption\":\"KnownHost, LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/KnownHost\\\/\",\"https:\\\/\\\/x.com\\\/KnownHost\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/knownhost\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/person\\\/b15716b5af83cfb7bfd5bd13ecf985fc\",\"name\":\"Emily Moore\",\"sameAs\":[\"https:\\\/\\\/www.knownhost.com\"],\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/author\\\/emily-honeycutt\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Power Of A Strong Password - KnownHost How To Keep Your Account Safe","description":"The point of a strong password is so that someone cannot guess it or by using brute force trial and error of every possible combination.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.knownhost.com\/blog\/the-power-of-a-strong-password\/","og_locale":"en_US","og_type":"article","og_title":"The Power Of A Strong Password - KnownHost How To Keep Your Account Safe","og_description":"The point of a strong password is so that someone cannot guess it or by using brute force trial and error of every possible combination.","og_url":"https:\/\/www.knownhost.com\/blog\/the-power-of-a-strong-password\/","og_site_name":"KnownHost","article_publisher":"https:\/\/www.facebook.com\/KnownHost\/","article_published_time":"2020-10-15T14:27:31+00:00","article_modified_time":"2022-08-19T20:06:53+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2020\/10\/PASSWORD-ft-IMAGE.png","type":"image\/png"}],"author":"Emily Moore","twitter_card":"summary_large_image","twitter_creator":"@KnownHost","twitter_site":"@KnownHost","twitter_misc":{"Written by":"Emily Moore","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.knownhost.com\/blog\/the-power-of-a-strong-password\/#article","isPartOf":{"@id":"https:\/\/www.knownhost.com\/blog\/the-power-of-a-strong-password\/"},"author":{"name":"Emily Moore","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/person\/b15716b5af83cfb7bfd5bd13ecf985fc"},"headline":"The Power Of A Strong Password","datePublished":"2020-10-15T14:27:31+00:00","dateModified":"2022-08-19T20:06:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.knownhost.com\/blog\/the-power-of-a-strong-password\/"},"wordCount":1155,"commentCount":1,"publisher":{"@id":"https:\/\/www.knownhost.com\/blog\/#organization"},"keywords":["breaches","password","security","strength"],"articleSection":["Basics"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.knownhost.com\/blog\/the-power-of-a-strong-password\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.knownhost.com\/blog\/the-power-of-a-strong-password\/","url":"https:\/\/www.knownhost.com\/blog\/the-power-of-a-strong-password\/","name":"The Power Of A Strong Password - KnownHost How To Keep Your Account Safe","isPartOf":{"@id":"https:\/\/www.knownhost.com\/blog\/#website"},"datePublished":"2020-10-15T14:27:31+00:00","dateModified":"2022-08-19T20:06:53+00:00","description":"The point of a strong password is so that someone cannot guess it or by using brute force trial and error of every possible combination.","breadcrumb":{"@id":"https:\/\/www.knownhost.com\/blog\/the-power-of-a-strong-password\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.knownhost.com\/blog\/the-power-of-a-strong-password\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.knownhost.com\/blog\/the-power-of-a-strong-password\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.knownhost.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Power Of A Strong Password"}]},{"@type":"WebSite","@id":"https:\/\/www.knownhost.com\/blog\/#website","url":"https:\/\/www.knownhost.com\/blog\/","name":"KnownHost.com","description":"Quality Managed Web Hosting by KnownHost","publisher":{"@id":"https:\/\/www.knownhost.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.knownhost.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.knownhost.com\/blog\/#organization","name":"KnownHost, LLC","url":"https:\/\/www.knownhost.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2021\/04\/logo.png","contentUrl":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2021\/04\/logo.png","width":1200,"height":400,"caption":"KnownHost, LLC"},"image":{"@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/KnownHost\/","https:\/\/x.com\/KnownHost","https:\/\/www.linkedin.com\/company\/knownhost"]},{"@type":"Person","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/person\/b15716b5af83cfb7bfd5bd13ecf985fc","name":"Emily Moore","sameAs":["https:\/\/www.knownhost.com"],"url":"https:\/\/www.knownhost.com\/blog\/author\/emily-honeycutt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/16681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/users\/182"}],"replies":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/comments?post=16681"}],"version-history":[{"count":0,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/16681\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/media?parent=16681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/categories?post=16681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/tags?post=16681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}