{"id":37,"date":"2020-07-10T12:02:35","date_gmt":"2020-07-10T16:02:35","guid":{"rendered":"https:\/\/www.adelphi.edu\/it\/security\/password-best-practices\/"},"modified":"2025-07-24T13:32:25","modified_gmt":"2025-07-24T17:32:25","slug":"passwords","status":"publish","type":"page","link":"https:\/\/www.adelphi.edu\/it\/security\/passwords\/","title":{"rendered":"Password Best Practices"},"content":{"rendered":"<h2>Use a Passphrase, Not a Password<\/h2>\n<p>You&#8217;re better off using a longer passphrase rather than a short complex password. Each additional character added to the password makes it exponentially harder to guess for hackers.<\/p>\n<p>What do you think is easier to guess? <strong>Ad3lph!<\/strong> or <strong>ilikepuppiesandkittens<\/strong>? Even though Ad3lph! has a combination of capitalization, numbers and special characters, the fact that it is shorter makes it much easier to guess.<\/p>\n<p>The strongest password will have length with some complexity, but not something that&#8217;s too difficult for you to remember. If you have a misspelled word it makes it harder to guess as well. Think\u00a0<strong>ilikepupp3rs&amp;kitteNs<\/strong>; you&#8217;ll remember this more easily than\u00a0<strong>T2&amp;sd9L!<\/strong>, and you&#8217;ll be more secure.<\/p>\n<h2>Use Different Types of Characters<\/h2>\n<p>Include a combination of numbers, special characters, upper- and lower-case letters.<\/p>\n<p>You should also mix it up a little bit; three symbols in a row is not as effective as having them broken up randomly by other characters.<\/p>\n<h2>Use Multifactor Authentication<\/h2>\n<p>Multifactor authentication (MFA) is an extra precaution that requires you to put in an additional code that you receive through your phone, email or app (such as <a href=\"https:\/\/support.google.com\/accounts\/answer\/1066447\" target=\"_blank\" rel=\"noopener noreferrer\">Google Authenticator<\/a>) whenever logging in on an unfamiliar device. You should use multifactor authentication (MFA) whenever it is available to best safeguard from hackers.<\/p>\n<h2>Consider Passwordless<\/h2>\n<p>In addition to multifactor authentication, you can also opt-in to \u201c<strong>passwordless<\/strong>\u201d authentication if you use the <a href=\"https:\/\/support.microsoft.com\/en-us\/account-billing\/download-microsoft-authenticator-351498fc-850a-45da-b7b6-27e523b8702a\" target=\"_blank\" rel=\"noopener\">Microsoft Authenticator app<\/a>. Although you will still need your password for certain applications, most services available through Microsoft can be set to sign in with a code in place of a password. This method requires access to a mobile device (such as a phone) and a one-time code, which is more difficult to steal than a traditional password.<\/p>\n<p>You can find more details on passwordless authentication on <a href=\"https:\/\/support.microsoft.com\/en-us\/account-billing\/how-to-go-passwordless-with-your-microsoft-account-674ce301-3574-4387-a93d-916751764c43\" target=\"_blank\" rel=\"noopener\">Microsoft\u2019s website<\/a>.<\/p>\n<h2>Use a Different Password for Each Account<\/h2>\n<p>Using the same password for every account might make it easier for you to memorize, but it also makes it easier for a hacker to gain access to ALL of your information. Diversify your passwords across accounts to ensure your info is secure.<\/p>\n<h2>Use a Password Manager<\/h2>\n<p>A password manager will store all your passwords for you, and even create unique, strong passwords for each\u00a0account you have. You only have to memorize one master password, and you&#8217;re more secure than before. Awesome, right?<\/p>\n<p>You should look into multiple options before deciding what&#8217;s best for you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Use a Passphrase, Not a Password You&#8217;re better off using a longer passphrase rather than a short complex password. Each additional character added to the password makes it exponentially harder to guess for hackers. What do you think is easier to guess? Ad3lph! or ilikepuppiesandkittens? Even though Ad3lph! has a combination of capitalization, numbers and&hellip;<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":27,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-37","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<title>Password Best Practices | Adelphi University<\/title>\n<meta name=\"description\" content=\"Tips on creating a secure password that will keep your personal information safe from Adelphi University Information Security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adelphi.edu\/it\/security\/passwords\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Password Best Practices | Adelphi University\" \/>\n<meta property=\"og:description\" content=\"Tips on creating a secure password that will keep your personal information safe from Adelphi University Information Security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adelphi.edu\/it\/security\/passwords\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-24T17:32:25+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>","yoast_head_json":{"title":"Password Best Practices | Adelphi University","description":"Tips on creating a secure password that will keep your personal information safe from Adelphi University Information Security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adelphi.edu\/it\/security\/passwords\/","og_locale":"en_US","og_type":"article","og_title":"Password Best Practices | Adelphi University","og_description":"Tips on creating a secure password that will keep your personal information safe from Adelphi University Information Security.","og_url":"https:\/\/www.adelphi.edu\/it\/security\/passwords\/","og_site_name":"Information Technology","article_modified_time":"2025-07-24T17:32:25+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.adelphi.edu\/it\/security\/passwords\/","url":"https:\/\/www.adelphi.edu\/it\/security\/passwords\/","name":"Password Best Practices | Adelphi University","isPartOf":{"@id":"https:\/\/www.adelphi.edu\/it\/#website"},"datePublished":"2020-07-10T16:02:35+00:00","dateModified":"2025-07-24T17:32:25+00:00","description":"Tips on creating a secure password that will keep your personal information safe from Adelphi University Information Security.","breadcrumb":{"@id":"https:\/\/www.adelphi.edu\/it\/security\/passwords\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adelphi.edu\/it\/security\/passwords\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.adelphi.edu\/it\/security\/passwords\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adelphi.edu\/it\/"},{"@type":"ListItem","position":2,"name":"Information Security","item":"https:\/\/www.adelphi.edu\/it\/security\/"},{"@type":"ListItem","position":3,"name":"Password Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/www.adelphi.edu\/it\/#website","url":"https:\/\/www.adelphi.edu\/it\/","name":"Information Technology","description":"Just another Adelphi Sites site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adelphi.edu\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"new_scheduled_revision":"","save_as_revision":"","_links":{"self":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/37"}],"collection":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/comments?post=37"}],"version-history":[{"count":10,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/37\/revisions"}],"predecessor-version":[{"id":711,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/37\/revisions\/711"}],"up":[{"embeddable":true,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/27"}],"wp:attachment":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/media?parent=37"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}