Esrok

Blog

5 habits that keep your passwords strong

A practical guide to stronger passwords, safer resets, and fewer account takeovers.

Password security isn’t about memorizing impossible strings. It’s about building habits that make weak passwords rare, reused passwords almost impossible, and account recovery harder for attackers to abuse.

TL;DR
  • Use longer passphrases (length beats “complexity”).
  • Make every login unique (a password manager helps).
  • Secure password resets (email + recovery options).
  • Spot common patterns attackers guess first.
  • Test and iterate locally before you save.

1) Prefer long passphrases over short “complex” passwords

If you only change one thing, change your default idea of what a “strong password” looks like. A long passphrase is typically stronger (and easier to remember) than a short password packed with symbols.

A good target is 14–20+ characters. Length increases the number of possible combinations dramatically, which raises the time and cost of guessing.

Quick rule: If it’s under 12 characters, treat it as risky.

Want a practical approach? Use 4–6 random words (not a quote), then add a small variation you’ll remember. Avoid anything tied to your identity (pet names, birthdays, sports teams).

2) Make every password unique (so one leak can’t chain into many)

Reuse is the #1 reason a single breach turns into multiple account takeovers. Attackers take leaked email/password pairs and automatically try them on other popular sites. This is called credential stuffing.

The fix is simple (even if it’s annoying): one password per site. If you’re thinking “I can’t remember that many,” you’re right — that’s why password managers exist. You can still remember a few core passphrases (like your manager + email), while the rest are unique and generated.

3) Harden your “password reset” path (it’s the real front door)

Even if your password is perfect, attackers often go around it using “Forgot password.” That means your reset pathway needs to be secure: your email account, your recovery phone number, and any backup codes.

If you want more detail on staying safe from fake reset pages and phishing, read How to navigate the internet safely.

4) Avoid patterns attackers guess first

Attackers don’t guess randomly. They start with what works most often: common words, predictable substitutions, and simple sequences.

Common “looks strong but isn’t” patterns:
  • Replacing letters with symbols: p@ssw0rd, Summer2026!
  • Keyboard walks: qwerty, asdfgh
  • Sequences / repeats: 1234, 111111, ababab
  • Name + year: Jessica2025!, TeamName2026

If you must use a “memorable” component, make it unpredictable and long. Better: generate a unique password and let a manager remember it.

5) Test and iterate before you save

Treat password creation like a quick loop: draft → test → improve. That way you avoid saving something weak and discovering it later.

Esrok’s checker runs locally in your browser, so you can try variations safely and immediately. Use it as a final check before you commit a new password.

Try this workflow:
  1. Start with a long passphrase or generated password.
  2. Check it, then fix the specific weak points called out.
  3. Save the final password once it’s solid.

Weekly checklist (2 minutes)

Want to understand how Esrok treats privacy and security? See Privacy and Security.

Check a password Next post