That long password isn’t keeping you better protected • Blisstech Solutions

How secure do you think your passwords are? Do you believe that longer is always better? Well, we have some news for you. It’s time for a serious talk about password security.

New research has revealed a sobering truth – even passwords that are 15 characters long can be compromised. Yes, you read that right. It’s time to face the stark reality… length doesn’t always mean strength.

The eight-character password reigns supreme as the most compromised length of the password. But don’t breathe a sigh of relief if yours is a longer one. The 15-character password also appears in the top ten most compromised lengths.

You might ask, “How could this be?” The answer lies not only in the password length but also in the content of the password and whether you use the same password on multiple sites.

The most compromised eight-character password is none other than “password” itself, while the most compromised 15-character password is “Sym_newhireOEIE”.

It doesn’t exactly feel secure, does it?

It’s not just about individual people. Businesses like yours are at high risk, too. An alarming 86% of all cyber attacks start with stolen credentials. That’s nearly nine out of ten attacks. Can you afford to be complacent?

Sure, longer passwords do offer more resistance to brute force cracking. An eight-character password can be cracked in five minutes, while a good 15-character one could take up to 37 million years if it does not follow any obvious pattern (i.e., it’s random and uses many characters). Impressive, isn’t it?

But remember, this is just one piece of the puzzle. Length alone won’t save you from stolen credentials via phishing attacks.

Use a robust business password manager. Not only will it randomly generate long passwords for you, but it will also remember them and fill in the login box for you.

You should also use two-factor authentication, generating a code on a separate device to prove it’s you. Even if cyber criminals crack your password, they won’t be able to access your data.

If you need help protecting your business better, get in touch.

More Content

Tech Tip: How to create a scheduling poll using Outlook

Welcome to a new Tuesday tech tip video where we will be exploring how to create a scheduling poll using Outlook. You know what it's like when you are trying to get everyone together for a meeting. Trying to find a time that suits everyone can be a real pain! There...

IT Managed Services for Financial Services

Over the last four decades, technology has significantly impacted how Financial Services operate. In the past, Financial Services businesses, such as IFAs and accountants, had to track financial data manually. Today, they can use software to automate many of these...

Are you using Teams to share sensitive data?

Microsoft Teams has fast become one of THE most useful business tools for the way we work today. No matter where your people work from, they can communicate and collaborate quickly and reliably. But this remote way of working can also open the door to some MAJOR security issues. New research shows that nearly HALF of employees frequently share confidential …

BEC attacks illustrated. Image of a hacker standing behind a computer looking menacing

Business Email Compromise (BEC) attacks are rising

Business Email Compromise (BEC) has emerged as a significant threat to businesses worldwide in recent years. As of March 2025, there has been a staggering 30% increase in BEC attacks. In late February 2025, Microsoft Defender identified nearly 2 million phishing...
Video thumbnail

Tech Tip: Quickly add lines numbers and bullets in Word

Happy Tuesday everyone! Today's Tech Tip is a tip on how to use some of the formatting shortcuts in Word to add lines, bullets and numbers to organise your documents. If you use Word to write your documents, and 90% of people do, you will love this tip as it will show...
Don’t sleep on this simple, effective security booster

Don’t sleep on this simple, effective security booster

Microsoft’s enforcing an extra layer of security for logins to one of its tools. Even if you don’t use it, you should follow their lead and implement this security booster in your business.

Tech Tip: How to use a Password Manager

This Tech Tip is a tip on how to manage your passwords. It's a long tip this week, but that's because there is a lot to tell! With so many things being done online now, passwords are needed constantly.  But with the advice that every password should be unique and not...

Tech Tip: How to use Conditional Formatting in Excel

This Tuesday Two Minute Tech-tip shows you how to automatically add pizzaz to your spreadsheets. Using a feature called 'Conditional Formatting', you can automatically format the cells of your Excel spreadsheet based on what is in them. For example, you can emphasise...

Now AI can make your Teams meetings more productive

Microsoft Teams Meeting Recap will summarise your meetings and even make a list of the action points. We show you its other benefits

Pirated software thumbnail

Don’t walk the plank with pirated software

A huge number of small and medium-sized businesses would consider using pirated software to try and save money. Don’t do it.

Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05