Axonix Tools
The Password Guide I Wish Someone Gave Me Before I Got Hacked
Back to Insights
SecurityPrivacyPassword Management

The Password Guide I Wish Someone Gave Me Before I Got Hacked

12 min read

Real talk about password security from someone who learned the hard way. No corporate BS, just practical advice on creating strong passwords, choosing managers, and not getting owned by hackers.

The Day I Realized My "Secure" Password Was Trash

Let me tell you about the email that ruined my week.

It was a Tuesday. I was on my second coffee, half-awake, scrolling through my inbox when I saw it: "Your Dropbox password has been compromised."

"Whatever," I thought. "I use different passwords everywhere."

Then I checked the actual breach data. There it was: P@ssw0rd2019! β€” my "clever" password that I thought was uncrackable because it had a symbol and a number.

Turns out, that password was in a breach from 2019, 2020, 2021, and twice in 2022. I'd been reusing it everywhere like an idiot. My Dropbox, my old Twitter, some random forum I signed up for in college, even my freakin' pizza delivery account.

Within 48 hours, I was resetting passwords on 47 different accounts. Forty. Seven.

That was my wake-up call. Now I'm borderline paranoid about passwords, and honestly? You should be too. Let me save you from my mistakes.

Humans Are Predictable (And Hackers Know It)

Here's the uncomfortable truth: we're terrible at randomness. When researchers looked at 1.4 billion leaked passwords, they found:

  • 30% were in the top 10,000 most common passwords
  • 70% contained dictionary words
  • 60% followed predictable patterns (name + birth year, keyboard walks like "qwerty123")

When you think you're being clever with P@ssw0rd2024!, you're not. You're following a pattern that cracking tools check in the first 5 seconds.

The pattern we all follow:

  1. Capital letter at the start (looks important!)
  2. Dictionary word in the middle (easy to remember!)
  3. Numbers at the end (usually birth year or current year)
  4. Exclamation point (because security!)

Sound familiar? Yeah. That's why it doesn't work.

The "Complexity" Lie They Sold Us

For years, IT departments drilled into us: "Use a capital letter, a number, AND a symbol!"

So we wrote P@ssword1! and felt secure.

Guess what? That's literally the first thing password cracking software tries. They've got lists of millions of these "complex" passwords. Yours is in there.

Here's the math that matters:

An 8-character "complex" password (upper, lower, numbers, symbols):

  • Cracked in: minutes to hours

A 20-character password of just lowercase letters:

  • Cracked in: centuries

Length beats complexity. Every. Single. Time.

I ran the numbers myself once instead of doing actual work. A 20-character random lowercase password has more possible combinations than there are grains of sand on Earth. By a lot.

The Only Password Strategy That Actually Works

After my breach nightmare, I sat down and really thought about what "secure" means. Here's what I figured out:

Rule #1: You Shouldn't Be Able to Remember It

If you can memorize your password, it's not random enough. Full stop.

The only secure password is one that looks like this:

xK9#mP2$vL5@nQ8wR3!jH7&kM4

Good luck remembering that. That's the point.

Rule #2: Never Reuse Passwords. Ever.

I know, I know. It's annoying. But here's why it matters:

When Company X gets breached (and they will), hackers get your email and password. Then they try that combo on Gmail, Amazon, your bank, everywhere. If you reused the password, you're owned. Simple as that.

Rule #3: Use a Password Manager (Seriously, Do It)

I resisted this for years. "What if the password manager gets hacked?" "I don't want to pay for software." "It's too complicated."

All wrong. Here's the reality:

Password managers are safer than your brain. They generate actual randomness. They create unique passwords for every site. They warn you when passwords are compromised.

And the free ones are actually good now.

Password Manager Comparison: Real Talk

I tried a bunch so you don't have to. Here's my honest take:

Bitwarden (What I Use)

The good:

  • Actually free for personal use (unlimited passwords!)
  • Open source (security researchers can audit the code)
  • Works on everything (iOS, Android, Windows, Mac, Linux, browser extensions)
  • Self-hosting option if you're paranoid (like me)

The not-so-good:

  • Interface is... functional. Not pretty.
  • Some advanced features require premium ($10/year, basically nothing)

My verdict: Best free option, period. I switched from 1Password to save money and haven't looked back.

1Password (The Premium Experience)

The good:

  • Beautiful interface (seriously, it's nice)
  • Watchtower feature warns about breaches automatically
  • Great family sharing
  • Travel mode (removes sensitive passwords when crossing borders)

The not-so-good:

  • $36/year (not terrible, but not free)
  • Not open source

My verdict: If you want the best experience and don't mind paying, this is it. I used this for 3 years happily.

Proton Pass (For The Privacy Paranoid)

The good:

  • Swiss privacy laws (better than US)
  • Open source
  • Integrated with Proton Mail ecosystem
  • Free tier is generous

The not-so-good:

  • Newer, so fewer features than competitors
  • Smaller user base means less community support

My verdict: Great if you're already in the Proton ecosystem. Otherwise, Bitwarden is more mature.

Apple Keychain (If You Live In Apple's World)

The good:

  • Built into iOS/macOS (zero friction)
  • Free
  • Syncs via iCloud
  • Biometric unlock (Face ID/Touch ID)

The not-so-good:

  • Apple devices only (no Android, no Windows browser extensions that work well)
  • Hard to export your data if you want to leave
  • Limited advanced features

My verdict: Perfect if you're 100% Apple. Use something else if you have any non-Apple devices.

Google Password Manager (Please Don't)

Built into Chrome. Free. Convenient.

But you're giving Google ALL your passwords. Do you really want one company to have your email, search history, location data, AND every password you've ever created?

I used this for like a month before getting uncomfortable. Switched to Bitwarden and slept better.

Setting Up Your Password Manager (Without Losing Your Mind)

When I migrated to a password manager, I did it wrong at first and almost gave up. Here's the right way:

Week 1: The Big 5 Only

Don't try to migrate everything day one. You'll burn out. Start with:

  1. Primary email (this is the keys to the kingdom)
  2. Bank/financial accounts
  3. Password manager itself (obviously)
  4. Main social media (Facebook, LinkedIn, whatever you use)
  5. Work email/slack

Change those 5 passwords to generated ones. That's it. Done for week one.

Week 2: Financial & Shopping

  • Credit cards
  • Investment accounts
  • Amazon
  • PayPal
  • Any other shopping sites you use regularly

Week 3: Everything Else

Now tackle the long tail. Do a batch whenever you have 15 minutes:

  • Streaming services
  • Gaming accounts
  • Utilities
  • Random sites you signed up for once

Pro tip: The password manager will show you which passwords are reused or weak. Fix those first.

Multi-Factor Authentication: Because Passwords Aren't Enough

Even with perfect passwords, you need 2FA (Two-Factor Authentication). Here's why:

If someone gets your password (breach, phishing, keylogger), without 2FA they're in. With 2FA, they need your password AND your phone/hardware key. Much harder.

Types of 2FA (Ranked by Security)

1. Hardware Security Keys (YubiKey, Titan)

  • Security level: πŸ”’πŸ”’πŸ”’πŸ”’πŸ”’
  • What it is: Physical USB/NFC key you plug in or tap
  • Pros: Phishing-proof, impossible to duplicate, works offline
  • Cons: Cost $25-50, can be lost, not supported everywhere

I carry a YubiKey on my keychain. For critical stuff (email, password manager, bank), it's hardware key or nothing.

2. Authenticator Apps (Authy, Google Authenticator)

  • Security level: πŸ”’πŸ”’πŸ”’πŸ”’
  • What it is: App generates 6-digit codes that change every 30 seconds
  • Pros: Free, works offline, widely supported
  • Cons: Can be phished if you're not careful, phone-dependent

I use Authy because it syncs across devices. Lost phone? Codes aren't lost. Google Authenticator doesn't sync, which has burned people.

3. Push Notifications (Duo, Google Prompts)

  • Security level: πŸ”’πŸ”’πŸ”’
  • What it is: Notification on your phone you tap to approve
  • Pros: Convenient, no code typing
  • Cons: Can be socially engineered (hackers call you and say "approve this login")

Better than nothing, but I prefer apps or hardware keys.

4. SMS/Text Messages

  • Security level: πŸ”’πŸ”’
  • What it is: They text you a code
  • Pros: Universal, works on any phone
  • Cons: SIM swapping attacks, interception, requires cell service

Don't use SMS if you have any other option. SIM swapping is real and it's scary. Someone convinces your phone company to transfer your number to their SIM, then they get all your texts including 2FA codes.

My Personal 2FA Strategy

Tier 1 (Hardware Key Required):

  • Primary Gmail
  • Password manager
  • Bank accounts
  • Investment accounts

Tier 2 (Authenticator App):

  • Work accounts
  • Social media
  • Cloud storage
  • Domain registrars

Tier 3 (SMS - Only If No Other Option):

  • Random sites that only support SMS
  • Legacy accounts I can't migrate yet

Creating Strong Passwords: Methods That Actually Work

Method 1: Password Manager Generator (Use This)

Just use the built-in generator. Set it to:

  • 20+ characters
  • Upper, lower, numbers, symbols
  • Avoid ambiguous characters (0 vs O, l vs 1)

Done. Don't overthink it.

Method 2: Passphrases (Diceware Style)

If you need to remember something (like your master password), use passphrases:

  1. Get a word list (EFF's long list has 7,776 words)
  2. Randomly pick 6 words
  3. Add separators

Example: correct-horse-battery-staple-iron-sword

Why 6 words? Each word adds about 12.9 bits of entropy. Six words = ~77 bits. That's stronger than most 10-character "complex" passwords.

Method 3: Modified Sentences

Take a sentence you'll remember, then transform it:

Sentence: "My first dog was a golden retriever named Max!" Transform: Mfdwagrnm! (first letters) β†’ Mfdw4grnM! (numbers added)

Not as strong as random, but memorable. Good for the ONE password you need to remember (your password manager master password).

Common Password Mistakes I've Made (And Seen)

Mistake #1: Reusing Passwords Everywhere

I already told you my Dropbox story. Don't be me.

Mistake #2: Writing Passwords in Notes Apps

Apple Notes, Google Keep, text files on your desktop... I've seen it all.

These aren't encrypted (well, Apple Notes can be, but most people don't enable it). If someone gets your device, they get your passwords.

Use a password manager. That's literally what they're for.

Mistake #3: Sharing Passwords

"Hey, can you log into my Netflix? Here's my password..."

Now they have your Netflix password, which is probably the same as your email or bank or something else. And you can never revoke their access without changing the password everywhere.

Use sharing features in password managers (1Password and Bitwarden both have this) or create separate accounts.

Mistake #4: Ignoring Breach Notifications

That email that says "Your password was found in a data breach"? READ IT. CHANGE THE PASSWORD. IMMEDIATELY.

I ignored one once because I thought "eh, that was an old account." It wasn't. Cost me a weekend of resetting everything.

Mistake #5: Weak Master Passwords

Your master password is THE password. If someone gets it, they get everything.

Make it:

  • 16+ characters
  • Something you can remember but never used elsewhere
  • Not based on personal info (birthdays, pet names, etc.)

Example of a good master password: trombone-echo-violet-plasma-trust-2026

What To Do When You Get Breached (Inevitable)

It's not "if," it's "when." Here's my panic protocol:

Immediate (First Hour):

  1. Change the breached password (obviously)
  2. Change that password everywhere else you used it (admit it, you reused it)
  3. Enable 2FA if it wasn't already (better late than never)
  4. Check account activity for weird logins
  5. Sign out all sessions (most sites have this option)

Short Term (First Week):

  1. Audit all accounts with that email address
  2. Review connected apps (revoke anything suspicious)
  3. Check bank/credit statements for weird charges
  4. Update security questions if you actually use those
  5. Enable login notifications everywhere

Long Term (Ongoing):

  1. Credit monitoring (if financial data was involved)
  2. Dark web monitoring (haveibeenpwned.com is free)
  3. Regular password audits (quarterly)
  4. Keep your password manager updated

The Future: Passwordless Auth

The good news? We're moving toward a world without passwords. The bad news? It's happening slowly.

Passkeys are the new hotness:

  • Use your device's biometric (fingerprint, face) or PIN
  • Cryptographic keys stored on your device
  • Impossible to phish (tied to specific websites)
  • Sync across devices via iCloud Keychain, Google, etc.

Support right now:

  • Apple devices (iOS 16+, macOS Ventura+)
  • Android 14+
  • Chrome, Safari, Edge
  • Sites: GitHub, Google, PayPal, eBay, and growing

My take: Enable passkeys where you can, keep passwords as backup. We're in transition mode for the next few years.

FAQ: Questions People Actually Ask

Q: How long should passwords be? A: 16+ characters minimum. 20+ for critical stuff. Length matters way more than complexity.

Q: Are password managers actually safe? A: Way safer than not using one. They use military-grade encryption. Even if the company gets hacked, the hackers get encrypted blobs that are useless without your master password.

Q: What if I forget my master password? A: You're screwed. Sorry. That's why it needs to be memorable. Write it down, put it in a safe. Seriously.

Q: Should I use browser password managers? A: Better than nothing, but dedicated managers (Bitwarden, 1Password) are way better. More features, better security, work across all browsers.

Q: How often should I change passwords? A: Only when compromised. That "change every 90 days" advice is outdated and makes people use weaker passwords (Password1, Password2, etc.).

Q: Is it safe to check haveibeenpwned.com? A: Yes. Troy Hunt (the creator) is a legit security researcher. The site uses k-anonymity, meaning your password is never sent over the network.

Q: What's the best master password? A: Something long (20+ chars) you can remember but never used elsewhere. Passphrase style: trombone-echo-violet-plasma-2026

My Security Setup (If You're Curious)

Since people always ask, here's what I actually use:

  • Password Manager: Bitwarden (free tier)
  • Master Password: 6-word passphrase (not telling you the words)
  • 2FA: YubiKey 5 NFC for critical stuff, Authy for everything else
  • Hardware Keys: On my keychain + one backup in a safe
  • Breach Monitoring: HaveIBeenPwned email alerts + Bitwarden breach reports
  • Passkeys: Enabled on all supported sites

Is it overkill? Maybe. Have I been breached since implementing this? Nope.

The Bottom Line

Password security is annoying. Being hacked is devastating. Choose your annoyance.

Your digital lifeβ€”bank accounts, emails, photos, work, everythingβ€”is protected by strings of characters. Make sure those strings are generated by a computer, not your brain.

This Week:

  1. Pick a password manager (Bitwarden if you're cheap like me, 1Password if you want nice things)
  2. Change your 5 most important passwords
  3. Enable 2FA on your email and bank

This Month:

  1. Migrate everything else to the password manager
  2. Enable 2FA everywhere that supports it
  3. Set up breach monitoring

Ongoing:

  1. Use generated passwords for new accounts
  2. Check those breach notification emails
  3. Consider switching to passkeys as they roll out

Don't be like 2019 me, resetting 47 passwords in a panic. Do it right now, while you're calm and caffeinated.

Ready to start? Generate your first actually-secure password with our Password Generator. Then go download Bitwarden or 1Password. Your future self will thank you.

Stay safe out there. The internet is a wild place.


Ramish Hassan - Still paranoid, but at least my accounts are secure

Written by Axonix Team

Axonix Team - Technical Writer @ Axonix

Share this article

Discover More

View all articles

Ready to boost your productivity?

Axonix provides 20+ free developer tools to help you code faster and more securely.

Explore Our Tools