
The Password Guide I Wish Someone Gave Me Before I Got Hacked
Real talk about password security from someone who learned the hard way. No corporate BS, just practical advice on creating strong passwords, choosing managers, and not getting owned by hackers.
The Day I Realized My "Secure" Password Was Trash
Let me tell you about the email that ruined my week.
It was a Tuesday. I was on my second coffee, half-awake, scrolling through my inbox when I saw it: "Your Dropbox password has been compromised."
"Whatever," I thought. "I use different passwords everywhere."
Then I checked the actual breach data. There it was: P@ssw0rd2019! β my "clever" password that I thought was uncrackable because it had a symbol and a number.
Turns out, that password was in a breach from 2019, 2020, 2021, and twice in 2022. I'd been reusing it everywhere like an idiot. My Dropbox, my old Twitter, some random forum I signed up for in college, even my freakin' pizza delivery account.
Within 48 hours, I was resetting passwords on 47 different accounts. Forty. Seven.
That was my wake-up call. Now I'm borderline paranoid about passwords, and honestly? You should be too. Let me save you from my mistakes.
Humans Are Predictable (And Hackers Know It)
Here's the uncomfortable truth: we're terrible at randomness. When researchers looked at 1.4 billion leaked passwords, they found:
- 30% were in the top 10,000 most common passwords
- 70% contained dictionary words
- 60% followed predictable patterns (name + birth year, keyboard walks like "qwerty123")
When you think you're being clever with P@ssw0rd2024!, you're not. You're following a pattern that cracking tools check in the first 5 seconds.
The pattern we all follow:
- Capital letter at the start (looks important!)
- Dictionary word in the middle (easy to remember!)
- Numbers at the end (usually birth year or current year)
- Exclamation point (because security!)
Sound familiar? Yeah. That's why it doesn't work.
The "Complexity" Lie They Sold Us
For years, IT departments drilled into us: "Use a capital letter, a number, AND a symbol!"
So we wrote P@ssword1! and felt secure.
Guess what? That's literally the first thing password cracking software tries. They've got lists of millions of these "complex" passwords. Yours is in there.
Here's the math that matters:
An 8-character "complex" password (upper, lower, numbers, symbols):
- Cracked in: minutes to hours
A 20-character password of just lowercase letters:
- Cracked in: centuries
Length beats complexity. Every. Single. Time.
I ran the numbers myself once instead of doing actual work. A 20-character random lowercase password has more possible combinations than there are grains of sand on Earth. By a lot.
The Only Password Strategy That Actually Works
After my breach nightmare, I sat down and really thought about what "secure" means. Here's what I figured out:
Rule #1: You Shouldn't Be Able to Remember It
If you can memorize your password, it's not random enough. Full stop.
The only secure password is one that looks like this:
xK9#mP2$vL5@nQ8wR3!jH7&kM4
Good luck remembering that. That's the point.
Rule #2: Never Reuse Passwords. Ever.
I know, I know. It's annoying. But here's why it matters:
When Company X gets breached (and they will), hackers get your email and password. Then they try that combo on Gmail, Amazon, your bank, everywhere. If you reused the password, you're owned. Simple as that.
Rule #3: Use a Password Manager (Seriously, Do It)
I resisted this for years. "What if the password manager gets hacked?" "I don't want to pay for software." "It's too complicated."
All wrong. Here's the reality:
Password managers are safer than your brain. They generate actual randomness. They create unique passwords for every site. They warn you when passwords are compromised.
And the free ones are actually good now.
Password Manager Comparison: Real Talk
I tried a bunch so you don't have to. Here's my honest take:
Bitwarden (What I Use)
The good:
- Actually free for personal use (unlimited passwords!)
- Open source (security researchers can audit the code)
- Works on everything (iOS, Android, Windows, Mac, Linux, browser extensions)
- Self-hosting option if you're paranoid (like me)
The not-so-good:
- Interface is... functional. Not pretty.
- Some advanced features require premium ($10/year, basically nothing)
My verdict: Best free option, period. I switched from 1Password to save money and haven't looked back.
1Password (The Premium Experience)
The good:
- Beautiful interface (seriously, it's nice)
- Watchtower feature warns about breaches automatically
- Great family sharing
- Travel mode (removes sensitive passwords when crossing borders)
The not-so-good:
- $36/year (not terrible, but not free)
- Not open source
My verdict: If you want the best experience and don't mind paying, this is it. I used this for 3 years happily.
Proton Pass (For The Privacy Paranoid)
The good:
- Swiss privacy laws (better than US)
- Open source
- Integrated with Proton Mail ecosystem
- Free tier is generous
The not-so-good:
- Newer, so fewer features than competitors
- Smaller user base means less community support
My verdict: Great if you're already in the Proton ecosystem. Otherwise, Bitwarden is more mature.
Apple Keychain (If You Live In Apple's World)
The good:
- Built into iOS/macOS (zero friction)
- Free
- Syncs via iCloud
- Biometric unlock (Face ID/Touch ID)
The not-so-good:
- Apple devices only (no Android, no Windows browser extensions that work well)
- Hard to export your data if you want to leave
- Limited advanced features
My verdict: Perfect if you're 100% Apple. Use something else if you have any non-Apple devices.
Google Password Manager (Please Don't)
Built into Chrome. Free. Convenient.
But you're giving Google ALL your passwords. Do you really want one company to have your email, search history, location data, AND every password you've ever created?
I used this for like a month before getting uncomfortable. Switched to Bitwarden and slept better.
Setting Up Your Password Manager (Without Losing Your Mind)
When I migrated to a password manager, I did it wrong at first and almost gave up. Here's the right way:
Week 1: The Big 5 Only
Don't try to migrate everything day one. You'll burn out. Start with:
- Primary email (this is the keys to the kingdom)
- Bank/financial accounts
- Password manager itself (obviously)
- Main social media (Facebook, LinkedIn, whatever you use)
- Work email/slack
Change those 5 passwords to generated ones. That's it. Done for week one.
Week 2: Financial & Shopping
- Credit cards
- Investment accounts
- Amazon
- PayPal
- Any other shopping sites you use regularly
Week 3: Everything Else
Now tackle the long tail. Do a batch whenever you have 15 minutes:
- Streaming services
- Gaming accounts
- Utilities
- Random sites you signed up for once
Pro tip: The password manager will show you which passwords are reused or weak. Fix those first.
Multi-Factor Authentication: Because Passwords Aren't Enough
Even with perfect passwords, you need 2FA (Two-Factor Authentication). Here's why:
If someone gets your password (breach, phishing, keylogger), without 2FA they're in. With 2FA, they need your password AND your phone/hardware key. Much harder.
Types of 2FA (Ranked by Security)
1. Hardware Security Keys (YubiKey, Titan)
- Security level: πππππ
- What it is: Physical USB/NFC key you plug in or tap
- Pros: Phishing-proof, impossible to duplicate, works offline
- Cons: Cost $25-50, can be lost, not supported everywhere
I carry a YubiKey on my keychain. For critical stuff (email, password manager, bank), it's hardware key or nothing.
2. Authenticator Apps (Authy, Google Authenticator)
- Security level: ππππ
- What it is: App generates 6-digit codes that change every 30 seconds
- Pros: Free, works offline, widely supported
- Cons: Can be phished if you're not careful, phone-dependent
I use Authy because it syncs across devices. Lost phone? Codes aren't lost. Google Authenticator doesn't sync, which has burned people.
3. Push Notifications (Duo, Google Prompts)
- Security level: πππ
- What it is: Notification on your phone you tap to approve
- Pros: Convenient, no code typing
- Cons: Can be socially engineered (hackers call you and say "approve this login")
Better than nothing, but I prefer apps or hardware keys.
4. SMS/Text Messages
- Security level: ππ
- What it is: They text you a code
- Pros: Universal, works on any phone
- Cons: SIM swapping attacks, interception, requires cell service
Don't use SMS if you have any other option. SIM swapping is real and it's scary. Someone convinces your phone company to transfer your number to their SIM, then they get all your texts including 2FA codes.
My Personal 2FA Strategy
Tier 1 (Hardware Key Required):
- Primary Gmail
- Password manager
- Bank accounts
- Investment accounts
Tier 2 (Authenticator App):
- Work accounts
- Social media
- Cloud storage
- Domain registrars
Tier 3 (SMS - Only If No Other Option):
- Random sites that only support SMS
- Legacy accounts I can't migrate yet
Creating Strong Passwords: Methods That Actually Work
Method 1: Password Manager Generator (Use This)
Just use the built-in generator. Set it to:
- 20+ characters
- Upper, lower, numbers, symbols
- Avoid ambiguous characters (0 vs O, l vs 1)
Done. Don't overthink it.
Method 2: Passphrases (Diceware Style)
If you need to remember something (like your master password), use passphrases:
- Get a word list (EFF's long list has 7,776 words)
- Randomly pick 6 words
- Add separators
Example: correct-horse-battery-staple-iron-sword
Why 6 words? Each word adds about 12.9 bits of entropy. Six words = ~77 bits. That's stronger than most 10-character "complex" passwords.
Method 3: Modified Sentences
Take a sentence you'll remember, then transform it:
Sentence: "My first dog was a golden retriever named Max!"
Transform: Mfdwagrnm! (first letters) β Mfdw4grnM! (numbers added)
Not as strong as random, but memorable. Good for the ONE password you need to remember (your password manager master password).
Common Password Mistakes I've Made (And Seen)
Mistake #1: Reusing Passwords Everywhere
I already told you my Dropbox story. Don't be me.
Mistake #2: Writing Passwords in Notes Apps
Apple Notes, Google Keep, text files on your desktop... I've seen it all.
These aren't encrypted (well, Apple Notes can be, but most people don't enable it). If someone gets your device, they get your passwords.
Use a password manager. That's literally what they're for.
Mistake #3: Sharing Passwords
"Hey, can you log into my Netflix? Here's my password..."
Now they have your Netflix password, which is probably the same as your email or bank or something else. And you can never revoke their access without changing the password everywhere.
Use sharing features in password managers (1Password and Bitwarden both have this) or create separate accounts.
Mistake #4: Ignoring Breach Notifications
That email that says "Your password was found in a data breach"? READ IT. CHANGE THE PASSWORD. IMMEDIATELY.
I ignored one once because I thought "eh, that was an old account." It wasn't. Cost me a weekend of resetting everything.
Mistake #5: Weak Master Passwords
Your master password is THE password. If someone gets it, they get everything.
Make it:
- 16+ characters
- Something you can remember but never used elsewhere
- Not based on personal info (birthdays, pet names, etc.)
Example of a good master password: trombone-echo-violet-plasma-trust-2026
What To Do When You Get Breached (Inevitable)
It's not "if," it's "when." Here's my panic protocol:
Immediate (First Hour):
- Change the breached password (obviously)
- Change that password everywhere else you used it (admit it, you reused it)
- Enable 2FA if it wasn't already (better late than never)
- Check account activity for weird logins
- Sign out all sessions (most sites have this option)
Short Term (First Week):
- Audit all accounts with that email address
- Review connected apps (revoke anything suspicious)
- Check bank/credit statements for weird charges
- Update security questions if you actually use those
- Enable login notifications everywhere
Long Term (Ongoing):
- Credit monitoring (if financial data was involved)
- Dark web monitoring (haveibeenpwned.com is free)
- Regular password audits (quarterly)
- Keep your password manager updated
The Future: Passwordless Auth
The good news? We're moving toward a world without passwords. The bad news? It's happening slowly.
Passkeys are the new hotness:
- Use your device's biometric (fingerprint, face) or PIN
- Cryptographic keys stored on your device
- Impossible to phish (tied to specific websites)
- Sync across devices via iCloud Keychain, Google, etc.
Support right now:
- Apple devices (iOS 16+, macOS Ventura+)
- Android 14+
- Chrome, Safari, Edge
- Sites: GitHub, Google, PayPal, eBay, and growing
My take: Enable passkeys where you can, keep passwords as backup. We're in transition mode for the next few years.
FAQ: Questions People Actually Ask
Q: How long should passwords be? A: 16+ characters minimum. 20+ for critical stuff. Length matters way more than complexity.
Q: Are password managers actually safe? A: Way safer than not using one. They use military-grade encryption. Even if the company gets hacked, the hackers get encrypted blobs that are useless without your master password.
Q: What if I forget my master password? A: You're screwed. Sorry. That's why it needs to be memorable. Write it down, put it in a safe. Seriously.
Q: Should I use browser password managers? A: Better than nothing, but dedicated managers (Bitwarden, 1Password) are way better. More features, better security, work across all browsers.
Q: How often should I change passwords? A: Only when compromised. That "change every 90 days" advice is outdated and makes people use weaker passwords (Password1, Password2, etc.).
Q: Is it safe to check haveibeenpwned.com? A: Yes. Troy Hunt (the creator) is a legit security researcher. The site uses k-anonymity, meaning your password is never sent over the network.
Q: What's the best master password?
A: Something long (20+ chars) you can remember but never used elsewhere. Passphrase style: trombone-echo-violet-plasma-2026
My Security Setup (If You're Curious)
Since people always ask, here's what I actually use:
- Password Manager: Bitwarden (free tier)
- Master Password: 6-word passphrase (not telling you the words)
- 2FA: YubiKey 5 NFC for critical stuff, Authy for everything else
- Hardware Keys: On my keychain + one backup in a safe
- Breach Monitoring: HaveIBeenPwned email alerts + Bitwarden breach reports
- Passkeys: Enabled on all supported sites
Is it overkill? Maybe. Have I been breached since implementing this? Nope.
The Bottom Line
Password security is annoying. Being hacked is devastating. Choose your annoyance.
Your digital lifeβbank accounts, emails, photos, work, everythingβis protected by strings of characters. Make sure those strings are generated by a computer, not your brain.
This Week:
- Pick a password manager (Bitwarden if you're cheap like me, 1Password if you want nice things)
- Change your 5 most important passwords
- Enable 2FA on your email and bank
This Month:
- Migrate everything else to the password manager
- Enable 2FA everywhere that supports it
- Set up breach monitoring
Ongoing:
- Use generated passwords for new accounts
- Check those breach notification emails
- Consider switching to passkeys as they roll out
Don't be like 2019 me, resetting 47 passwords in a panic. Do it right now, while you're calm and caffeinated.
Ready to start? Generate your first actually-secure password with our Password Generator. Then go download Bitwarden or 1Password. Your future self will thank you.
Stay safe out there. The internet is a wild place.
Ramish Hassan - Still paranoid, but at least my accounts are secure
Written by Axonix Team
Axonix Team - Technical Writer @ Axonix
Share this article
Discover More
View all articles
JWTs Explained: No More Auth Headaches
JSON Web Tokens are the standard for stateless authentication. But how do they actually work? We break down the header, payload, and signature so you can implement auth securely.

The Axonix Password Generator: Randomness You Can Trust
Why we built a client-side password generator, and why you should trust it over random websites.

How to Merge PDFs Without Uploading Your Files
A privacy-first guide to combining PDFs locally in your browser, with best practices for order, size, and quality.
Use These Related Tools
View all toolsRandom Password Generator
Generate strong, secure passwords with custom rules.
IP Address Lookup
Find your public IPv4 address and detailed geolocation/ISP information instantly.
JWT Debugger
Decode, verify and debug JSON Web Tokens. Client-side only for maximum security.
htaccess Generator
Generate Apache .htaccess rules for redirects, HTTPS enforcement, and security headers.
Ready to boost your productivity?
Axonix provides 20+ free developer tools to help you code faster and more securely.
Explore Our Tools