Protect your login details.

Hackers may target you specifically because of your work and try to gain access to your online accounts to do so. 

Rule number one: Always create strong passwords. Hackers often use computer programmes that can guess an extremely high number of password combinations, especially weak ones. A strong password is made up of more than six letters and should, ideally, also contain numbers and symbols.


Best practice: passwords

  • Check if any of your accounts have been compromised by using This site will check to see if your email and/or your password have been part of a data breach – if so, change its password straight away. Register with the site to be notified of any future breaches.
  • Online services register and store data on you. When the security of these sites is breached, your data is put at risk. Companies such as Linkedin and Dropbox have been hacked and their data – including email addresses and passwords of their users – was stolen. This is one reason why you should not re-use passwords. If one account is breached, hackers may try to use that password to gain access to your other accounts.
  • Do not include personal details in your passwords. These are easy for you to remember, but they are also easy for hackers to crack.
  • Create long passwords, known as passphrases. See our guide below.
  • Your browser sometimes gives you the option to save your password on the browser. This makes it easy for you to log into your accounts, but also makes it is easy for others to gain access to your accounts if they have access to your computer.

Creating a strong password

You should always create a strong and long password.

There are several ways to do this, including the methods listed below. There is no ‘official’ or fool-proof method, so you should choose the way that best suits you.

Here are some methods for creating more secure passwords:

  1. The Dice Method – This can create incredibly hard-to-hack passwords. Roll four dice and use the numbers generated to select a word from a list. The more words you select, the stronger the password. The Electronic Frontier Foundation gives clear instructions on how to use this method.
  2. The Person, Action, Object Method – Use this method to create memorable passphrases. To summarise Lifehacker’s explanation of it: “Think of a person, an action and a place, and maybe a few other things: Beyonce, driving, Mount Rushmore, Jello mold. These are then combined into a sentence to be used as a passphrase: “Beyonce driving a Jello mold at Mount Rushmore.”

Password managers

You may want to consider using a password manager – a tool that generates and stores strong passwords for your accounts. You will, however, have to create a long and strong password to login and remember it, as you will not be able to access your password manager without it.

Here is a selection of commonly-used password managers. Research your own password manager before buying to make sure that it suits your needs.

Further reading

The Real Life Risks Of Re Using The Same Passwords