The 24 Billion Stolen Passwords Nobody Talks About
In 2022, researchers at Digital Shadows found over 24 billion username-and-password pairs circulating on dark web marketplaces and criminal forums. That number has only grown. If you think your organization's credentials aren't in that pile, I'd bet against you.
I've spent years watching organizations pour money into firewalls and endpoint detection while ignoring the front door: passwords. The Verizon 2024 Data Breach Investigations Report found that stolen credentials were involved in roughly 31% of all breaches over the past decade. That's not a technology failure. It's a human one.
This post covers password security best practices that actually hold up against modern threat actors — not the recycled advice from 2015 about changing your password every 90 days. If you're responsible for protecting an organization, or even just your own accounts, what follows is specific, current, and immediately actionable.
Why Most Password Advice Is Outdated and Dangerous
For years, security teams forced employees to change passwords every 60 or 90 days. The result? People created weaker passwords and appended numbers: Summer2024! became Summer2025!. NIST finally put this bad advice to rest.
NIST Special Publication 800-63B now explicitly recommends against mandatory periodic password changes unless there's evidence of compromise. It also discourages complexity rules that lead to predictable patterns. Instead, NIST emphasizes length, screening against known-breached passwords, and layering authentication factors.
If your organization still forces quarterly password rotations with arbitrary complexity requirements, you're actively making security worse. I've seen this firsthand during incident response engagements: the organizations with the most rigid legacy password policies often have the most predictable credential patterns.
What Are Password Security Best Practices in 2026?
Here's a concise answer for anyone searching this question directly: Password security best practices in 2026 center on using long, unique passphrases for every account, storing them in a reputable password manager, enabling multi-factor authentication everywhere, screening credentials against breach databases, and never reusing passwords across services. These steps address the root causes of credential theft: weak passwords, reuse, and single-factor authentication.
Length Beats Complexity Every Time
A 12-character password with uppercase, lowercase, numbers, and symbols looks strong on paper. In practice, most people satisfy that requirement with something like Welcome1! or Company@2026. Threat actors know this. Their cracking dictionaries are built on exactly these patterns.
A 20-character passphrase like correct-horse-battery-staple (the famous XKCD example) is exponentially harder to brute-force, and it's easier to remember. The math is simple: every additional character multiplies the keyspace. A 20-character passphrase using only lowercase letters and hyphens has more entropy than most 10-character complex passwords.
Practical Guidelines for Passphrase Length
- Minimum 16 characters for any account that matters. Twenty or more is better.
- Use four or more unrelated words strung together. Avoid famous quotes, song lyrics, or predictable phrases.
- Add a random separator — a number or symbol between words — if the service requires mixed character types.
- Let your password manager generate it. If you can remember the password easily, it's probably not random enough for high-value accounts.
Password Managers Aren't Optional Anymore
I hear the objection constantly: "But what if the password manager gets hacked?" It's a fair question. LastPass experienced a significant breach in 2022 that exposed encrypted vault data. That was a real incident with real consequences.
But here's the reality: the alternative — reusing passwords across dozens of services, or keeping them in a spreadsheet — is objectively worse. A password manager with a strong master passphrase and multi-factor authentication is still the most practical tool for maintaining unique, long credentials across hundreds of accounts.
What to Look For in a Password Manager
- Zero-knowledge architecture: The vendor should never have access to your decrypted vault.
- Breach monitoring: Good managers flag credentials found in known data breaches.
- Enterprise features: If you're deploying organization-wide, look for role-based access, audit logs, and directory integration.
- Cross-platform sync: Your team uses phones, laptops, and tablets. The manager needs to work on all of them.
Deploy a password manager to your entire organization. Then train people to actually use it. That second step is where most rollouts fail. Structured cybersecurity awareness training bridges this gap by walking employees through real-world scenarios where password managers prevent compromise.
Multi-Factor Authentication: The Non-Negotiable Layer
Even perfect passwords fail when phishing succeeds. A threat actor sends a convincing email, your employee enters credentials on a spoofed login page, and the password — no matter how long or unique — is in the attacker's hands within seconds.
Multi-factor authentication (MFA) is the countermeasure. The Cybersecurity and Infrastructure Security Agency (CISA) lists MFA as one of the highest-impact actions any organization can take. It's their top recommendation alongside patching known exploited vulnerabilities.
Not All MFA Is Created Equal
SMS-based one-time codes are better than nothing, but they're vulnerable to SIM-swapping attacks. The 2024 MGM Resorts breach reportedly involved social engineering of a help desk to bypass authentication. Threat actors are specifically targeting weaker MFA methods.
- Best: FIDO2/WebAuthn hardware security keys (like YubiKeys). Phishing-resistant by design.
- Good: Authenticator apps (TOTP) that generate time-based codes on your device.
- Acceptable: Push notifications with number matching — the user must enter a displayed number, not just tap "Approve."
- Risky: SMS codes. Use only when no better option exists.
If your organization handles sensitive data and you're still relying on SMS as your primary second factor, you have a gap that threat actors know how to exploit.
Screen Every Password Against Breach Databases
The Have I Been Pwned service, maintained by security researcher Troy Hunt, catalogs billions of compromised credentials. NIST specifically recommends checking new passwords against lists of known-breached passwords and blocking matches.
This is one of the most underused password security best practices in enterprise environments. Many organizations don't screen passwords at all — they just enforce length and complexity and call it done.
How to Implement Breach Screening
- Active Directory integration: Tools exist that check passwords against breached lists at the point of creation or change.
- API-based checks: The Have I Been Pwned Passwords API uses k-anonymity, so you never send the full password hash to the service.
- Periodic audits: Run your organization's hashed passwords against breach databases quarterly. You'll find matches. I always do.
Credential Theft Through Social Engineering
The most sophisticated password in the world becomes worthless the moment an employee types it into a phishing page. Social engineering remains the primary delivery mechanism for credential theft, and it's getting sharper.
Generative AI has made phishing emails more convincing — better grammar, more personalized pretexts, and near-perfect brand impersonation. The FBI's Internet Crime Complaint Center (IC3) has tracked a steady increase in business email compromise losses year over year, with reported losses exceeding $2.9 billion in 2023 alone.
Phishing simulation is the most effective way to build resistance. Not a one-time exercise — an ongoing program that adapts to current threat patterns. Organizations running regular phishing awareness training for their teams see measurable reductions in click rates over time. The data consistently shows that employees who experience simulated phishing become dramatically better at spotting the real thing.
Zero Trust Means Never Trusting a Password Alone
The zero trust security model operates on a simple principle: never trust, always verify. In practice, this means a valid password should never be sufficient by itself to grant access to sensitive resources.
Zero trust architectures layer multiple verification signals:
- Device posture: Is this a managed, patched device?
- Location and network context: Is this login coming from an expected geography?
- Behavioral analytics: Does this access pattern match the user's normal behavior?
- Continuous authentication: Re-verify identity throughout the session, not just at login.
If you're building toward zero trust — and you should be — password security best practices become one layer in a deeper defense. The password still matters. It's just no longer the entire castle wall.
The $4.88M Lesson Most Organizations Learn Too Late
IBM's Cost of a Data Breach Report 2024 put the global average cost of a data breach at $4.88 million. Stolen or compromised credentials were the most common initial attack vector, and breaches starting with credentials took an average of 292 days to identify and contain.
That's almost 10 months of a threat actor inside your environment. Ten months to exfiltrate data, deploy ransomware, or pivot to higher-value targets. The initial point of failure in many of these cases? A single reused password. A single account without MFA.
The cost of implementing proper password hygiene — a password manager, MFA, breach screening, and training — is a rounding error compared to $4.88 million.
A Practical Password Security Checklist for 2026
I'm giving you the list I give to every organization I work with. Print it. Share it. Implement it this quarter.
- Deploy a password manager organization-wide and require its use for all work accounts.
- Set minimum password length to 16 characters. Drop mandatory complexity rules. Encourage passphrases.
- Eliminate mandatory periodic password changes unless compromise is suspected.
- Enable MFA on every account that supports it. Prioritize phishing-resistant methods like FIDO2 keys.
- Screen all new and existing passwords against known-breached databases.
- Block the top 100,000 most common passwords at the authentication layer.
- Run phishing simulations monthly. Tie results to targeted security awareness training.
- Audit service accounts and shared credentials quarterly. These are the accounts nobody watches — and attackers know it.
- Implement conditional access policies that evaluate device health, location, and behavior alongside credentials.
- Log and monitor authentication events. Alert on impossible travel, credential stuffing patterns, and brute-force attempts.
Your Passwords Are a Policy Problem, Not Just a People Problem
I've seen too many organizations blame employees for weak passwords while running authentication systems that practically guarantee bad outcomes. If your system accepts Password1! as valid, that's a policy failure. If you don't offer a password manager, you're asking people to remember 80+ unique strings. That's an architecture failure.
Fix the system. Then train the people. Both matter. Neither works alone.
If you need a starting point, structured cybersecurity awareness training gives your team the context behind the rules — why passphrases beat complexity, why MFA blocks phishing, and why that password manager is worth the five minutes it takes to learn. Pair it with hands-on phishing simulation exercises to make the lessons stick.
Password security best practices aren't complicated. They're just widely ignored. That stops being an option the moment a threat actor logs in with your CEO's reused credentials and nobody notices for 292 days.