The Breach That Started With "Password123"
In 2020, the Verizon Data Breach Investigations Report confirmed what security professionals already suspected: over 80% of hacking-related breaches involved brute force or the use of lost or stolen credentials. That's not a typo. Four out of five breaches trace back to weak or compromised passwords.
I've investigated incidents where a single reused password — something like "Company2020!" — gave a threat actor access to an entire corporate network. If you're searching for strong password examples, you're already ahead of most people. But you need more than examples. You need to understand what makes a password strong, why most "strong" passwords aren't, and how to build passwords that actually resist modern attack techniques.
This post gives you concrete, usable strong password examples. More importantly, it gives you the system behind them so you never have to guess again.
Why Most "Strong" Passwords Fail
Here's what actually happens during a credential theft attack. The attacker doesn't sit at a keyboard guessing your dog's name. They run automated tools that test billions of combinations per second. They also use massive databases of previously breached passwords — collections like the "Collection #1" dump that exposed over 773 million email addresses and passwords in 2019.
These tools don't just brute-force random characters. They use rules. They know that most people capitalize the first letter, add a number at the end, and swap "a" for "@". So "P@ssword1" gets cracked in under a second. "Summer2020!" gets cracked in minutes. These look strong to humans. They're tissue paper to software.
The National Institute of Standards and Technology (NIST) updated its Digital Identity Guidelines (SP 800-63B) to reflect this reality. Their recommendation? Stop requiring arbitrary complexity rules. Start focusing on length and unpredictability.
What Makes a Password Actually Strong?
Length Beats Complexity Every Time
A 16-character password made of random lowercase letters has more entropy than an 8-character password with uppercase, lowercase, numbers, and symbols. Length is the single most important factor. Every additional character multiplies the time required to crack it exponentially.
Randomness Is Non-Negotiable
Your brain is terrible at generating randomness. "MyD0g$park!e2020" feels random, but it follows predictable human patterns. True randomness means no recognizable words, no keyboard patterns (like "qwerty" or "zxcvbn"), and no personal information.
Uniqueness Per Account
The strongest password in the world becomes worthless the moment you reuse it. When a data breach exposes your credentials on one site, attackers immediately test those same credentials across banking, email, and corporate accounts. This is called credential stuffing, and the FBI's IC3 has flagged it as a growing threat in their 2019 Internet Crime Report.
Strong Password Examples You Can Learn From
Let me be direct: I'm not giving you passwords to copy and paste. Posting a specific password on a public blog makes it immediately insecure — attackers scrape these lists and add them to their dictionaries. Instead, here are strong password examples that demonstrate the principles, along with the method to build your own.
Method 1: Random Character Strings (Best for Password Managers)
These are generated by a password manager and stored in its encrypted vault. You never need to memorize them.
- Example format:
j7#kL9$mQ2&xW4!pR8— 18 characters, fully random, mixed character types - Example format:
Tz!4vN8@qX1#mB6&wR— same approach, different output - Why it works: No patterns, no words, no predictability. At 18 characters with full character sets, this would take centuries to brute-force with current hardware.
The key here: you don't memorize these. A password manager handles it. You only need to memorize one master password — which brings us to Method 2.
Method 2: Passphrase Method (Best for Master Passwords and Logins You Type)
This is the method NIST now favors. String together four to six unrelated words into a phrase that's easy for you to remember but impossible for software to predict.
- Example format:
correct-horse-battery-staple— the classic XKCD example. Do NOT use this specific phrase; it's in every cracking dictionary now. - Better approach: Pick four genuinely random words. Use a method like rolling dice with a wordlist (Diceware). You might get something like:
trumpet-glacier-notebook-cactus - Even stronger: Add a random number and symbol in an unexpected position:
trumpet7-glacier-notebook!-cactus
At 35+ characters, this passphrase has massive entropy. It's also something you can actually type from memory. That's the sweet spot for strong password examples — long, random, and memorable to you alone.
Method 3: Sentence-Based Passwords
Take a sentence only you would know, then transform it.
- Original sentence: "My first apartment was at 742 Oak Street in 2003"
- Password:
MfAw@742OakSt!2003 - Why it works: It's 18 characters, uses mixed case, numbers, and symbols — but unlike "P@ssword1," the structure isn't predictable because it's derived from a unique personal sentence.
This method is weaker than true randomness, but far stronger than what 90% of people use. It's a good middle ground when a password manager isn't available.
The Passwords You Should Never Use
I see these in breach dumps constantly. If anything on your accounts resembles these patterns, change it today:
- Seasonal patterns: Winter2020!, Fall2020#, Summer20
- Company + year: Acme2020!, CompanyName1
- Keyboard walks: qwerty123, 1qaz2wsx
- Single word + number: Dragon7, Monkey1!, Shadow99
- Sports teams, pet names, birthdays: Any personal info found on social media
Social engineering makes personal passwords especially dangerous. A threat actor who spends 10 minutes on your Facebook profile can build a targeted wordlist with your pet's name, your anniversary, your hometown, and your favorite team. That wordlist cracks your "personal" password in seconds.
How Attackers Actually Crack Passwords in 2020
Brute Force With GPUs
Modern graphics cards can test billions of password hashes per second. An 8-character password using all character types falls in under 8 hours against a moderately equipped attacker. Bump to 12 characters and you're looking at years. Bump to 16 and you're in centuries.
Dictionary Attacks With Rules
Attackers load up dictionaries of common passwords, leaked credentials, and common transformations. They know you swap "a" for "@" and "e" for "3". They know you add "!" at the end. Their rule sets account for every lazy shortcut humans take.
Credential Stuffing
Breached password databases from incidents like the 2013 Yahoo breach (3 billion accounts) and the 2012 LinkedIn breach (117 million credentials) circulate openly. Attackers automate login attempts across thousands of sites using these stolen credentials. Reuse any password, and you're handing them the key.
Phishing
The strongest password in existence won't help if you type it into a fake login page. Phishing remains the number one method threat actors use to steal credentials. The 2020 Verizon DBIR found that phishing was present in 22% of confirmed breaches. Learning to recognize phishing attempts is just as critical as building strong passwords — which is why I recommend every organization run regular phishing awareness training for their teams.
What Is the Best Strong Password Format?
The best strong password format for most people is a randomly generated string of 16+ characters stored in a password manager. For passwords you must memorize — like your master password or device login — use a passphrase of four or more random, unrelated words totaling at least 20 characters. Combine this with multi-factor authentication on every account that supports it. This approach aligns with current NIST guidelines and protects against brute force, dictionary attacks, and credential stuffing.
Multi-Factor Authentication: Your Password's Best Friend
Even perfect strong password examples aren't enough on their own. Multi-factor authentication (MFA) adds a second verification step — something you have (a phone, a hardware key) or something you are (biometrics). Even if a threat actor steals your password through a data breach or phishing attack, they can't access your account without that second factor.
Enable MFA everywhere. Start with email, banking, and any account that could be used to reset other passwords. Prefer authenticator apps or hardware keys over SMS-based codes when possible — SIM swapping attacks can intercept text messages.
Building a Password Policy That Works
If you manage security for an organization, your password policy should reflect modern threat realities, not outdated checkbox compliance. Here's what I recommend based on NIST SP 800-63B and real-world incident response experience:
- Minimum 12 characters — 16+ preferred
- No forced periodic changes unless there's evidence of compromise (forced rotation leads to weaker passwords)
- Screen passwords against breach databases — use services like Have I Been Pwned's API to reject known-compromised passwords at creation
- Mandate multi-factor authentication for all remote access and privileged accounts
- Deploy phishing simulations regularly to test and train employees
- Provide a password manager as a standard corporate tool
A strong password policy is one layer in a zero trust approach to security. Never assume the network is safe. Verify everything, every time.
Train Your People, Not Just Your Systems
I've seen organizations spend six figures on security tools while ignoring the humans who click phishing links and reuse "Welcome1!" across twelve systems. Technology matters. Training matters more.
Security awareness training teaches your employees to recognize social engineering, build strong passwords, and report suspicious activity before it becomes a breach. It's not a one-time checkbox — it's an ongoing program. If your organization hasn't started, the cybersecurity awareness training program at computersecurity.us covers the fundamentals your team needs, from password hygiene to recognizing phishing and ransomware threats.
Pair that with hands-on phishing simulation training to test whether the lessons stick. The organizations that run simulations consistently see measurable drops in click rates within 90 days.
Your Action Plan: Five Steps Before the Year Ends
2020 has been a year of unprecedented remote work expansion, and with it, unprecedented credential theft. Here's what to do right now:
- Audit your passwords today. Check Have I Been Pwned for every email address you use.
- Install a password manager. Migrate every account to a unique, randomly generated password of at least 16 characters.
- Create a strong master passphrase. Use the Diceware method. Four to six random words. Memorize it. Write nothing down.
- Enable MFA on every critical account. Email first. Then banking, cloud storage, and social media.
- Start security awareness training. Whether you're an individual or managing a team of 500, understanding threats like phishing, social engineering, and credential theft is the foundation of every other security measure.
Strong password examples are a starting point. A real security posture combines strong credentials, multi-factor authentication, ongoing training, and a healthy skepticism toward every unexpected email, link, and login prompt. Build that habit now, and you'll be in a far stronger position heading into 2021.