All posts by

Creating a strong password

Create a strong password

Using a strong password is the best and easiest way to make sure your account stays secure. Following are some tips to create a strong  password.

Strong passwords should…

Include numbers, symbols, upper and lower case letters

The more varied your password is, the harder it is to guess. Use at least one number, one letter and one special character.

Avoid sequences or repeated characters

Theses passwords are weak:

123456789, 77777777, abcdefgh,


adjacent characters on your keyboard (ASDF).

Not be obvious

Never use personal information like your name, birthday, TAX ID number, Passport number , zip code etc.

Use different passwords for different sites

Otherwise, if someone acquires that one password, they could use it to access your accounts with other sites.

Long Password are secure

More characters create more secure password. For example, “arbvkwrvwp” is stronger than “arncef”.

Additional password tips

Keep your password safe

  • Keep it freshChange your password regularly; at least once a year. The more often, the better.
  • Keep it secureKeep a record of your passwords in a safe place.
  • Don’t share itNever give out your password to anyone, not even friends.
  • Don’t recycle themCreate new, unique passwords. Never re-use one from the past.
  • Use antivirus softwareEquip your computer with antivirus software.
    • Even if you have a secure password, a computer virus can allow someone to compromise it.
  • Be carefulIf you get an email asking you to change your password or provide any personal information, be cautious, even if it appears to come from a legitimate company.
    • Type it in yourselfRather than clicking a link in such an email, type the site’s URL into your browser’s address bar.
  • Look for yahoo.comOnly type your sign-in information for Yahoo products into sites that end with “”.

Tips for mobile devices

  • Lock itMany devices can be locked so that the only way to use them is to type in a code or password.
    • Without a lock, lost or stolen devices can easily be used to access your personal information, make calls, or send texts that look like they’re coming from you