top of page

How to Make a Strong Password: What UK Businesses Really Need šŸ›”ļø

  • Writer: Alex Hughes
    Alex Hughes
  • 6 days ago
  • 4 min read

Everyone knows by now that setting a strong password is important for account security — but how many businesses actually use one? Shockingly, many don’t. According to recent UK government data, 50% of businessesĀ reported having experienced a cyber security breach or attack in the past 12 months. Even more concerning: 69% of UK small businessesĀ still rely on weak passwordsĀ to access important documents.


If you handle sensitive data, customer accounts, or any form of internal systems, weak passwords are simply not an option. Here’s how to get them right — with statistics, best practices, and practical steps.


strong password


Why Strong Passwords Matter — And What’s at Risk

  • 43% of UK businessesĀ report some kind of cyber breach or attack in the past year.

  • Half of businesses (50%)Ā and about one third of charities in the UK say they’ve had a cyber breach or attack in the last 12 months.

  • 81% of corporate data breachesĀ are due to poor password practices.

  • 91% of all passwords found in data breachesĀ are weak or reused.


These aren’t just numbers — they represent real losses: lost trust, regulatory fines (e.g. under UK GDPR), downtime, and financial cost. Just one compromised account can cascade into a large breach via credential reuse, lateral movement, or phishing.



What Makes a Password Strong: Best Practices

Here are the key components that make a password strong — guidelines you should adopt across your business. These align with advice from top cybersecurity authorities (e.g. Microsoft, NCSC, Forrester):


  1. Length + Complexity

    The longer, the better. Aim for 12–16 characters minimum, ideally using a mix:

    1. Upper and lower case letters

    2. Numbers

    3. Special characters (e.g. ! @ # $ % ^ & *)Avoid dictionary words, names, or predictable replacements (e.g. ā€œP@ssw0rd!ā€ is better than ā€œpasswordā€ but still not strong enough if common).

  2. Uniqueness / No Reuse

    Every important account should have its own password. Reusing passwords is one of the biggest risk multipliers. If one breach exposes your credentials, attackers often try the same combinations elsewhere (ā€œcredential stuffingā€).

  3. Avoid Obvious Patterns

    Skip sequential characters (123456), adjacent keyboard patterns (qwerty), repeated characters (aaaaaa), or anything that can be guessed with a few tries.

  4. Use Passphrases Where Practical

    A string of random words (e.g. ā€œBlueBookHorse92!ā€ or ā€œTulipCoffee7Moonā€) can be easier to remember and harder to crack. NCSC (National Cyber Security Centre UK) encourages thinking of memorable but random word combinations.

  5. Enable Multi-factor Authentication (MFA)

    Even the strongest password can be compromised; MFA adds a second line of defense (e.g. authentication apps, hardware keys, SMS in some cases).

  6. Use Password Managers

    These tools generate long, random, unique passwords for each account and store them securely so users don’t have to remember them. They also reduce the temptation to reuse or simplify.

  7. Regular Audits & Policy Enforcement

    It’s not enough to set good standards; you need ongoing enforcement:

    1. periodic checks for weak / reused / old passwords

    2. forced password rotations (carefully, and with user-friendly support)

    3. training & awareness programs so staff understand the risks



UK-Specific Considerations for Businesses

  • Regulation & Compliance: Under GDPR, you have obligations to protect personal data. A breach due to weak passwords can lead to regulatory penalties.

  • Insurers & Cyber Risk: Many insurers ask about cybersecurity hygiene as part of underwriting. Having strong password policies and MFA can reduce premiums or improve your terms.

  • Remote / Hybrid Working: With more people working outside traditional offices, endpoints are more exposed. Weak passwords on personal or shared devices become a huge vulnerability.

  • Supplier / Partner Access: Your vendors and partners may introduce weak links. Enforce password strength and MFA even for third-party access.



Common Misconceptions & Pitfalls

Misconception

Why it's dangerous

"I use a complex password, so I don't need MFA"

If that password is reused elsewhere or compromised in a leak, MFA can stop further damage.

"I'll remember one password for everything to avoid forgetting"

Reuse means broaded exposure. Better to use a password manager.

"Long uncommon words are safe"

If the words are popular or predictable, they are often in attacker dictionaries.

"My business is too small to be targeted"

Breaches often happen opportunistically. Hackers don't always target size; they target vulnerability.


Step‑by‑Step: How Your Business Can Improve Password Security

  1. Draft/Review a Password Policy

    Define minimum password strength, rules for reuse, rotation, MFA requirements, and exceptions.

  2. Deploy a Password Manager

    Preferably company‑wide. Choose one vetted for enterprise security.

  3. Require MFA on All Sensitive or Access‑Critical Accounts

    This includes email, financial systems, HR systems, vendor portals.

  4. Training and Awareness

    Regularly remind staff of best practices, share stories of breaches caused by weak credentials, simulate phishing, etc.

  5. Audit & Monitor

    • Penetration testing

    • Periodic password audits (e.g. checking for reused or weak passwords)

    • Monitor for breached credentials (using breach databases)

  6. Stay Updated on Guidance

    Follow authoritative sources: UK’s National Cyber Security Centre (NCSC), Microsoft Security, Forrester, etc. Stay aware of new threats, tools, and regulation changes.


strong password

Example Checklist

  • āœ… Passwords are at least 12 characters long

  • āœ… Mix of uppercase, lowercase, numbers, special characters

  • āœ… Unique per account / no reuse

  • āœ… Passphrases considered for easy‑to‑remember yet strong options

  • āœ… MFA enabled wherever possible

  • āœ… Password manager adopted

  • āœ… Regular auditing and training



Conclusion

In short: having a strong password is non-negotiableĀ for UK businesses today. Weak passwords are still a leading cause of breaches, and the fallout — from financial losses to reputational damage — can be severe. By following ā€œstrong password guidelines UKā€ practices, enforcing them across your organisation, and combining with MFA + password managers, you can raise your security posture significantly.

bottom of page