How to Make a Strong Password: What UK Businesses Really Need š”ļø
- Alex Hughes
- 6 days ago
- 4 min read
Everyone knows by now that setting a strong password is important for account security ā but how many businesses actually use one? Shockingly, many donāt. According to recent UK government data, 50% of businessesĀ reported having experienced a cyber security breach or attack in the past 12 months. Even more concerning: 69% of UK small businessesĀ still rely on weak passwordsĀ to access important documents.
If you handle sensitive data, customer accounts, or any form of internal systems, weak passwords are simply not an option. Hereās how to get them right ā with statistics, best practices, and practical steps.

Why Strong Passwords Matter ā And Whatās at Risk
43% of UK businessesĀ report some kind of cyber breach or attack in the past year.
Half of businesses (50%)Ā and about one third of charities in the UK say theyāve had a cyber breach or attack in the last 12 months.
81% of corporate data breachesĀ are due to poor password practices.
91% of all passwords found in data breachesĀ are weak or reused.
These arenāt just numbers ā they represent real losses: lost trust, regulatory fines (e.g. under UK GDPR), downtime, and financial cost. Just one compromised account can cascade into a large breach via credential reuse, lateral movement, or phishing.
What Makes a Password Strong: Best Practices
Here are the key components that make a password strong ā guidelines you should adopt across your business. These align with advice from top cybersecurity authorities (e.g. Microsoft, NCSC, Forrester):
Length + Complexity
The longer, the better. Aim for 12ā16 characters minimum, ideally using a mix:
Upper and lower case letters
Numbers
Special characters (e.g. ! @ # $ % ^ & *)Avoid dictionary words, names, or predictable replacements (e.g. āP@ssw0rd!ā is better than āpasswordā but still not strong enough if common).
Uniqueness / No Reuse
Every important account should have its own password. Reusing passwords is one of the biggest risk multipliers. If one breach exposes your credentials, attackers often try the same combinations elsewhere (ācredential stuffingā).
Avoid Obvious Patterns
Skip sequential characters (123456), adjacent keyboard patterns (qwerty), repeated characters (aaaaaa), or anything that can be guessed with a few tries.
Use Passphrases Where Practical
A string of random words (e.g. āBlueBookHorse92!ā or āTulipCoffee7Moonā) can be easier to remember and harder to crack. NCSC (National Cyber Security Centre UK) encourages thinking of memorable but random word combinations.
Enable Multi-factor Authentication (MFA)
Even the strongest password can be compromised; MFA adds a second line of defense (e.g. authentication apps, hardware keys, SMS in some cases).
Use Password Managers
These tools generate long, random, unique passwords for each account and store them securely so users donāt have to remember them. They also reduce the temptation to reuse or simplify.
Regular Audits & Policy Enforcement
Itās not enough to set good standards; you need ongoing enforcement:
periodic checks for weak / reused / old passwords
forced password rotations (carefully, and with user-friendly support)
training & awareness programs so staff understand the risks
UK-Specific Considerations for Businesses
Regulation & Compliance: Under GDPR, you have obligations to protect personal data. A breach due to weak passwords can lead to regulatory penalties.
Insurers & Cyber Risk: Many insurers ask about cybersecurity hygiene as part of underwriting. Having strong password policies and MFA can reduce premiums or improve your terms.
Remote / Hybrid Working: With more people working outside traditional offices, endpoints are more exposed. Weak passwords on personal or shared devices become a huge vulnerability.
Supplier / Partner Access: Your vendors and partners may introduce weak links. Enforce password strength and MFA even for third-party access.
Common Misconceptions & Pitfalls
Misconception | Why it's dangerous |
"I use a complex password, so I don't need MFA" | If that password is reused elsewhere or compromised in a leak, MFA can stop further damage. |
"I'll remember one password for everything to avoid forgetting" | Reuse means broaded exposure. Better to use a password manager. |
"Long uncommon words are safe" | If the words are popular or predictable, they are often in attacker dictionaries. |
"My business is too small to be targeted" | Breaches often happen opportunistically. Hackers don't always target size; they target vulnerability. |
StepābyāStep: How Your Business Can Improve Password Security
Draft/Review a Password Policy
Define minimum password strength, rules for reuse, rotation, MFA requirements, and exceptions.
Deploy a Password Manager
Preferably companyāwide. Choose one vetted for enterprise security.
Require MFA on All Sensitive or AccessāCritical Accounts
This includes email, financial systems, HR systems, vendor portals.
Training and Awareness
Regularly remind staff of best practices, share stories of breaches caused by weak credentials, simulate phishing, etc.
Audit & Monitor
Penetration testing
Periodic password audits (e.g. checking for reused or weak passwords)
Monitor for breached credentials (using breach databases)
Stay Updated on Guidance
Follow authoritative sources: UKās National Cyber Security Centre (NCSC), Microsoft Security, Forrester, etc. Stay aware of new threats, tools, and regulation changes.

Example Checklist
ā Passwords are at least 12 characters long
ā Mix of uppercase, lowercase, numbers, special characters
ā Unique per account / no reuse
ā Passphrases considered for easyātoāremember yet strong options
ā MFA enabled wherever possible
ā Password manager adopted
ā Regular auditing and training
Conclusion
In short: having a strong password is non-negotiableĀ for UK businesses today. Weak passwords are still a leading cause of breaches, and the fallout ā from financial losses to reputational damage ā can be severe. By following āstrong password guidelines UKā practices, enforcing them across your organisation, and combining with MFA + password managers, you can raise your security posture significantly.