How to Make a Strong Password: What UK Businesses Really Need 🛡️
- Alex Hughes

- Oct 6, 2025
- 4 min read
Everyone knows by now that setting a strong password is important for account security — but how many businesses actually use one? Shockingly, many don’t. According to recent UK government data, 50% of businesses reported having experienced a cyber security breach or attack in the past 12 months. Even more concerning: 69% of UK small businesses still rely on weak passwords to access important documents.
If you handle sensitive data, customer accounts, or any form of internal systems, weak passwords are simply not an option. Here’s how to get them right — with statistics, best practices, and practical steps.

Why Strong Passwords Matter — And What’s at Risk
43% of UK businesses report some kind of cyber breach or attack in the past year.
Half of businesses (50%) and about one third of charities in the UK say they’ve had a cyber breach or attack in the last 12 months.
81% of corporate data breaches are due to poor password practices.
91% of all passwords found in data breaches are weak or reused.
These aren’t just numbers — they represent real losses: lost trust, regulatory fines (e.g. under UK GDPR), downtime, and financial cost. Just one compromised account can cascade into a large breach via credential reuse, lateral movement, or phishing.
What Makes a Password Strong: Best Practices
Here are the key components that make a password strong — guidelines you should adopt across your business. These align with advice from top cybersecurity authorities (e.g. Microsoft, NCSC, Forrester):
Length + Complexity
The longer, the better. Aim for 12–16 characters minimum, ideally using a mix:
Upper and lower case letters
Numbers
Special characters (e.g. ! @ # $ % ^ & *)Avoid dictionary words, names, or predictable replacements (e.g. “P@ssw0rd!” is better than “password” but still not strong enough if common).
Uniqueness / No Reuse
Every important account should have its own password. Reusing passwords is one of the biggest risk multipliers. If one breach exposes your credentials, attackers often try the same combinations elsewhere (“credential stuffing”).
Avoid Obvious Patterns
Skip sequential characters (123456), adjacent keyboard patterns (qwerty), repeated characters (aaaaaa), or anything that can be guessed with a few tries.
Use Passphrases Where Practical
A string of random words (e.g. “BlueBookHorse92!” or “TulipCoffee7Moon”) can be easier to remember and harder to crack. NCSC (National Cyber Security Centre UK) encourages thinking of memorable but random word combinations.
Enable Multi-factor Authentication (MFA)
Even the strongest password can be compromised; MFA adds a second line of defense (e.g. authentication apps, hardware keys, SMS in some cases).
Use Password Managers
These tools generate long, random, unique passwords for each account and store them securely so users don’t have to remember them. They also reduce the temptation to reuse or simplify.
Regular Audits & Policy Enforcement
It’s not enough to set good standards; you need ongoing enforcement:
periodic checks for weak / reused / old passwords
forced password rotations (carefully, and with user-friendly support)
training & awareness programs so staff understand the risks
UK-Specific Considerations for Businesses
Regulation & Compliance: Under GDPR, you have obligations to protect personal data. A breach due to weak passwords can lead to regulatory penalties.
Insurers & Cyber Risk: Many insurers ask about cybersecurity hygiene as part of underwriting. Having strong password policies and MFA can reduce premiums or improve your terms.
Remote / Hybrid Working: With more people working outside traditional offices, endpoints are more exposed. Weak passwords on personal or shared devices become a huge vulnerability.
Supplier / Partner Access: Your vendors and partners may introduce weak links. Enforce password strength and MFA even for third-party access.
Common Misconceptions & Pitfalls
Misconception | Why it's dangerous |
"I use a complex password, so I don't need MFA" | If that password is reused elsewhere or compromised in a leak, MFA can stop further damage. |
"I'll remember one password for everything to avoid forgetting" | Reuse means broaded exposure. Better to use a password manager. |
"Long uncommon words are safe" | If the words are popular or predictable, they are often in attacker dictionaries. |
"My business is too small to be targeted" | Breaches often happen opportunistically. Hackers don't always target size; they target vulnerability. |
Step‑by‑Step: How Your Business Can Improve Password Security
Draft/Review a Password Policy
Define minimum password strength, rules for reuse, rotation, MFA requirements, and exceptions.
Deploy a Password Manager
Preferably company‑wide. Choose one vetted for enterprise security.
Require MFA on All Sensitive or Access‑Critical Accounts
This includes email, financial systems, HR systems, vendor portals.
Training and Awareness
Regularly remind staff of best practices, share stories of breaches caused by weak credentials, simulate phishing, etc.
Audit & Monitor
Penetration testing
Periodic password audits (e.g. checking for reused or weak passwords)
Monitor for breached credentials (using breach databases)
Stay Updated on Guidance
Follow authoritative sources: UK’s National Cyber Security Centre (NCSC), Microsoft Security, Forrester, etc. Stay aware of new threats, tools, and regulation changes.

Example Checklist
âś… Passwords are at least 12 characters long
âś… Mix of uppercase, lowercase, numbers, special characters
âś… Unique per account / no reuse
✅ Passphrases considered for easy‑to‑remember yet strong options
âś… MFA enabled wherever possible
âś… Password manager adopted
âś… Regular auditing and training
Conclusion
In short: having a strong password is non-negotiable for UK businesses today. Weak passwords are still a leading cause of breaches, and the fallout — from financial losses to reputational damage — can be severe. By following “strong password guidelines UK” practices, enforcing them across your organisation, and combining with MFA + password managers, you can raise your security posture significantly.



