Sylbek Cloud Support >> Home    Cloud Support: Deutsch Cloud Support: English

Create short, secure, and memorable passwords

In this YouTube video, we demonstrate a simple method for creating strong, unique passwords with 10–12 characters for every app and website you use—without using a password manager or writing anything down.


Author: created on 2026-03-03


Thank you


What makes a password strong?

A long password with 16 characters or more is mostly secure. You could use your favorite sentence as a password. While this method is safe, it is not practical to use different sentences for each provider.

The video focuses on short passwords with 10 to 12 characters that are easy to remember and differ by design on the provider. You create a password rule that you can remember and add the provider part at the end, or in the middle as shown in the video.

Preparations for participating in the tutorial

First, create your provider list using the table below as a guide. This is intended to give you some ideas for the provider section.

Creating secure passwords – list of providers

It is important to create a unique password for each provider. The reason why this is important will be explained later.

The video shows how you can create a secure password using a keyboard pattern. The passwords shown were generated to give you an idea of how you can create your other unique passwords.

Generate a strong password using a keyboard pattern


AD-GPO password setting

Such password settings are often found at the customer's site. These GPO settings often also apply to Entra ID in a hybrid environment.

AD password properties – may be valid for Entra ID

If you are the Admin of your company and have such setting, increase the password security. Increase the:
  • Minimum password length
  • Minimum password age
  • Password history

Take a look at some examples of weak passwords that are valid for such GPO settings.
══

══
A hacker could crack such passwords within seconds.

Weak password that may be valid in your AD


How can hackers crack your password?

An attacker could access the platform and steal the whole user database. This has already happened, and it happens every day.
For example, in January 2026, there was a major breach involving 149 million stolen usernames and passwords from multiple providers.
See: google.com/search?q=breach+January+2026+149+Million+passwords.

In such cases, hackers would obtain usernames and password hashes. Then, they perform Offline Attack on the hash using Rule-Based Attacks:
  • They take a list of common names (Tim, Sarah, Summer) or the entire dictionary
  • Their software automatically adds common symbols and digits
  • The generated password Lqqokk2I0] does not contain a dictionary word or a birth year. The hacker's computer must guess every possible combination, which would take thousands of years

Hackers do not use the standard hardware that we use for everyday work. They use hardware optimized for their destructive work, like this:
  • 8x NVIDIA RTX 5090 Offline Cracking Cluster
  • Hardware: 8 high-end GPUs linked together
  • Hash Rate: Approximately 100 billion to 500 billion guesses per second
  • Energy Consumption: 3,000 – 4,000 Watts

The estimated results of the offline attack are listed below. The main reason for these huge differences between weak passwords and our generated passwords is that our generated passwords do not contain words from the dictionary or groups of numbers (dates or years).

Hacker Offline Attack - Cracking Time



How to protect your login data

The video explains why you cannot protect your username or email address.
If you created your unique password using the keyboard pattern, you havve already done most of the work required to create secure passwords.

Be aware that your strong password can still be stolen through phishing attacks. Regarding phishing, never click on login links in emails. Open the website manually, then sign in.
If you have lost your password for an account, change it, even if you use MFA. You do not need to change any other passwords, as these are 100% different as hashes, even if they only differ by 1–2 characters.

The video ends with the following key message:
We all need to do more to improve security, even though it can never be 100% secure. Think about it: attackers want to achieve their goals with as little effort.
If breaking into your account or organization takes too much time or work, they are more likely to move on and look for an easier target.

Thank you for contacting us about this topic and M365 in general.




Contact and Support
☏ +49 721 66980 610


Write to us,
you can expect an answer on the same or next working day.



Your message

This message is sent encrypted with TLS 1.2




Get together and talk
We would be happy if you pick a time (right here) and arrange a free online meeting with us via Microsoft Teams. For example, we could talk about whether you can optimise your M365 licenses and reduce costs.

Customer support
We are here to help you with any questions you may have about Microsoft 365 and Azure. You can count on our support at fair prices in the range of 75-95 EUR per hour. We can use your ticket system or our support Jira ServiceDesk, see sample ticket.

You will be supported by security experts who continuously update their Microsoft skills and prove them with manufacturer certificates. This is a MUST for us to keep customer support at the highest level and up to date with the latest technology.


Copyright Copyright 2003 - 2026  Sylbek Cloud Support
Your IP 216.73.216.181, your resolution , our time 20:31:18