Passwords

What should a secure password look like?

The most important properties of a secure password are length (number of characters) and complexity (number of character types: lowercase letters, uppercase letters, numbers, special characters). The BSI (German Federal Office for Information Security) recommends:

20–25 characters using two types of characters
8–12 characters using four types of characters
8 characters using three types of characters if 2FA is used

In addition, a password should not consist of mnemonic hints such as a child’s birth year, the name of a pet, or other words from a dictionary. However, it is possible to use 5–7 randomly chosen words separated by spaces, hyphens (-), or underscores (_).

Example:

Blueberry-Juice-Concentrate-Straight-Oligarchy-Fahrenheit

In the event that providers become victims of a data leak, different passwords should be used for each account.

How can I make my account even more secure? Should I change my password regularly?

It is no longer recommended to change your password regularly. It can lead to choosing simpler, easier-to-guess passwords. However, if a provider becomes a victim of a data leak, the password should be changed once. Changing the password also does no harm if it is found to be insecure or frequently reused.

Instead, it is more sensible to rely on 2FA or to completely eliminate passwords by using passkeys.

What is two-factor authentication (2FA) or multi-factor authentication (MFA)?

Authentication simply means that when logging in, you prove to the provider that the specified account actually belongs to you. This is done using the following authentication factors:

Possession (for example a code on your phone)
Knowledge (for example a PIN or password)
Biometrics (for example a fingerprint)

With 2FA, two of these factors are used. For example, a password is entered (knowledge) and a fingerprint is scanned (biometrics).

What is a passkey?

The term describes a way to authenticate without using a password. The device you use to log in stores a private key that corresponds to a public key held by the provider. Once passkey authentication is set up, a fingerprint scan can be used, for example. This covers at least two factors (in this case possession and biometrics). It is possible to create physical backups or synchronize keys with the cloud to be protected in case the key is lost.

Currently, not many services support passkeys.

How do I use passkeys?

To set up passkeys for login, you need an authenticator (attention: not to be confused with authenticator apps [reference to question about auth apps]). This can be a so-called hardware token, for example a FIDO2 key. In this case, you have a USB device that handles the generation and storage of passkeys.

Alternatively, software can be used. Which one is needed depends on the operating system being used. The Consumer Advice Center NRW has created a comparison:

Operating systems/
manufacturers

Authenticator module Storage location Backup Synchronization between multiple devices? Can it be used with systems from other manufacturers?
Apple iCloud-Keychain Cloud iCloud-Keychain yes yes
Google (Android) Google Password manager Cloud Google Password manager yes yes
Windows TPM (secure hardware module of the device) local Backup via password as fallback solution or FIDO2 security key no yes

Consumer Advice Center NRW, article from April 25, 2024, accessed May 28, 2025.

What can I do to remember passwords?

Passwords should not be written down unencrypted, either physically or digitally. It is recommended to use a password manager (for example KeePass, NordPass). This not only allows you to securely store passwords in encrypted form, but also alerts you to duplicate or insecure passwords. An integrated password generator is also available.

There are also various ways to make remembering individual passwords easier. For example, you can think of a long sentence and use the first letters of the words and punctuation marks as the password.

Example:

Netzmelden is an innovative platform of youthprotect e.V. dedicated to protecting and supporting young people in the digital space.

→ Niaipoye.V.dtpasypitds

Now you can replace some letters with numbers (for example e → 3, i → 1)

→ N1a1p0ye.V.dtpa5yp1ds.

What are authenticator apps and which ones exist?

Authenticator apps can be used to make your account even more secure. After entering your password, you open an app on your phone, for example, where a code is available for each registered provider. This code updates regularly. To set this up, you must first configure your account with the respective provider. You will receive a QR code to scan or a numeric code to enter.

This means you are not only relying on the knowledge factor (password) but also on the possession factor (phone). As a rule, the app also provides the option to create backups to ensure you are protected if the device is lost.

We recommend one of the following authenticator apps:

  • Microsoft Authenticator
+ -
No separate account required, but you can use your Microsoft account

No support for wearables

Integrated password manager  
  • Google Authenticator
+ -
Supported by many providers Backups are complicated

No account required, but can manage multiple Google accounts

Collects a large amount of data
  Security questionable, vulnerabilities were discovered in 2020
 

Very short codes

  • Stratum
+ -
Can be used offline

Only available for Android

Very simple backups  

Does not collect data

 
  • Authy
+ -
Supported by many providers

Transferring tokens (codes received from providers) is complicated

Can also be used on PC  

Can be used on multiple devices

 

I can’t remember my passwords. What can I do?

In this case, using a password manager is recommended. All passwords you use can be stored there. They are protected with a master password and stored in encrypted form.

Browsers offer the option to store passwords. However, this feature should not be used, as passwords are often stored unencrypted or insecurely encrypted. In the worst case, malware or hackers can easily extract them.

We recommend one of the following password managers:

  • Nordpass
+ -
Easy to use

No local backups

Very secure

Expensive, free version rather limited
 

Android and iOS versions collect data

  • KeePass
+ -
Free with very good features Passwords are not checked for security
Synchronization across multiple password sources

Difficult for beginners

Supports security keys, passkeys, and 2FA

 

 
  • Bitwarden
+ -
Good free version

Password sharing is insecure

Easy to use

 
  • Proton Pass

 

More Articles