Most password advice you have heard is outdated, wrong, or both. The rules you learned — change every 90 days, must have uppercase + number + symbol, never write them down — were formally abandoned by NIST in 2017. Here is what the evidence actually says about password security in 2026.
Status: Officially debunked by NIST since 2017.
NIST Special Publication 800-63B, the U.S. government's authoritative digital identity guideline, states that verifiers "SHALL NOT require memorized secrets to be changed arbitrarily (e.g., periodically)." The reasoning is empirical: when forced to change passwords regularly, people make minimal, predictable modifications.
What actually happens with 90-day rotation:
What to do instead: Use a strong, unique password and change it only when there is evidence of compromise — a breach notification, suspicious account activity, or knowledge that the password was shared or exposed.
Status: Counterproductive. NIST recommends against composition rules.
Complexity requirements produce passwords like "Password1!" and "Welcome2026#" — technically compliant but trivially crackable. The requirements give users a false sense of security while steering them toward the exact patterns attackers expect.
| Required Pattern | What People Actually Type | Crack Time |
|---|---|---|
| Must have uppercase | Capitalize the first letter — Password | Instant (in every wordlist) |
| Must have a number | Add 1 or year at end — Password2026 | Minutes (rule-based attack) |
| Must have a symbol | Add ! or @ at end — Password2026! | Minutes (rule-based attack) |
| All of the above | P@ssw0rd1! or Summer2026# | Minutes (common pattern) |
What to do instead: Focus on length and randomness. A 16-character lowercase password created by a random generator is stronger than any 8-character "complex" password a human invents. If a site forces composition rules, use a password manager to generate a random password that meets the requirements.
Status: Writing them down is actually fine if stored securely.
The "never write down" advice comes from a corporate IT era where the threat was a coworker reading your sticky note. In 2026, the real threats are remote: credential stuffing from data breaches, phishing emails, keyloggers, and brute-force attacks on leaked hash databases.
A password written on paper and stored in a wallet or locked drawer is:
The exception: do not put passwords on a sticky note attached to your monitor in a shared office. That is still bad. A locked drawer, a home safe, or a wallet are all reasonable.
What to do instead: Use a password manager for most accounts. For your master password or backup recovery codes, a written copy in a secure physical location is a legitimate backup strategy recommended by security experts including NIST.
Status: Security questions are the weakest authentication method still in use.
Consider the standard security questions and how easily they are answered:
| Security Question | Where the Answer Lives | Attack Difficulty |
|---|---|---|
| Mother's maiden name | Ancestry.com, Facebook, public records | Trivial — publicly available |
| City where you were born | Social media profiles, LinkedIn | Trivial — commonly shared |
| Name of first pet | Social media posts, "What was your first pet?" Facebook quiz | Trivial — people post this voluntarily |
| High school attended | LinkedIn, Facebook, Classmates.com | Trivial — publicly available |
| Favorite movie | Social media posts, review histories | Easy — limited common answers |
| Make of first car | Social media, family posts | Moderate — but limited options |
What to do instead: If a service requires security questions, treat the answers as secondary passwords. Enter random strings ("What city were you born in?" → "correct-horse-stapler-7") and store the answers in your password manager. Never use truthful answers.
Strip away the myths and outdated rules. Here is what genuinely protects your accounts in 2026, ranked by impact:
When a service gets breached — and they do, regularly — attackers take the leaked credentials and try them on every other service. This is credential stuffing, and it is the #1 way accounts get compromised. If your Netflix password is the same as your banking password, a Netflix breach compromises your bank.
A password manager makes this trivial. Generate a unique random password for every account. You never type them, never see them, never need to remember them.
A password manager is the single tool that makes everything else on this list practical. Without one, unique random passwords per account is an impossible ask — nobody memorizes 200 random strings. With one, it is effortless.
Recommended: Bitwarden (free, open-source), 1Password (paid, polished), or KeePassXC (local-only, maximum control).
2FA protects against the attacks that password strength cannot prevent:
Hardware keys (YubiKey, Titan) > TOTP apps (Authy, Google Authenticator) > SMS codes. All are better than nothing.
For passwords you generate randomly (via a manager): 16+ characters is more than sufficient for any current or foreseeable threat. For passphrases you memorize (your master password): 5-6 random words gives excellent entropy.
Use the Password Strength Checker to verify your master password and any passwords you manually create.
Subscribe to Have I Been Pwned notifications for your email addresses. When a breach includes your email, change the password for that service immediately. If you used that password elsewhere (hopefully you did not after reading point #1), change it everywhere.
Passkeys (FIDO2/WebAuthn) are the technology that will eventually replace passwords entirely. They are already supported by Apple, Google, and Microsoft. A passkey is a cryptographic key pair stored on your device — you authenticate with biometrics (fingerprint, face) or a device PIN. No password to remember, nothing to phish, unique per site by design.
The timeline: major platforms support passkeys now, but most websites have not implemented them yet. Full adoption is likely 5-10 years away. Until then, strong passwords + password manager + 2FA is the standard.
Start with the basics — check your most important password right now.
Check Your Password