Search Help

Create a secure, strong password

Protect yourself online. These password security best practices will help you create a strong and secure password.

Great passwords should...

  • Use upper and lower case letters, symbols, and numbers - The more varied your password is, the harder it is to guess. Use at least one number and one capital letter.
  • Have eight or more characters - Longer passwords are more secure.
  • Not be obvious - Don't use personal information like your name, birthday, or driver's license number.
  • Avoid sequences or repeated characters - Examples: 12345678, 222222, abcdefg, or adjacent characters on your keyboard (QWERTY).
  • Be different than your password for other sites - Otherwise, if someone acquires that one password, they could use it to access your accounts with other sites.

  Tip: See our password requirements for more info on creating a strong password.

Keep your password safe

  • Keep it fresh - Change your password regularly; at least once a year. The more often, the better.
  • Keep it secure - Keep a record of your passwords in a safe place.
  • Don't share it - Never give out your password to anyone, not even friends.
  • Don't recycle them - Create new, unique passwords. Never re-use one from the past.
  • Use antivirus software - Equip your computer with antivirus software.
    • Even if you have a secure password, a computer virus can allow someone to compromise it.
  • Be careful - If you get an email asking you to change your password or provide any personal information, be cautious, even if it appears to come from a legitimate company.
    • Type it in yourself - Rather than clicking a link in such an email, type the site's URL into your browser's address bar.
  • Look for - Only type your sign-in information for Yahoo products into sites that end with "".

Tips for mobile devices

  • Lock it - Many devices can be locked so that the only way to use them is to type in a code or password.
    • Without a lock, lost or stolen devices can easily be used to access your personal information, make calls, or send texts that look like they're coming from you.
Was this article helpful?
Last updated: April 02, 2014