{"id":91743,"date":"2024-10-07T16:11:22","date_gmt":"2024-10-07T08:11:22","guid":{"rendered":"https:\/\/version-2.com\/?p=91743"},"modified":"2024-10-02T16:13:55","modified_gmt":"2024-10-02T08:13:55","slug":"five-strong-password-ideas-to-boost-your-security","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/10\/five-strong-password-ideas-to-boost-your-security\/","title":{"rendered":"Five strong password ideas to boost your security"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"91743\" class=\"elementor elementor-91743\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2493f1c elementor-widget elementor-widget-text-editor\" data-id=\"2493f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/3486c243c1\/5-password-ideas-to-boost-your-security.png\/m\/1080x0\/filters:quality(60):format(avif)\" width=\"1080\" height=\"607\" \/><\/p><div class=\"Article_wrapper__8_7eU [&amp;&gt;&lt;p&gt;*+*]:mt-12\"><div class=\"richtext\"><h2 id=\"what-is-a-good-password\" class=\"heading-xl\"><b>What is a good password?\u00a0<\/b><\/h2><p class=\"body-md\">You might think that the answer to this question would be very subjective, but that\u2019s far from the case. In simplest terms, a good password is one that\u2019s difficult to crack. The stronger your password is, the better it works to protect your accounts from hackers and other malicious actors. A strong, reliable password can sometimes take millions of years to crack, which means that the hackers are less likely to even try to gain them.<\/p><p class=\"body-md\">When you\u2019re thinking of good password ideas, you need to keep the following criteria in mind:<\/p><ul class=\"leading-normal List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">The password should be at least 12-15 characters long.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">It should use a combination of letters, numbers, and special characters. Spaces are also allowed.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">It should not be a common word, product, character, name, or anything you can easily find in a dictionary.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">It should be a combination that only you know and others could not easily predict. We\u2019ll cover some creative password ideas shortly.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Each password should be unique and you shouldn\u2019t reuse them for several accounts. If a password you use on several platforms is cracked, that puts all of your accounts at risk.<\/p><\/li><\/ul><h2 id=\"what-is-considered-a-weak-password\" class=\"heading-xl\"><b>What is considered a weak password?<\/b><\/h2><p class=\"body-md\">Weak passwords consist of sequential letters or numbers, are fewer than eight characters long, or use common words and phrases. The most popular passwords are well-known by malicious actors and are usually what they try first.<\/p><p class=\"body-md\">According to NordPass\u2019 annual top 200 most common passwords list, <b>\u201c123456\u201d<\/b> and <b>\u201cpassword\u201d<\/b> are the most commonly used and vulnerable passwords. Another example of a weak password would be using the name of a fictional character like <b>\u201cSuperman,\u201d<\/b> <b>\u201cBatman,\u201d<\/b> or <b>\u201cJoker.\u201d<\/b><\/p><h3 id=\"examples-of-bad-passwords\" class=\"heading-lg\"><b>Examples of bad passwords<\/b><\/h3><p class=\"body-md\">Here are some more examples of weak, easy-to-crack passwords:<\/p><ul class=\"leading-normal List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">123456789<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">abc123<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">qwerty<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">iloveyou<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">hello<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">computer<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">password123<\/p><\/li><\/ul><p class=\"body-md\">If you\u2019re wondering whether your passwords might be weak links, <a class=\"cursor-pointer focus-visible:outline-none focus-visible:shadow-focus transition-colors duration-250 ease-out text-teal-700 hover:text-teal-600 active:text-teal-800\" href=\"\/en\/most-common-passwords-list\/\" data-ga-slug=\"Link to \/most-common-passwords-list\/\" data-link-full-refresh=\"true\">check out the list of the top 200 most common passwords<\/a>. You\u2019ll find even more examples, as well as some fun facts about the most common passwords around the world.<\/p><p>\u00a0<\/p><\/div><div class=\"richtext\"><h2 id=\"the-most-common-password-cracking-techniques\" class=\"heading-xl\"><b>The most common password-cracking techniques<\/b><\/h2><h3 id=\"brute-force-attack\" class=\"heading-lg\"><b>Brute-force attack<\/b><\/h3><p class=\"body-md\">During a <a class=\"cursor-pointer focus-visible:outline-none focus-visible:shadow-focus transition-colors duration-250 ease-out text-teal-700 hover:text-teal-600 active:text-teal-800\" href=\"\/en\/blog\/brute-force-attack\/\" data-ga-slug=\"Link to \/blog\/brute-force-attack\/\">brute-force attack<\/a>, a malicious actor uses software that tries every possible combination to find the right one. An eight-character password consisting of upper- and lowercase letters, numbers, and special characters can be cracked in just two hours. Good passwords will take months or even years to break through, depending on their uniqueness and complexity.<\/p><h3 id=\"dictionary-attack\" class=\"heading-lg\"><b>Dictionary attack<\/b><\/h3><p class=\"body-md\">While brute-force attacks try various combinations of special characters, numbers, and letters, a <a class=\"cursor-pointer focus-visible:outline-none focus-visible:shadow-focus transition-colors duration-250 ease-out text-teal-700 hover:text-teal-600 active:text-teal-800\" href=\"\/en\/blog\/what-is-a-dictionary-attack\/\" data-ga-slug=\"Link to \/blog\/what-is-a-dictionary-attack\/\" data-link-full-refresh=\"true\">dictionary attack<\/a> uses a program that goes through a prearranged list of words. Essentially, if your password can be found in a dictionary, specialized software can easily crack it.<\/p><h3 id=\"phishing\" class=\"heading-lg\"><b>Phishing<\/b><\/h3><p class=\"body-md\"><a class=\"cursor-pointer focus-visible:outline-none focus-visible:shadow-focus transition-colors duration-250 ease-out text-teal-700 hover:text-teal-600 active:text-teal-800\" href=\"\/en\/blog\/what-is-phishing\/\" data-ga-slug=\"Link to \/blog\/what-is-phishing\/\">Phishing<\/a> is a social engineering method to trick people into revealing their credentials. Phishing attacks often use email services as a medium: hackers send emails pretending to be reputable sources and refer users to fake login pages. A user then inputs their login credentials themselves and inadvertently grants this information to the hackers.<\/p><h3 id=\"credential-stuffing\" class=\"heading-lg\"><b>Credential stuffing<\/b><\/h3><p class=\"body-md\"><a class=\"cursor-pointer focus-visible:outline-none focus-visible:shadow-focus transition-colors duration-250 ease-out text-teal-700 hover:text-teal-600 active:text-teal-800\" href=\"\/en\/blog\/what-is-credential-stuffing\/\" data-ga-slug=\"Link to \/blog\/what-is-credential-stuffing\">Credential stuffing<\/a> is a popular method for hackers to gain access by collecting usernames and passwords used in previous attacks and trying them on other platforms. This method often proves successful because people tend to reuse the same password for all their accounts.<\/p><h3 id=\"keylogging\" class=\"heading-lg\"><b>Keylogging<\/b><\/h3><p class=\"body-md\"><a class=\"cursor-pointer focus-visible:outline-none focus-visible:shadow-focus transition-colors duration-250 ease-out text-teal-700 hover:text-teal-600 active:text-teal-800\" href=\"\/en\/blog\/what-is-keylogger\/\" data-ga-slug=\"Link to \/blog\/what-is-keylogger\/\" data-link-full-refresh=\"true\">Keylogging<\/a> involves a specific type of malware, known as keylogger, infecting the victim\u2019s device. The keylogger can then track the user\u2019s keystrokes and device activity, depending on the software and the device. This can include copied and pasted data, phone calls, location, and screenshots. Using this information, hackers can easily access passwords and other sensitive information, allowing them to launch further attacks on the individual or data from their place of work.<\/p><h2 id=\"how-to-create-a-strong-password\" class=\"heading-xl\"><b>How to create a strong password<\/b><\/h2><ul class=\"leading-normal List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">The longer your password is, the better. Many websites ask you to create eight-character passwords, but we recommend going for at least 15 characters.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Avoid ties to your personal information, such as your name, surname, address, or date of birth.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Use a combination of numbers, symbols, and upper- and lowercase letters in random order.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Don\u2019t use sequential letters and numbers.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Avoid substitution: <b>\u201ckangaroo\u201d<\/b> and <b>\u201ck@ng@r00\u201d<\/b> are both equally weak passwords, and a brute-force attack can easily crack them.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Don\u2019t reuse the same password for multiple accounts.<\/p><\/li><\/ul><p class=\"body-md\"><a class=\"cursor-pointer focus-visible:outline-none focus-visible:shadow-focus transition-colors duration-250 ease-out text-teal-700 hover:text-teal-600 active:text-teal-800\" href=\"\/en\/secure-password\/\" data-ga-slug=\"Link to \/secure-password\/\" data-link-full-refresh=\"true\">With our free password security tool<\/a>, you can check your password strength and if it has been exposed in any data breaches. You can also try the <a class=\"cursor-pointer focus-visible:outline-none focus-visible:shadow-focus transition-colors duration-250 ease-out text-teal-700 hover:text-teal-600 active:text-teal-800\" href=\"\/en\/features\/password-health-report\/\" data-ga-slug=\"Link to \/features\/password-health-report\">Password Health<\/a> feature with NordPass Premium. It scans all passwords that you\u2019ve saved in your Vault and checks for vulnerabilities.<\/p><h2 id=\"top-5-strong-password-ideas\" class=\"heading-xl\"><b>Top 5 strong password ideas<\/b><\/h2><p class=\"body-md\">Coming up with a strong and unique password can be a challenge. To make this process easier for you, we\u2019ve gathered some examples that will help protect your data and accounts from being breached and taken over. We\u2019ve also included some formulas and passphrase examples that you can try yourself. However, we highly recommend you don\u2019t use the example passwords for your accounts.<\/p><h3 id=\"1-shorten-each-word\" class=\"heading-lg\"><b>1. Shorten each word<\/b><\/h3><p class=\"body-md\">Think of a phrase and remove the first three letters of each word (in some cases, that might mean deleting full words, but that\u2019s fine):<\/p><p class=\"body-md\"><b>\u201cLaptop running free in the jungle\u201d -&gt; \u201ctop ning e gle\u201d<\/b><\/p><p class=\"body-md\">Sounds like gibberish? That\u2019s exactly what we want. Just don\u2019t forget to add special characters and numbers to make it more complicated. It would take 94,000 years to crack this password.<\/p><h3 id=\"2-create-your-own-formula\" class=\"heading-lg\"><b>2. Create your own formula<\/b><\/h3><p class=\"body-md\">Create a formula that will help you remember the password. For example, you can take a phrase and replace every letter with the next one in the alphabet:<\/p><p class=\"body-md\"><b>\u201cCucumbers are tasty\u201d -&gt; \u201cdvdvncfst bsf ubtuz\u201d<\/b><\/p><p class=\"body-md\">Another clever way of creating strong passwords is to turn song lyrics into acronyms. This means using only the first letter of each line of your favorite song.<\/p><p class=\"body-md\">So, <b>\u201cShine on you crazy diamond\u201d<\/b> by Pink Floyd becomes <b>\u201crsnsybccystswrcc.\u201d<\/b><\/p><p class=\"body-md\">The time needed to crack this password is 746 million years.<\/p><h3 id=\"3-play-with-the-vowels\" class=\"heading-lg\"><b>3. Play with the vowels<\/b><\/h3><p class=\"body-md\">This one is much easier to implement and memorize: take a random nonsensical phrase and replace one vowel with another (for example, \u201ca\u201d with \u201ce\u201d):<\/p><p class=\"body-md\"><b>\u201cA car is floating in a pan\u201d -&gt; \u201ce cer is floeting in e pen\u201d<\/b><\/p><p class=\"body-md\">Don\u2019t forget \u2013 <b>spaces are allowed in passwords<\/b>, and we highly encourage you to use them. The combination of having spaces and switching the vowels around means the above password would take 583 million trillion years to crack.<\/p><h3 id=\"4-mix-the-codes-of-your-favorite-countries\" class=\"heading-lg\"><b>4. Mix the codes of your favorite countries<\/b><\/h3><p class=\"body-md\">This one is quite fun and easy to memorize. You will always generate good passwords with this method. Simply make a list of the ISO codes of your favorite countries and put them together:<\/p><p class=\"body-md\"><b>\u201cMexico, Ireland, France, Germany, Japan\u201d -&gt; \u201cmex irl fra deu jpn\u201d<\/b><\/p><p class=\"body-md\">You wouldn\u2019t think so, but a hacker would require a staggering six thousand trillion years to crack this password!<\/p><p class=\"body-md\">If you want to spice things up and make them even more difficult to crack, you can also add each country\u2019s calling code:<\/p><p class=\"body-md\"><b>\u201cmex54 irl353 fra33 deu49 jpn81\u201d<\/b><\/p><p class=\"body-md\">Such a password would take 12 decillion years years to crack. How impressive is that?<\/p><h3 id=\"5-use-a-password-manager\" class=\"heading-lg\"><b>5. Use a password manager<\/b><\/h3><p class=\"body-md\">If creating and remembering random phrases for all your accounts seems too complicated, you can use a password manager, such as <a class=\"cursor-pointer focus-visible:outline-none focus-visible:shadow-focus transition-colors duration-250 ease-out text-teal-700 hover:text-teal-600 active:text-teal-800\" href=\"\/en\/password-manager\/\" data-ga-slug=\"Link to \/password-manager\/\" data-link-full-refresh=\"true\">NordPass<\/a>. It\u2019s an easy-to-use app that lets you generate strong, unique passwords and securely store them in an encrypted Vault. You can also easily use NordPass to autofill online forms and fields.<\/p><p class=\"body-md\">You can add as many passwords as you need and access them from any device. This way, you can get the best of both worlds by combining your creative password ideas with one-of-a-kind secure ones created by the password manager for each account without the risk of forgetting them. You can use a <a class=\"cursor-pointer focus-visible:outline-none focus-visible:shadow-focus transition-colors duration-250 ease-out text-teal-700 hover:text-teal-600 active:text-teal-800\" href=\"\/en\/password-manager\/\" data-ga-slug=\"Link to \/password-manager\/\" data-link-full-refresh=\"true\">special code<\/a> and get an additional month of NordPass Premium for free when you purchase a two-year plan.<\/p><h2 id=\"additional-tips\" class=\"heading-xl\"><b>Additional tips<\/b><\/h2><p class=\"body-md\">Here are some more tips to keep in mind when you\u2019re looking for good password ideas:<\/p><ul class=\"leading-normal List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">In order to protect your data, remember that passwords must be difficult to predict. Including special characters and spaces increases the time it takes for your password to be cracked.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Take your phone security into consideration. According to <a class=\"cursor-pointer focus-visible:outline-none focus-visible:shadow-focus transition-colors duration-250 ease-out text-teal-700 hover:text-teal-600 active:text-teal-800\" href=\"https:\/\/arxiv.org\/abs\/1709.04959\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Link to https:\/\/arxiv.org\/abs\/1709.04959\" data-link-full-refresh=\"true\">research<\/a>, pattern locks are successfully replicated around 64% of the time. Instead, set up a PIN or use our guide to generate some strong phone password ideas.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Don\u2019t forget to implement new password ideas for work. Don\u2019t reuse your personal passwords because if they ever get breached, your work accounts could be in danger, too.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md\">Always use <a class=\"cursor-pointer focus-visible:outline-none focus-visible:shadow-focus transition-colors duration-250 ease-out text-teal-700 hover:text-teal-600 active:text-teal-800\" href=\"\/en\/blog\/what-is-multi-factor-authentication\/\" data-ga-slug=\"Link to \/blog\/what-is-multi-factor-authentication\">multi-factor authentication<\/a> (MFA). Even if your password is definitively strong, accidents can happen and your first line of defense might be breached. Using MFA means that no one can access your accounts without accessing your authentication device. <a class=\"cursor-pointer focus-visible:outline-none focus-visible:shadow-focus transition-colors duration-250 ease-out text-teal-700 hover:text-teal-600 active:text-teal-800\" href=\"\/en\/business-password-manager\/\" data-ga-slug=\"Link to \/business-password-manager\/\">NordPass<\/a> uses <a class=\"cursor-pointer focus-visible:outline-none focus-visible:shadow-focus transition-colors duration-250 ease-out text-teal-700 hover:text-teal-600 active:text-teal-800\" href=\"\/en\/features\/mfa\/\" data-ga-slug=\"Link to \/features\/mfa\/\" data-link-full-refresh=\"true\">multi-factor authentication<\/a> to add an additional layer of security to your password vault.<\/p><\/li><\/ul><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63567\" class=\"elementor elementor-63567\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45e3ec76 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"45e3ec76\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-311e216d\" data-id=\"311e216d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d9a2e6f elementor-widget elementor-widget-text-editor\" data-id=\"3d9a2e6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordPass<br \/><\/strong>NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51a2bcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51a2bcf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c73a037\" data-id=\"c73a037\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-821bef5 elementor-widget elementor-widget-spacer\" data-id=\"821bef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>What is a good password?\u00a0 You might think that the answ [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1129,1273,61],"tags":[974,1131,1272],"class_list":["post-91743","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-nordpass","category-1273","category-press-release","tag-nord-security","tag-nordpass","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Five strong password ideas to boost your security - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordpass.com\/blog\/5-strong-password-ideas\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Five strong password ideas to boost your security - Version 2\" \/>\n<meta property=\"og:description\" content=\"What is a good password?\u00a0 You might think that the answ [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordpass.com\/blog\/5-strong-password-ideas\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-07T08:11:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/3486c243c1\/5-password-ideas-to-boost-your-security.png\/m\/1080x0\/filters:quality(60):format(avif)\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/5-strong-password-ideas\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/five-strong-password-ideas-to-boost-your-security\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Five strong password ideas to boost your security\",\"datePublished\":\"2024-10-07T08:11:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/five-strong-password-ideas-to-boost-your-security\\\/\"},\"wordCount\":1501,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/5-strong-password-ideas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x597\\\/3486c243c1\\\/5-password-ideas-to-boost-your-security.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\",\"keywords\":[\"Nord Security\",\"NordPass\",\"2024\"],\"articleSection\":[\"Nord Security\",\"NordPass\",\"2024\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/five-strong-password-ideas-to-boost-your-security\\\/\",\"url\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/5-strong-password-ideas\\\/\",\"name\":\"Five strong password ideas to boost your security - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/5-strong-password-ideas\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/5-strong-password-ideas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x597\\\/3486c243c1\\\/5-password-ideas-to-boost-your-security.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\",\"datePublished\":\"2024-10-07T08:11:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/5-strong-password-ideas\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordpass.com\\\/blog\\\/5-strong-password-ideas\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/5-strong-password-ideas\\\/#primaryimage\",\"url\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x597\\\/3486c243c1\\\/5-password-ideas-to-boost-your-security.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\",\"contentUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x597\\\/3486c243c1\\\/5-password-ideas-to-boost-your-security.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/5-strong-password-ideas\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Five strong password ideas to boost your security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Five strong password ideas to boost your security - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordpass.com\/blog\/5-strong-password-ideas\/","og_locale":"en_US","og_type":"article","og_title":"Five strong password ideas to boost your security - Version 2","og_description":"What is a good password?\u00a0 You might think that the answ [&hellip;]","og_url":"https:\/\/nordpass.com\/blog\/5-strong-password-ideas\/","og_site_name":"Version 2","article_published_time":"2024-10-07T08:11:22+00:00","og_image":[{"url":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/3486c243c1\/5-password-ideas-to-boost-your-security.png\/m\/1080x0\/filters:quality(60):format(avif)","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordpass.com\/blog\/5-strong-password-ideas\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/10\/five-strong-password-ideas-to-boost-your-security\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Five strong password ideas to boost your security","datePublished":"2024-10-07T08:11:22+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/10\/five-strong-password-ideas-to-boost-your-security\/"},"wordCount":1501,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordpass.com\/blog\/5-strong-password-ideas\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/3486c243c1\/5-password-ideas-to-boost-your-security.png\/m\/1080x0\/filters:quality(60):format(avif)","keywords":["Nord Security","NordPass","2024"],"articleSection":["Nord Security","NordPass","2024","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/10\/five-strong-password-ideas-to-boost-your-security\/","url":"https:\/\/nordpass.com\/blog\/5-strong-password-ideas\/","name":"Five strong password ideas to boost your security - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordpass.com\/blog\/5-strong-password-ideas\/#primaryimage"},"image":{"@id":"https:\/\/nordpass.com\/blog\/5-strong-password-ideas\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/3486c243c1\/5-password-ideas-to-boost-your-security.png\/m\/1080x0\/filters:quality(60):format(avif)","datePublished":"2024-10-07T08:11:22+00:00","breadcrumb":{"@id":"https:\/\/nordpass.com\/blog\/5-strong-password-ideas\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordpass.com\/blog\/5-strong-password-ideas\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordpass.com\/blog\/5-strong-password-ideas\/#primaryimage","url":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/3486c243c1\/5-password-ideas-to-boost-your-security.png\/m\/1080x0\/filters:quality(60):format(avif)","contentUrl":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/3486c243c1\/5-password-ideas-to-boost-your-security.png\/m\/1080x0\/filters:quality(60):format(avif)"},{"@type":"BreadcrumbList","@id":"https:\/\/nordpass.com\/blog\/5-strong-password-ideas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Five strong password ideas to boost your security"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-nRJ","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/91743","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=91743"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/91743\/revisions"}],"predecessor-version":[{"id":91750,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/91743\/revisions\/91750"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=91743"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=91743"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=91743"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}