{"id":1608,"date":"2020-06-11T10:46:00","date_gmt":"2020-06-11T10:46:00","guid":{"rendered":"http:\/\/10.24.225.70\/?p=1608"},"modified":"2020-06-11T10:46:00","modified_gmt":"2020-06-11T10:46:00","slug":"guide-to-password-security-how-to-protect-your-employees","status":"publish","type":"post","link":"https:\/\/complior.se\/en\/guide-to-password-security-how-to-protect-your-employees\/","title":{"rendered":"Guide to password security \u2013 how to protect your employees"},"content":{"rendered":"<p>According to the National Cyber Security Center in the UK, British people have an average of 22 passwords. If you take that number as an indication for the rest of Europe and the world, that\u2019s a lot of passwords! A password is probably the most common security measure used to protect information. Therefore, it is important that they are safe. Here is a guide to password security.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\"><strong>How are passwords hacked?<\/strong><\/h2>\n\n\n\n<p>Passwords can be hacked in a number of ways, (<a href=\"https:\/\/complior.se\/en\/hackers-who-are-they\/\">read about who hackers are<\/a>) and some methods are more complex than others. You may remember the viral image shown below. The image is from the Hawaii Emergency Management Agency and shows a password written on a post-it note.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"887\" height=\"444\" src=\"https:\/\/rdw4.replior.se\/wp-content\/uploads\/2023\/07\/hawaii-password-photo.jpeg\" alt=\"\" class=\"wp-image-51059\" srcset=\"https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/hawaii-password-photo.jpeg 887w, https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/hawaii-password-photo-300x150.jpeg 300w, https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/hawaii-password-photo-768x384.jpeg 768w, https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/hawaii-password-photo-18x9.jpeg 18w\" sizes=\"auto, (max-width: 887px) 100vw, 887px\" \/><\/figure>\n\n\n\n<p>Now, \u201cspying on post-it-notes\u201d may not be the most common way for hackers to access passwords, but it shows how easy it can be. Here are some of the most common techniques hackers use to access passwords.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Shoulder Surfing<\/strong>&nbsp;\u2013 Sometimes something as easy as looking over a shoulder can be enough to find out someone\u2019s password. Shoulder surfing is when someone looks over your shoulder when you type your password. However, shoulder surfing is more common for when stealing credit or debit card PIN numbers, for example when you enter your PIN to make a cash withdrawal at an ATM.<\/p>\n\n\n\n<p><strong>Brute force<\/strong>&nbsp;\u2013 Brute force can be described as a trial-and-error technique. Specialized automated programs guess the correct password by trying billions of different combinations of words, numbers and characters. The Brute Force program can be controlled by the hacker himself, who can control which words the program should especially focus on based on information available about you, such as date of birth, family members, favorite football team, pets etc.<\/p>\n\n\n\n<p><strong>Key logging<\/strong>&nbsp;\u2013 Key logging is a type of malware often spread through email, encouraging you to open suspicious attachments or click on strange links. Once the keylogger is installed on your computer, it will wait for you to start typing on your keyboard. It then logs everything you write and sends this information to hackers, who will then have access to your passwords and other sensitive information.<\/p>\n\n\n\n<p><strong>Social engineering<\/strong>&nbsp;\u2013 Social engineering is an attack where hackers use various techniques to try to manipulate users to reveal their passwords. A common social engineering technique is phishing, where emails appear to come from a trusted sender, such as banks or authorities, so that you will be willing to reveal passwords or bank details. Instead, a hacker is behind the message, and your information is put in danger.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"847\" src=\"https:\/\/rdw4.replior.se\/wp-content\/uploads\/2023\/07\/Password_1-1024x847-1.png\" alt=\"\" class=\"wp-image-51062\" srcset=\"https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/Password_1-1024x847-1.png 1024w, https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/Password_1-1024x847-1-300x248.png 300w, https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/Password_1-1024x847-1-768x635.png 768w, https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/Password_1-1024x847-1-15x12.png 15w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h3 class=\"wp-block-heading has-medium-font-size\"><strong>Ways companies can improve password security<\/strong><\/h3>\n\n\n\n<p>We have reviewed some of the techniques hackers use to access passwords. So the question now is, how can companies improve password security? The first thing to do is to write a password policy. A password policy outlines guidelines on password quality, how to manage passwords, what requirements are required for things like transfer and password storage. Do you need to comply with safety standards such as&nbsp;PCI DSS? Make sure your password policy follows the security standards you must comply with.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Blacklist the most common passwords<\/strong>&nbsp; \u2013 To avoid having employees use simple passwords, a tip is to blacklist common passwords like 123456 and Password1.<\/p>\n\n\n\n<p><strong>Use two-factor authentication<\/strong>&nbsp;\u2013 Strengthen your passwords by using two-factor authentication. Two factor authentication is an additional requirement to see that you are you. The user will be prompted to enter more information after entering his password, such as a code sent via SMS. Two-factor authentication is a good additional security measure for, for example, remote access and administrator accounts.<\/p>\n\n\n\n<p><strong>Use technical solutions to help your employees<\/strong>&nbsp;\u2013 There are, for example, Password Managers that help users create secure passwords, and then keep these encrypted. Single-sign-on solutions can also be implemented to reduce the use of passwords.<\/p>\n\n\n\n<p class=\"has-text-color has-medium-font-size\" style=\"color:#3cc194\"><strong>Do not store passwords in plain text<\/strong>.<\/p>\n\n\n\n<p><strong>Educate your staff<\/strong>&nbsp;\u2013 The safest way to achieve success is to involve the entire organization, and this also applies to password security. Educate your staff about your password policy, encourage them not to use the same password privately at work, help them avoid using simple passwords and teach them the hackers\u2019 tricks they use to steal user data.<\/p>\n\n\n\n<p><strong>Ensure you have other protective mechanisms in place<\/strong>&nbsp;\u2013 Password security is important, but as a company, you also have a responsibility to ensure that access to your business secrets is not dependent on the complexity of one individual\u2019s password. Prioritize security on all levels and have other protective mechanisms in place to protect your sensitive information, such as&nbsp;secure servers, a&nbsp;firewall&nbsp;and an&nbsp;HSM.<\/p>","protected":false},"excerpt":{"rendered":"<p>\t\t\t\t\t\tA password is probably the most common security measure used to protect information. Therefore, it is important that they are safe.<\/p>","protected":false},"author":2,"featured_media":51061,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":3,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_eb_attr":"","inline_featured_image":false,"_uag_custom_page_level_css":"","wpm_timeformat":"","_wpm_styles":"","footnotes":""},"categories":[118],"tags":[117,156],"class_list":["post-1608","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogg","tag-blog","tag-password-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Guide to password security \u2013 how to protect your employees - Complior<\/title>\n<meta name=\"description\" content=\"A password is probably the most common security measure used to protect information. Therefore, it is important that they are safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/complior.se\/en\/guide-to-password-security-how-to-protect-your-employees\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Guide to password security \u2013 how to protect your employees - Complior\" \/>\n<meta property=\"og:description\" content=\"A password is probably the most common security measure used to protect information. Therefore, it is important that they are safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/complior.se\/en\/guide-to-password-security-how-to-protect-your-employees\/\" \/>\n<meta property=\"og:site_name\" content=\"Complior\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-11T10:46:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/Password_1-copy.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1042\" \/>\n\t<meta property=\"og:image:height\" content=\"678\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kikki Bostrom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kikki Bostrom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/complior.se\\\/guide-to-password-security-how-to-protect-your-employees\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/guide-to-password-security-how-to-protect-your-employees\\\/\"},\"author\":{\"name\":\"Kikki Bostrom\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\"},\"headline\":\"Guide to password security \u2013 how to protect your employees\",\"datePublished\":\"2020-06-11T10:46:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/guide-to-password-security-how-to-protect-your-employees\\\/\"},\"wordCount\":783,\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/guide-to-password-security-how-to-protect-your-employees\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Password_1-copy.png\",\"keywords\":[\"Blog\",\"Password security\"],\"articleSection\":[\"Blogg\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/complior.se\\\/guide-to-password-security-how-to-protect-your-employees\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/guide-to-password-security-how-to-protect-your-employees\\\/\",\"name\":\"Guide to password security \u2013 how to protect your employees - Complior\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/guide-to-password-security-how-to-protect-your-employees\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/guide-to-password-security-how-to-protect-your-employees\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Password_1-copy.png\",\"datePublished\":\"2020-06-11T10:46:00+00:00\",\"description\":\"A password is probably the most common security measure used to protect information. Therefore, it is important that they are safe.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/complior.se\\\/guide-to-password-security-how-to-protect-your-employees\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/complior.se\\\/guide-to-password-security-how-to-protect-your-employees\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/guide-to-password-security-how-to-protect-your-employees\\\/#primaryimage\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Password_1-copy.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Password_1-copy.png\",\"width\":1042,\"height\":678,\"caption\":\"Image in cartoon style showing laptop with password open and a lock icon in front\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/complior.se\\\/guide-to-password-security-how-to-protect-your-employees\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/complior.se\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Guide to password security \u2013 how to protect your employees\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/complior.se\\\/#website\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"name\":\"Complior\",\"description\":\"Security beyond compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/complior.se\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\",\"name\":\"Complior\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"width\":2560,\"height\":960,\"caption\":\"Complior\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\",\"name\":\"Kikki Bostrom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"caption\":\"Kikki Bostrom\"},\"url\":\"https:\\\/\\\/complior.se\\\/en\\\/author\\\/kikki\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Guide to password security \u2013 how to protect your employees - Complior","description":"A password is probably the most common security measure used to protect information. Therefore, it is important that they are safe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/complior.se\/en\/guide-to-password-security-how-to-protect-your-employees\/","og_locale":"en_GB","og_type":"article","og_title":"Guide to password security \u2013 how to protect your employees - Complior","og_description":"A password is probably the most common security measure used to protect information. Therefore, it is important that they are safe.","og_url":"https:\/\/complior.se\/en\/guide-to-password-security-how-to-protect-your-employees\/","og_site_name":"Complior","article_published_time":"2020-06-11T10:46:00+00:00","og_image":[{"width":1042,"height":678,"url":"https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/Password_1-copy.png","type":"image\/png"}],"author":"Kikki Bostrom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kikki Bostrom","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/complior.se\/guide-to-password-security-how-to-protect-your-employees\/#article","isPartOf":{"@id":"https:\/\/complior.se\/guide-to-password-security-how-to-protect-your-employees\/"},"author":{"name":"Kikki Bostrom","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016"},"headline":"Guide to password security \u2013 how to protect your employees","datePublished":"2020-06-11T10:46:00+00:00","mainEntityOfPage":{"@id":"https:\/\/complior.se\/guide-to-password-security-how-to-protect-your-employees\/"},"wordCount":783,"publisher":{"@id":"https:\/\/complior.se\/#organization"},"image":{"@id":"https:\/\/complior.se\/guide-to-password-security-how-to-protect-your-employees\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/Password_1-copy.png","keywords":["Blog","Password security"],"articleSection":["Blogg"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/complior.se\/guide-to-password-security-how-to-protect-your-employees\/","url":"https:\/\/complior.se\/guide-to-password-security-how-to-protect-your-employees\/","name":"Guide to password security \u2013 how to protect your employees - Complior","isPartOf":{"@id":"https:\/\/complior.se\/#website"},"primaryImageOfPage":{"@id":"https:\/\/complior.se\/guide-to-password-security-how-to-protect-your-employees\/#primaryimage"},"image":{"@id":"https:\/\/complior.se\/guide-to-password-security-how-to-protect-your-employees\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/Password_1-copy.png","datePublished":"2020-06-11T10:46:00+00:00","description":"A password is probably the most common security measure used to protect information. Therefore, it is important that they are safe.","breadcrumb":{"@id":"https:\/\/complior.se\/guide-to-password-security-how-to-protect-your-employees\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/complior.se\/guide-to-password-security-how-to-protect-your-employees\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/guide-to-password-security-how-to-protect-your-employees\/#primaryimage","url":"https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/Password_1-copy.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/Password_1-copy.png","width":1042,"height":678,"caption":"Image in cartoon style showing laptop with password open and a lock icon in front"},{"@type":"BreadcrumbList","@id":"https:\/\/complior.se\/guide-to-password-security-how-to-protect-your-employees\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/complior.se\/"},{"@type":"ListItem","position":2,"name":"Guide to password security \u2013 how to protect your employees"}]},{"@type":"WebSite","@id":"https:\/\/complior.se\/#website","url":"https:\/\/complior.se\/","name":"Complior","description":"Security beyond compliance","publisher":{"@id":"https:\/\/complior.se\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/complior.se\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/complior.se\/#organization","name":"Complior","url":"https:\/\/complior.se\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/","url":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","width":2560,"height":960,"caption":"Complior"},"image":{"@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016","name":"Kikki Bostrom","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","caption":"Kikki Bostrom"},"url":"https:\/\/complior.se\/en\/author\/kikki\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/Password_1-copy.png",1042,678,false],"thumbnail":["https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/Password_1-copy-150x150.png",150,150,true],"medium":["https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/Password_1-copy-300x195.png",300,195,true],"medium_large":["https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/Password_1-copy-768x500.png",768,500,true],"large":["https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/Password_1-copy-1024x666.png",1024,666,true],"1536x1536":["https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/Password_1-copy.png",1042,678,false],"2048x2048":["https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/Password_1-copy.png",1042,678,false],"trp-custom-language-flag":["https:\/\/complior.se\/wp-content\/uploads\/2023\/07\/Password_1-copy-18x12.png",18,12,true]},"uagb_author_info":{"display_name":"Kikki Bostrom","author_link":"https:\/\/complior.se\/en\/author\/kikki\/"},"uagb_comment_info":0,"uagb_excerpt":"A password is probably the most common security measure used to protect information. Therefore, it is important that they are safe.","_links":{"self":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/1608","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/comments?post=1608"}],"version-history":[{"count":0,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/1608\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media\/51061"}],"wp:attachment":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media?parent=1608"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/categories?post=1608"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/tags?post=1608"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}