We figure since you’re out to confound the cybercriminals who would misuse your password, it may help to learn how they work!
Past password practices have been discredited. Historically, we’ve all heard or used common techniques such as:
Substituting special characters for letters
Adding digits to common words or names
Using keyboard patterns (like the characters on the top row of your keyboard).
Forcing periodic password changes
Generating random character sequences for the password, which generally leads to the user writing the password down, usually in an insecure manner like a sticky on the monitor.