That long password isn’t keeping you better protected
June 8, 2022
|
4
min read

Highlights
Think long and strong is the killer combination when it comes to password security? You’re wrong. Even a 15-character password is at risk of being hacked. Our latest tech update explains why
How secure do you think your passwords are? Do you believe that longer is always better? Well, we have some news for you. It's time for a serious talk about password security.
New research has revealed a sobering truth – even passwords that are 15 characters long can be compromised. Yes, you read that right. It's time to face the stark reality… length doesn't always mean strength.
The eight-character password reigns supreme as the most compromised length of the password. But don't breathe a sigh of relief if yours is longer. The 15-character password also appears in the top ten most compromised lengths.
You might ask, "How could this be?" The answer lies not only in the password length but also in the content of the password and whether you use the same password on multiple sites.
The most compromised eight-character password is none other than "password" itself, while the most compromised 15-character password is "Sym_newhireOEIE".
Doesn’t exactly feel secure.
It's not just about individual people. Businesses like yours are at high risk too. An alarming 86% of all cyber attacks start with stolen credentials. That's nearly nine out of ten attacks. Can you afford to be complacent?
Sure, longer passwords do offer more resistance to brute force cracking. An eight-character password can be cracked in five minutes, while a good 15-character one could take up to 37 million years if it’s not following any obvious pattern (i.e., it’s random and uses many types of character). Impressive, isn't it?
But remember, this is just one piece of the puzzle. Length alone won't save you from stolen credentials via phishing attacks.
Use a robust business password manager. Not only will it randomly generate long passwords for you, but it will also remember them and fill in the login box for you.
You should also use two factor authentication, where you generate a code on a separate device to prove it’s you. Even if cyber criminals crack your password, they still won’t be able to access your data.
If you need help keeping your business better protected, get in touch.
Tell us about yourself so we can serve you best.
Got a question?
More articles
.png)
This special edition of our Leading London series brings together the partners behind the rollout of the City of London Corporation’s new unified network, a major upgrade designed to strengthen public services and improve connectivity across the Square Mile and beyond.
The panel included:
- Sam Collins, Assistant Director of Digital and Data, City of London Corporation
- Chelsea Chamberlin, Chief Technology Officer, Roc Technologies
- Scott McKinnon, Chief Security Officer, Palo Alto Networks
- Rhod Morgan, Chief Operations Officer, Vorboss
- Elliot Townsend, Senior Director, Juniper Networks
- Christa Elizabeth Norton, Marketing Director, Roc Technologies
Together, they explored how the new network will improve public services, strengthen cyber resilience and support a more connected, future-ready City.

For many landlords and building managers, the word “wayleave” feels like the responsible route whenever a fibre circuit is being installed on their property. It sounds formal and safe – a neat legal box to tick.
In many cases, however, a wayleave adds unnecessary complexity and delays, frustrates tenants, and can expose landlords to long-term legal risks.
At Vorboss, we’ve connected thousands of office spaces across London without a wayleave, keeping landlords in full control and getting tenants online faster.

What is a wayleave?
A wayleave is a written agreement between a landowner and a telecoms operator. It gives the operator permission to install and keep equipment on private property.
What many people don’t realise is that signing a wayleave also activates “Code rights” under the Electronic Communications Code. These rights go beyond simple permission, they give the operator legal powers to stay on the property indefinitely, access it when needed, and even refuse removal of their equipment in certain situations.
For a typical connection into a commercial building in London, a wayleave can make the fibre installation process slower, more expensive, and limit the landlord’s flexibility long term.
Why a wayleave isn’t required for standard in-building fibre connections
For a standard in-building fibre connection serving a tenant, a wayleave isn’t a legal requirement. Important protections, like building access, fire safety, repairing any damage, and removing equipment, are already covered by the tenant’s lease and usual building rules.
If no wayleave is signed, no Code rights are triggered, meaning the landlord retains full control and the installation exists under a simple, fully revocable licence.
In practice, this gives landlords far more protection and flexibility:
- No legal lock-in – the telecoms operator has no long-term rights to stay or refuse removal.
- Landlords keep full control – equipment can be moved or removed when the building changes.
- Faster fibre installation – no time lost in drafting contracts or solicitor reviews.
- Happier tenants – connections go live quicker; tenants get to move in faster.
By contrast, signing a wayleave and granting Code rights introduces a complex and expensive legal process for any fibre removal or relocation. This can take at least 18 months, plus potential court or tribunal proceedings, making it slower, and far less flexible for the landlord.
.avif)

.avif)

