In password security, the longer the better. With a password manager, using more than 24 characters is simple. Unless, of course, the secure password is not accepted due to its length. (In this case, through STOVE.)
Possibly indicating cleartext storage of a limited field (which is an absolute no-go), or suboptimal or lacking security practices.
I really hope you don’t work in the tech industry.
I’ve yet to see anyone link to a source
Here is where I’m getting my info
https://cybersecuritynews.com/nist-rules-password-security/
you realize that they say the exact opposite of what you are saying, right?
You haven’t provided any evidence to support your claim. Online accounts can’t easily be brute forced.
If a hash is leaked you just change the password. As long as you aren’t reusing the same password everywhere you are fine.
How do you know when a password is leaked?
What’s the distribution of variance in brute force protections on online services?
If the hashes are leaked and that’s immediately caught and customers are immediately informed, just change your password.