Nexcess Logo

How to use the Nexcess Secure Password Generator

Knowledge Base Home

Notice anything different?

We've enhanced the appearance of our portal and we're working on updating screenshots. Things might look different, but the functionality remains the same.
September 06, 2019

How to use the Nexcess Secure Password Generator to create a secure password or evaluate one.

It is critical that you use a complex, secure password for your Nexcess hosting account. Hackers constantly innovate new ways of stealing data from businesses and individuals. To minimize the risk of a security compromise,  regularly change your password for all of your online accounts and use a unique password for each account.

Traditional generator

It can be difficult to create and maintain secure passwords, especially when you have several online accounts, each with a unique password. The Nexcess Secure Password Generator can instantly generate a random password to your specifications. For example, if you require a case-sensitive password with only alphanumeric characters, you can select or clear the corresponding check boxes as shown below.

Word-based password generator

The Secure Password Generator utility also provides an option to generate a multi-word password with or without numeric characters. 

The How many numbers field refers to how many number pairs will appear within the password. 

The How many words field will insert your preferred number of unrelated words in the password. You may also elect to Enter the desired number of words and click Generate

As shown below, the newly created multi-word password appears on the window under the New Password field. You can then copy and paste the password or save it for future reference.

Evaluating passwords

To check the security level of one of your existing passwords, enter the password in the Enter your password field. As you type, the page displays information about the strength of the word: "very weak," "very strong," or something in between.

Password managers and two-factor authentication

If maintaining unique, complex passwords for all of your applications sounds difficult, you can use a password-management application like LastPass, Dashlane, or 1Password to safely catalog and encrypt your unique passwords in the cloud under one unique master password. 

They also offer two-factor authentication, and we strongly recommend this additional security measure requiring a second form of identity confirmation. 

In the event a hacker successfully compromises your password, the hacker still cannot gain access without the second form of authentication. This second form may require a thumb-drive, a fingerprint scanner, or a mobile device.


For 24-hour assistance any day of the year, contact our support team by email or through your Client Portal.

Jason Dobry
We use cookies to understand how you interact with our site, to personalize and streamline your experience, and to tailor advertising. By continuing to use our site, you accept our use of cookies and accept our Privacy Policy.