If you are in the habit of using passwords like ‘password’, ‘qwerty’ or ‘123456’, you may be helping hackers and online thieves steal your data. We’ve put together a list of the worst passwords to use. Those that are the most common passwords – passwords that you should avoid.

If you think using ‘password’ as your password is no big deal, then it’s time to rethink.

Every year in-the-know security firms compile lists of the most common (and therefore worst) passwords. As it turns out, bad habits die hard, and users still choose, and ‘password’ – as it’s at the very top of the list. Weak passwords make your information more vulnerable simply because hackers can guess them. It may be easier to pick a password that you don’t have to think about, but it’s a choice that you may come to regret.

The most commonly used passwords:

To help you avoid common password choice mistakes that users make, here’s a list of the 10 most common passwords in use (with a few extras thrown in for good measure):

  1. password
  2. 123456
  3. 12345678
  4. qwerty
  5. abc123
  6. passw0rd
  7. 1234567
  8. letmein
  9. trustno1
  10. dragon
  11. baseball
  12. iloveyou

Make a smart password choice

Experts at NIST advise using a combination of letters, numbers, and punctuation marks when creating your passwords. Avoid using easily guessed things, such as birthdays and anniversary dates. Passwords with eight (or more) characters are strongly recommended. It is critical to use unique passwords for each site and each accounts. The use of a password manager to help you keep track of all of your passwords is strongly recommended.

No matter how sophisticated your security system is, a weak password gives hackers and online thieves an advantage. Helping all the users in your organization understand the importance of password strength will help you secure the IT systems in your organization.

If you’re interested in learning more, check out some of our other blogs on password and credential security. We blog about this and other security topics often! Our ongoing series Practically Secure offers some practical and easily implemented solutions to this problem!

Comments are closed

Learn More

Learn More
error: Alert: This Content is protected!