Share with your network!
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
We often hear these phrases from people who shy away from security awareness and training:
Everybody already knows what phishing is!
People know better than to leave their devices unlocked!
Anyone who watches the news understands why they need to be careful online!
People obviously know how to create strong passwords!
Um…time to stop pretending that your users “know better.” Because the worst passwords of 2015 have been revealed, and it’s clear that plenty of people have not gotten the message about even the most basic cyber security safeguards.
SplashData’s 2015 edition of its “Worst Passwords List” has once again highlighted the reality that many people just don’t get — or just don’t care about — implementing password best practices. In a bad rerun that is sure to cause heartburn for infosec professionals everywhere, “123456” and “password” are the two most commonly used passwords — as they have since SplashData first published the list in 2011.
This fifth annual password analysis was compiled from more than 2 million passwords that were leaked in 2015. Though some newbies made the list, many linger like ghosts of breaches past — and all in the top 25 are hauntingly simple. Here’s a look at the list and how the rankings compare with 2014:
Rank |
Password |
Change from 2014 |
1 |
123456 |
Unchanged |
2 |
password |
Unchanged |
3 |
12345678 |
Up 1 |
4 |
qwerty |
Up 1 |
5 |
12345 |
Down 2 |
6 |
123456789 |
Unchanged |
7 |
football |
Up 3 |
8 |
1234 |
Down 1 |
9 |
1234567 |
Up 2 |
10 |
baseball |
Down 2 |
11 |
welcome |
New |
12 |
1234567890 |
New |
13 |
abc123 |
Up 1 |
14 |
111111 |
Up 1 |
15 |
1qaz2wsx |
New |
16 |
dragon |
Down 7 |
17 |
master |
Up 2 |
18 |
monkey |
Down 6 |
19 |
letmein |
Down 6 |
20 |
login |
New |
21 |
princess |
New |
22 |
qwertyuiop |
New |
23 |
solo |
New |
24 |
passw0rd |
New |
25 |
starwars |
New |
The vast majority of entries are either all numbers or all letters — a big no-no in the area of password security. Simple words and phrases again find homes on the list, with new Star Wars flavored entries a weak attempt at Jedi mind tricks. Two new entries — “1qaz2wsx” and “qwertyuiop” — seem promising at first blush…until you realize they are simple keyboard sequences (on standard keyboards, they are the first two columns of main keys and the top row of letter keys, respectively). Although these two passwords and a few other longer newbies (like “1234567890”) have character count on their side, they prove the rule that simple, predictable patterns compromise effectiveness.
Morgan Slain, CEO of SplashData, said of the list, “We hope that with more publicity about how risky it is to use weak passwords, more people will take steps to strengthen their passwords and, most importantly, use different passwords for different websites.”
Note Slain’s stress on limiting password reuse. Why? Because reuse only compounds the problem.
Consider a combination safe analogy: What if there were five safes in a house, but one simple combination — 1 (L), 2 (R), 3 (L), perhaps — worked on all of them? The same idea applies to electronic accounts. If a fraudster figures out that “monkey” is the password on a user’s Gmail account, the next stops are likely to be Amazon, Facebook, and top banking and retail sites. In relatively short order, that user could be facing hefty credit card charges, empty bank accounts, and more. Criminals can also use account logins to commit warranty fraud, as was the case with a recent scam targeting Fitbit, which was made possible in part by consumers’ reuse of passwords across multiple sites.
You might be saying to yourself, My passwords are in good shape, so this doesn’t apply to me. Well, if you’re still reading, you’re concerned on some level, even it isn’t because of your personal passwords. Maybe you’re part of an information security team for a large organization. Maybe you are a business owner and you’re worried about your employees’ access to your systems. Maybe you’re concerned your parents, kids, or friends are not doing all they should to protect themselves (and, by proxy, your personal data and home network). Whatever your worry, here are some tips for helping to eliminate — or at least limit — the use of “bad” passwords:
How well do your users understand password management? Evaluate their knowledge using our CyberStrength® tool and follow those assessments with our interactive training. We can teach your users how to create secure password families and phrase-based passwords — and help you reduce risk to your organization.