Top Passwords in 2019

We shared an article about this in 2018, and it is still surprising to see even today that the same easy to guess passwords are used.

Now 2020 is upon us, we take a look again at these reports. A recently released document by Nord revealed what they have seen as users passwords, sharing the most used insecure 250 passwords.

Attackers use a list of at least tens of thousands of passwords in attempts to gain access to your systems, and this is even before lists of passwords are easily purchasable through the dark web where users may actually have complex passwords in use.

Using easy to guess passwords makes security of applications and services non existent, unless you are making use of MFA which will improve the security situation, and if your staff do not use good password practice and hygiene, then it leaves the security of your organisations data and business at risk.

We recommend the use of a Password Manager, and there are some great multiuser business tools out there, check out our recent blog post here or click the + symbol at the top right and check out 1Password

Password Management

Ensure your passwords are secure

Top 10

The Top Ten doesn’t really contain any surprises for us, apart from the non surprising “password”. What is interesting is the list of women’s names being used and the strings of characters that are on the keyboard that are used to

  1. 12345
  2. 123456
  3. 123456789
  4. test1
  5. password
  6. 12345678
  7. zinch
  8. g_czechout
  9. asdf
  10. qwerty

More importantly – what is zinch and g_czechout to make it into the top 10 ?

Password Management

Ensure your passwords are secure

Top Tips for Password Security

  • Be as complex as the system allows. Most systems these days should allow for a phrase to be used, try to get a minimum of 16 characters
  • Keep passwords unique to each platform. That way if one platform gets compromised and account details are shared on the dark web for a few £££ then your other applications and services wont be affected
  • To help with the two areas above, use a Password Manager. We advocate the use of 1Password
  • Use Multifactor authentication wherever its possible, most major platforms support it, Facebook, LinkedIn, banking systems etc
  • If you have Active Directory in your business, enforce a password policy

 

Past Blogs

benefits of cybersecurity

Benefits of CyberSecurity

The benefits of cybersecurity. With vast amounts of information are stored online, the benefits of robust cybersecurity are more vital than ever. At Network &...
what is dmarc

What is DMARC

What is DMARC and Why Does Your Business Need It? When it comes to protecting your business from cyber threats, email security is often overlooked. Yet, email is one of...
Why is password management software important

Why is Password Management Software Important

Why is Password Management Software Important for Your Business? In today’s digital world, passwords are the keys to your business’s most sensitive information. From...
What is Email Filtering ?

What is Email Filtering and Why Every Business Needs It

Email is the lifeblood of business communication, but it’s also one of the most vulnerable entry points for cyberattacks. According to research, 96% of cyber threats...
What’s your business’s view on Return to Office?

What’s your business’s view on Return to Office?

Do you love keeping your employees happy by allowing them to work remotely? Or do you think everyone is more productive in the office? Businesses are divided on this...
Outdated backup systems could leave your business vulnerable

Outdated backup systems could leave your business vulnerable

When did you last review your business’s backup tools? Outdated backup systems can fail to protect you from modern threats, like ransomware attacks. If you want a...
Microsoft’s fixing this annoying Windows 11 fault

Microsoft’s fixing this annoying Windows 11 fault

Fed up seeing useless “Recommendations” in the Windows 11 Start menu? Good news – Microsoft’s making them more helpful. Here’s how the improvements could help your team...
Beware that corrupted email attachment: It could be a scam

Beware that corrupted email attachment: It could be a scam

Cyber criminals get more creative every day. The latest scam designed to steal your business data uses corrupted Word files – and getting fooled is easier than you...
Are your employees your security’s weakest link?

Are your employees your security’s weakest link?

Great employees have the same goals you do. But while they’re working hard to help your business succeed, they could accidentally be opening the door to cyber...
The two big threats of doing business on public Wi-Fi

The two big threats of doing business on public Wi-Fi

Public Wi-Fi can be a lifesaver when you must send an urgent email while out of the office. But did you know it can also put your business data at risk? These are the...