Splash Data released its roundup of the worst passwords, and they’re as abysmal as ever. This spells trouble for enterprises because, as noted by IBM X-Force Red senior managing consultant Dustin Heywood, passwords are simple, familiar, baked into devices and, therefore, here to stay.
But it’s not all bad news: While users won’t magically become password protection champions, there are actionable steps security teams can take to limit login risk.
Popular on the list were numbers. Some, such as aa123456 (No. 22) and qwerty123 (No. 25), were clearly attempts to satisfy enterprise password policies. But as Heywood noted, cracking eight-character passwords is no problem for current-generation graphics processing unit (GPU) technology.
Symbol-rich offerings, such as !@#$%^&* (No. 20) — which is just a shift-key version of 12345678 — also made the list. Cracking the top 20 were 654321 (No. 19) and 666666 (No. 14). And while most were repeats from 2017, princess broke into the top 15 this year at No. 11.
At No. 9 is perennial favorite qwerty, preceded by sunshineand 111111. Taking the top two spots were the same terrible, terrible passwords from last year: password and 123456.
Despite continuing education and repeated warnings, well-meaning users are still picking simple, easily-cracked passwords. What simple, easy-to-implement tips can security teams preach to their employees?
As evidenced by the “Worst Passwords” list, user credentials aren’t getting any stronger. Don’t let your users get away with poor password hygiene. Implement stronger policies, invest in password management technology and ensure that your employees understand their role in keeping enterprise networks secure from credentials-stealing cybercriminals.
Source: Splash Data