Passwords
øé±š²õ“dzܰł³¦±š²õĢż
(and some fun stuff)
Videos:
Graphics
Most Common Passwords
- 123456
- 123456789
- 12345678
- password
- qwerty123
- qwerty1
- 111111
- 12345
- secret
- 123123
The full top 200 list and how fast it can be cracked is with . If you use any of these passwords on any account, CHANGE IT!
UNDER LOCK AND KEY
Creating strong passwords offers greater security for minimal effort
You can buy a small padlock for less than a dollarābut you shouldnāt count on it to protect anything of value. A thief could probably pick a cheap lock without much effort, or simply break it. And yet, many people use similarly flimsy passwords to ālock upā their most valuable assets, including money and confidential information.
Fortunately, everyone can learn how to make and manage stronger passwords. Itās an easy way to strengthen security both at work and at home.
What Makes a Password āStrongā?
Letās say you need to create a new password thatās at least 12 characters long, and includes numerals, symbols, and upper- and lowercase letters. You think of a word you can remember, capitalize the first letter, add a digit, and end with an exclamation point. The result: Strawberry1!
Unfortunately, hackers have sophisticated password-breaking tools that can easily defeat passwords based on dictionary words (like āstrawberryā) and common patterns, such as capitalizing the first letter.
Increasing a passwordās complexity, randomness, and length can make it more resistant to hackersā tools. For example, an eight-character password could be guessed by an attacker in less than a day, but a 12-character password would take two weeks. A 20-character password would take 21 centuries.
You can learn more about creating strong passwords in your organizationās security awareness training. Your organization may also have guidelines or a password policy in place.
Why Uniqueness Matters
Many people reuse passwords across multiple accounts, and attackers take advantage of this risky behavior. If an attacker obtains one passwordāeven a strong oneāthey can often use it to access other valuable accounts.
Hereās a real-life example: Ten years ago, Alice joined an online gardening forum. She also created an online payment account and used the same password. She soon forgot about the gardening forum, but someone accessed her payments account years later and stole a large sum of money.
Alice didnāt realize the gardening forum had been hacked, and that usersā login credentials had been leaked online. An attacker probably tried reusing Aliceās leaked password on popular sitesāand eventually got lucky.
Guarding Your Passwords
- Donāt write them down ā Many make the mistake of writing passwords on post-it notes and leaving them in plain sight. Even if you hide your password, someone could still find it. Similarly, donāt store your login information in a file on your computer, even if you encrypt that file.
- Donāt share passwords ā You canāt be sure someone else will keep your credentials safe. At work, you could be held responsible for anything that happens when someone is logged in as you.
- Donāt save login details in your browser ā Some browsers store this information in unsafe ways, and another person could access your accounts if they get your device.
TIPS FOR FAMILY AND FRIENDS
Consider sharing what youāve learned about passwords and ask family and friends about their cybersecurity knowledge or experiences.
- Never reuse passwords ā Create a unique, strong password for each account or device. This way, a single hacked account doesnāt endanger other accounts.
- Create complex, long passwords ā Passwords based on dictionary words, petsā names, or other personal information can be guessed by attackers.
- Use a password manager ā These tools can securely store and manage your passwords and generate strong new passwords. Some can also alert you if a password may have been compromised.
Ģż