SlideShare a Scribd company logo
1 of 7
Download to read offline
‘123456’ WORST PASSWORD
OF THE YEAR 2016
‘123456’ WORST PASSWORD OF
THE YEAR 2016
SplashData releases its annual list in an effort to encourage the adoption ofstronger passwords to improve Internet security. The
passwords evaluatedare mostly from North American and Western European users. The list shows many people continue to put
themselves at risk for hackingand identity theft by using weak, easily guessable passwords.
We have seen an effort by many people to be more secure by adding characters to passwords, but if these longer passwords are based
on simple patterns they will put you in just as much risk of having your identity stolen by hackers”by Morgan Slain, CEO of SplashData
As in past years’ lists, simple numerical passwords remain common, with nine of the top 25 passwords on the 2014 list comprised of
numbers only. Passwords appearing for the first time on SplashData’s list include “696969″ and “batman.” While Valentine’s Day is less
than a month away, “iloveyou” is one of the nine passwords from 2013 to fall off the 2014 list.
Here are Dos and Don’ts regarding passwords
Don’t use a favorite sport as your password – “baseball” and “football” are in top 10, and “hockey,” “soccer” and “golfer” are in the top 100.
Don’t use a favorite team either, as “yankees,” “eagles,” “steelers,” “rangers,” and “lakers” are all in the top 100.
‘123456’ WORST PASSWORD OF
THE YEAR 2016
Don’t use your birthday or especially just your birth year — 1989, 1990, 1991,
and 1992 are all in the top 100.
While baby name books are popular for naming children, do not use them as
sources for picking passwords. Common names such as “michael,” “jennifer,”
“thomas,” “jordan,” “hunter,” “michelle,” “charlie,” “andrew,” and “daniel” are all in
the top 50.
Use passwords of eight characters or more with mixed types of characters.
Avoid using the same username/password combination for multiple websites.
Use a password manager such as SplashID to organize and protect passwords,
generate random passwords, and automatically log into websites.
‘123456’ WORST PASSWORD OF
THE YEAR 2016
Dictionary attacks: Avoid consecutive keyboard combinations— such as qwerty or asdfg. Don’t use dictionary
words, slang terms, common misspellings, or words spelled backward. These cracks rely on software that
automatically plugs common words into password fields. Password cracking becomes almost effortless with a
tool like John the Ripper or similar programs.
Cracking security questions: Many people use first names as passwords, usually the names of
spouses, kids, other relatives, or pets, all of which can be deduced with a little research. When you click the
“forgot password” link within a webmail service or other site, you’re asked to answer a question or series of
questions. The answers can often be found on your social media profile. This is how Sarah Palin’s Yahoo
account was hacked.
Simple passwords: Don’t use personal information such as your name, age, birth date, child’s name, pet’s
name, or favorite color/song, etc. When 32 million passwords were exposed in a breach last year, almost 1% of
victims were using “123456.” The next most popular password was “12345.” Other common choices are
“111111,” “princess,” “qwerty,” and “abc123.”
Reuse of passwords across multiple sites: Reusing passwords for email, banking, and
social media accounts can lead to identity theft. Two recent breaches revealed a password reuse rate of 31%
among victims.
Social engineering: Social engineering is an elaborate type of lying. An alternative to traditional
hacking, it is the act of manipulating others into performing certain actions or divulging confidential information.
‘123456’ WORST PASSWORD OF
THE YEAR 2016
How to make them secure
1. Make sure you use different passwords for each of your accounts.
2. Be sure no one watches when you enter your password.
3. Always log off if you leave your device and anyone is around—it only takes a
moment for someone to steal or change the password.
4. Use comprehensive security software and keep it up to date to avoid keyloggers
(keystroke loggers) and other malware.
5. Avoid entering passwords on computers you don’t control (like computers at an
Internet café or library)—they may have malware that steals your passwords.
6. Avoid entering passwords when using unsecured Wi-Fi connections (like at the
airport or coffee shop)—hackers can intercept your passwords and data over this
unsecured connection.
‘123456’ WORST PASSWORD OF
THE YEAR 2016
7. Don’t tell anyone your password. Your trusted friend now might not be your friend in the
future. Keep your passwords safe by keeping them to yourself.
8. Depending on the sensitivity of the information being protected, you should change your
passwords periodically, and avoid reusing a password for at least one year.
9. Do use at least eight characters of lowercase and uppercase letters, numbers, and symbols
in your password. Remember, the more the merrier.
10. Strong passwords are easy to remember but hard to guess. Iam:)2b29! — This has 10
characters and says “I am happy to be 29!” I wish.
11. Use the keyboard as a palette to create shapes. %tgbHU8*- Follow that on the keyboard. It’s
a V. The letter V starting with any of the top keys. To change these periodically, you can slide
them across the keyboard. Use W if you are feeling all crazy.
12. Have fun with known short codes or sentences or phrases. 2B-or-Not_2b? —This one says
“To be or not to be?”
13. It’s okay to write down your passwords, just keep them away from your computer and mixed
in with other numbers and letters so it’s not apparent that it’s a password.
‘123456’ WORST PASSWORD OF
THE YEAR 2016
14. You can also write a “tip sheet” which will give you a clue to remember your
password, but doesn’t actually contain your password on it. For example, in the
example above, your “tip sheet” might read “To be, or not to be?”
15. Check your password strength. If the site you are signing up for offers a
password strength analyzer, pay attention to it and heed its advice.

More Related Content

Similar to ‘123456’ worst password of the year 2016

Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of viewYury Chemerkin
 
S01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong PasswordsS01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong Passwordsselcukca84
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsConnectSafely
 
zaki_anwer_cryptography.pptx
zaki_anwer_cryptography.pptxzaki_anwer_cryptography.pptx
zaki_anwer_cryptography.pptxMewar University
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crackKlaus Drosch
 
Common Password Patterns
Common Password PatternsCommon Password Patterns
Common Password PatternsnFront Security
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptxAljunMisa
 
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 Thycotic
 
Online safety 101
Online safety 101Online safety 101
Online safety 101Greg Bold
 
Staying Safe and Secure with Passwords
Staying Safe and Secure with PasswordsStaying Safe and Secure with Passwords
Staying Safe and Secure with Passwordsahyaimie
 
Lesson Presentation Powerful Passwords.pptx
Lesson Presentation Powerful Passwords.pptxLesson Presentation Powerful Passwords.pptx
Lesson Presentation Powerful Passwords.pptxAllanGuevarra1
 

Similar to ‘123456’ worst password of the year 2016 (20)

Why is password protection a fallacy a point of view
Why is password protection a fallacy   a point of viewWhy is password protection a fallacy   a point of view
Why is password protection a fallacy a point of view
 
S01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong PasswordsS01.L07 - Creating Strong Passwords
S01.L07 - Creating Strong Passwords
 
Password management
Password managementPassword management
Password management
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
8 login passwords
8   login passwords 8   login passwords
8 login passwords
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
 
How to Design Passwords
How to Design PasswordsHow to Design Passwords
How to Design Passwords
 
zaki_anwer_cryptography.pptx
zaki_anwer_cryptography.pptxzaki_anwer_cryptography.pptx
zaki_anwer_cryptography.pptx
 
Securing password
Securing passwordSecuring password
Securing password
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
Common Password Patterns
Common Password PatternsCommon Password Patterns
Common Password Patterns
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Online safety 101
Online safety 101Online safety 101
Online safety 101
 
W make107
W make107W make107
W make107
 
Staying Safe and Secure with Passwords
Staying Safe and Secure with PasswordsStaying Safe and Secure with Passwords
Staying Safe and Secure with Passwords
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Lesson Presentation Powerful Passwords.pptx
Lesson Presentation Powerful Passwords.pptxLesson Presentation Powerful Passwords.pptx
Lesson Presentation Powerful Passwords.pptx
 

More from niraj joshi

Social media marketing project
Social media marketing  projectSocial media marketing  project
Social media marketing projectniraj joshi
 
Social media marketing
Social media  marketingSocial media  marketing
Social media marketingniraj joshi
 
Six steps to protect your password from hackers
Six steps to protect your password from hackersSix steps to protect your password from hackers
Six steps to protect your password from hackersniraj joshi
 
Why big data promises
Why big data promisesWhy big data promises
Why big data promisesniraj joshi
 
The power of persistence in your career
The power of persistence in your careerThe power of persistence in your career
The power of persistence in your careerniraj joshi
 
Strategic management » strategic outsourcing
Strategic management » strategic outsourcingStrategic management » strategic outsourcing
Strategic management » strategic outsourcingniraj joshi
 
Selling cost in monopolistic competition
Selling cost in monopolistic competitionSelling cost in monopolistic competition
Selling cost in monopolistic competitionniraj joshi
 
Selling cost in monopolistic competition
Selling cost in monopolistic competitionSelling cost in monopolistic competition
Selling cost in monopolistic competitionniraj joshi
 
Managerial economics » oligopolistic market
Managerial economics » oligopolistic marketManagerial economics » oligopolistic market
Managerial economics » oligopolistic marketniraj joshi
 
3 things to think about before changing careers
3 things to think about before changing careers3 things to think about before changing careers
3 things to think about before changing careersniraj joshi
 
Youtube videos might hijack your phone
Youtube videos might hijack your phoneYoutube videos might hijack your phone
Youtube videos might hijack your phoneniraj joshi
 
Facebook free basics
Facebook  free basicsFacebook  free basics
Facebook free basicsniraj joshi
 
How to stay relevant in an ever
How to stay relevant in an everHow to stay relevant in an ever
How to stay relevant in an everniraj joshi
 
Google offers virtual reality tour of buckingham
Google offers virtual reality tour of buckingham Google offers virtual reality tour of buckingham
Google offers virtual reality tour of buckingham niraj joshi
 
Multidivisional organizational structure
Multidivisional organizational structureMultidivisional organizational structure
Multidivisional organizational structureniraj joshi
 
Total, average and marginal revenues
Total, average and marginal revenuesTotal, average and marginal revenues
Total, average and marginal revenuesniraj joshi
 
ISOQUANTS OR EQUAL PRODUCT CURVES
ISOQUANTS OR EQUAL PRODUCT CURVESISOQUANTS OR EQUAL PRODUCT CURVES
ISOQUANTS OR EQUAL PRODUCT CURVESniraj joshi
 

More from niraj joshi (20)

Social media marketing project
Social media marketing  projectSocial media marketing  project
Social media marketing project
 
Social media marketing
Social media  marketingSocial media  marketing
Social media marketing
 
Six steps to protect your password from hackers
Six steps to protect your password from hackersSix steps to protect your password from hackers
Six steps to protect your password from hackers
 
Why big data promises
Why big data promisesWhy big data promises
Why big data promises
 
The power of persistence in your career
The power of persistence in your careerThe power of persistence in your career
The power of persistence in your career
 
Strategic management » strategic outsourcing
Strategic management » strategic outsourcingStrategic management » strategic outsourcing
Strategic management » strategic outsourcing
 
Selling cost in monopolistic competition
Selling cost in monopolistic competitionSelling cost in monopolistic competition
Selling cost in monopolistic competition
 
Selling cost in monopolistic competition
Selling cost in monopolistic competitionSelling cost in monopolistic competition
Selling cost in monopolistic competition
 
News in brief2
News in brief2News in brief2
News in brief2
 
News in brief
News in briefNews in brief
News in brief
 
Managerial economics » oligopolistic market
Managerial economics » oligopolistic marketManagerial economics » oligopolistic market
Managerial economics » oligopolistic market
 
3 things to think about before changing careers
3 things to think about before changing careers3 things to think about before changing careers
3 things to think about before changing careers
 
Youtube videos might hijack your phone
Youtube videos might hijack your phoneYoutube videos might hijack your phone
Youtube videos might hijack your phone
 
Facebook
FacebookFacebook
Facebook
 
Facebook free basics
Facebook  free basicsFacebook  free basics
Facebook free basics
 
How to stay relevant in an ever
How to stay relevant in an everHow to stay relevant in an ever
How to stay relevant in an ever
 
Google offers virtual reality tour of buckingham
Google offers virtual reality tour of buckingham Google offers virtual reality tour of buckingham
Google offers virtual reality tour of buckingham
 
Multidivisional organizational structure
Multidivisional organizational structureMultidivisional organizational structure
Multidivisional organizational structure
 
Total, average and marginal revenues
Total, average and marginal revenuesTotal, average and marginal revenues
Total, average and marginal revenues
 
ISOQUANTS OR EQUAL PRODUCT CURVES
ISOQUANTS OR EQUAL PRODUCT CURVESISOQUANTS OR EQUAL PRODUCT CURVES
ISOQUANTS OR EQUAL PRODUCT CURVES
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

‘123456’ worst password of the year 2016

  • 2. ‘123456’ WORST PASSWORD OF THE YEAR 2016 SplashData releases its annual list in an effort to encourage the adoption ofstronger passwords to improve Internet security. The passwords evaluatedare mostly from North American and Western European users. The list shows many people continue to put themselves at risk for hackingand identity theft by using weak, easily guessable passwords. We have seen an effort by many people to be more secure by adding characters to passwords, but if these longer passwords are based on simple patterns they will put you in just as much risk of having your identity stolen by hackers”by Morgan Slain, CEO of SplashData As in past years’ lists, simple numerical passwords remain common, with nine of the top 25 passwords on the 2014 list comprised of numbers only. Passwords appearing for the first time on SplashData’s list include “696969″ and “batman.” While Valentine’s Day is less than a month away, “iloveyou” is one of the nine passwords from 2013 to fall off the 2014 list. Here are Dos and Don’ts regarding passwords Don’t use a favorite sport as your password – “baseball” and “football” are in top 10, and “hockey,” “soccer” and “golfer” are in the top 100. Don’t use a favorite team either, as “yankees,” “eagles,” “steelers,” “rangers,” and “lakers” are all in the top 100.
  • 3. ‘123456’ WORST PASSWORD OF THE YEAR 2016 Don’t use your birthday or especially just your birth year — 1989, 1990, 1991, and 1992 are all in the top 100. While baby name books are popular for naming children, do not use them as sources for picking passwords. Common names such as “michael,” “jennifer,” “thomas,” “jordan,” “hunter,” “michelle,” “charlie,” “andrew,” and “daniel” are all in the top 50. Use passwords of eight characters or more with mixed types of characters. Avoid using the same username/password combination for multiple websites. Use a password manager such as SplashID to organize and protect passwords, generate random passwords, and automatically log into websites.
  • 4. ‘123456’ WORST PASSWORD OF THE YEAR 2016 Dictionary attacks: Avoid consecutive keyboard combinations— such as qwerty or asdfg. Don’t use dictionary words, slang terms, common misspellings, or words spelled backward. These cracks rely on software that automatically plugs common words into password fields. Password cracking becomes almost effortless with a tool like John the Ripper or similar programs. Cracking security questions: Many people use first names as passwords, usually the names of spouses, kids, other relatives, or pets, all of which can be deduced with a little research. When you click the “forgot password” link within a webmail service or other site, you’re asked to answer a question or series of questions. The answers can often be found on your social media profile. This is how Sarah Palin’s Yahoo account was hacked. Simple passwords: Don’t use personal information such as your name, age, birth date, child’s name, pet’s name, or favorite color/song, etc. When 32 million passwords were exposed in a breach last year, almost 1% of victims were using “123456.” The next most popular password was “12345.” Other common choices are “111111,” “princess,” “qwerty,” and “abc123.” Reuse of passwords across multiple sites: Reusing passwords for email, banking, and social media accounts can lead to identity theft. Two recent breaches revealed a password reuse rate of 31% among victims. Social engineering: Social engineering is an elaborate type of lying. An alternative to traditional hacking, it is the act of manipulating others into performing certain actions or divulging confidential information.
  • 5. ‘123456’ WORST PASSWORD OF THE YEAR 2016 How to make them secure 1. Make sure you use different passwords for each of your accounts. 2. Be sure no one watches when you enter your password. 3. Always log off if you leave your device and anyone is around—it only takes a moment for someone to steal or change the password. 4. Use comprehensive security software and keep it up to date to avoid keyloggers (keystroke loggers) and other malware. 5. Avoid entering passwords on computers you don’t control (like computers at an Internet café or library)—they may have malware that steals your passwords. 6. Avoid entering passwords when using unsecured Wi-Fi connections (like at the airport or coffee shop)—hackers can intercept your passwords and data over this unsecured connection.
  • 6. ‘123456’ WORST PASSWORD OF THE YEAR 2016 7. Don’t tell anyone your password. Your trusted friend now might not be your friend in the future. Keep your passwords safe by keeping them to yourself. 8. Depending on the sensitivity of the information being protected, you should change your passwords periodically, and avoid reusing a password for at least one year. 9. Do use at least eight characters of lowercase and uppercase letters, numbers, and symbols in your password. Remember, the more the merrier. 10. Strong passwords are easy to remember but hard to guess. Iam:)2b29! — This has 10 characters and says “I am happy to be 29!” I wish. 11. Use the keyboard as a palette to create shapes. %tgbHU8*- Follow that on the keyboard. It’s a V. The letter V starting with any of the top keys. To change these periodically, you can slide them across the keyboard. Use W if you are feeling all crazy. 12. Have fun with known short codes or sentences or phrases. 2B-or-Not_2b? —This one says “To be or not to be?” 13. It’s okay to write down your passwords, just keep them away from your computer and mixed in with other numbers and letters so it’s not apparent that it’s a password.
  • 7. ‘123456’ WORST PASSWORD OF THE YEAR 2016 14. You can also write a “tip sheet” which will give you a clue to remember your password, but doesn’t actually contain your password on it. For example, in the example above, your “tip sheet” might read “To be, or not to be?” 15. Check your password strength. If the site you are signing up for offers a password strength analyzer, pay attention to it and heed its advice.