December 21, 2018 By Douglas Bonderud 2 min read

Splash Data recently released its roundup of the year’s worst passwords, and they’re as abysmal as ever. This spells trouble for enterprises in 2019 because, as noted by IBM X-Force Red senior managing consultant Dustin Heywood, passwords are simple, familiar, baked into devices and, therefore, here to stay.

But it’s not all bad news: While users won’t magically become password protection champions, there are actionable steps security teams can take to limit login risk.

The ‘Best’ of the Worst Passwords of 2018

Popular on this year’s list were numbers. Some, such as aa123456 (No. 22) and qwerty123 (No. 25), were clearly attempts to satisfy enterprise password policies. But as Heywood noted, cracking eight-character passwords is no problem for current-generation graphics processing unit (GPU) technology.

Symbol-rich offerings, such as !@#$%^&* (No. 20) — which is just a shift-key version of 12345678 — also made the list. Cracking the top 20 were 654321 (No. 19) and 666666 (No. 14). And while most were repeats from 2017, princess broke into the top 15 this year at No. 11.

At No. 9 is perennial favorite qwerty, preceded by sunshine and 111111. Taking the top two spots were the same terrible, terrible passwords from last year: password and 123456.

Password Security Tips That Will Stick

Despite continuing education and repeated warnings, well-meaning users are still picking simple, easily-cracked passwords. What simple, easy-to-implement tips can security teams preach to their employees in 2019?

  • Keep it unique. Create a no-repeat policy. According to Heywood, duplicate passwords enable threat actors to breach corporate networks using stolen credentials.
  • Adopt a password manager. Password management tools create unique passwords for multiple accounts — ones that won’t end up on Splash Data’s annual list — and use strong encryption to secure data.
  • Go long! Longer passwords are more secure, but strings of random symbols aren’t memorable. A better idea is to let users create longer passphrases that include spaces and special characters. Essentially, you’re asking employees to tell a story that they’ll remember but threat actors will find hard to guess.
  • Factor up. Multifactor authentication provides a critical buffer against bad passwords. While SMS codes are no longer secure, authenticator applications can significantly reduce the chance of network compromise.

As evidenced by this year’s “Worst Passwords” list, user credentials aren’t getting any stronger.. Don’t let your users get away with poor password hygiene in 2019. Implement stronger policies, invest in password management technology and ensure that your employees understand their role in keeping enterprise networks secure from credentials-stealing cybercriminals.

Source: Splash Data

More from

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Testing the limits of generative AI: How red teaming exposes vulnerabilities in AI models

4 min read - With generative artificial intelligence (gen AI) on the frontlines of information security, red teams play an essential role in identifying vulnerabilities that others can overlook.With the average cost of a data breach reaching an all-time high of $4.88 million in 2024, businesses need to know exactly where their vulnerabilities lie. Given the remarkable pace at which they’re adopting gen AI, there’s a good chance that some of those vulnerabilities lie in AI models themselves — or the data used to…

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today