December 21, 2018 By Douglas Bonderud 2 min read

Splash Data recently released its roundup of the year’s worst passwords, and they’re as abysmal as ever. This spells trouble for enterprises in 2019 because, as noted by IBM X-Force Red senior managing consultant Dustin Heywood, passwords are simple, familiar, baked into devices and, therefore, here to stay.

But it’s not all bad news: While users won’t magically become password protection champions, there are actionable steps security teams can take to limit login risk.

The ‘Best’ of the Worst Passwords of 2018

Popular on this year’s list were numbers. Some, such as aa123456 (No. 22) and qwerty123 (No. 25), were clearly attempts to satisfy enterprise password policies. But as Heywood noted, cracking eight-character passwords is no problem for current-generation graphics processing unit (GPU) technology.

Symbol-rich offerings, such as !@#$%^&* (No. 20) — which is just a shift-key version of 12345678 — also made the list. Cracking the top 20 were 654321 (No. 19) and 666666 (No. 14). And while most were repeats from 2017, princess broke into the top 15 this year at No. 11.

At No. 9 is perennial favorite qwerty, preceded by sunshine and 111111. Taking the top two spots were the same terrible, terrible passwords from last year: password and 123456.

Password Security Tips That Will Stick

Despite continuing education and repeated warnings, well-meaning users are still picking simple, easily-cracked passwords. What simple, easy-to-implement tips can security teams preach to their employees in 2019?

  • Keep it unique. Create a no-repeat policy. According to Heywood, duplicate passwords enable threat actors to breach corporate networks using stolen credentials.
  • Adopt a password manager. Password management tools create unique passwords for multiple accounts — ones that won’t end up on Splash Data’s annual list — and use strong encryption to secure data.
  • Go long! Longer passwords are more secure, but strings of random symbols aren’t memorable. A better idea is to let users create longer passphrases that include spaces and special characters. Essentially, you’re asking employees to tell a story that they’ll remember but threat actors will find hard to guess.
  • Factor up. Multifactor authentication provides a critical buffer against bad passwords. While SMS codes are no longer secure, authenticator applications can significantly reduce the chance of network compromise.

As evidenced by this year’s “Worst Passwords” list, user credentials aren’t getting any stronger.. Don’t let your users get away with poor password hygiene in 2019. Implement stronger policies, invest in password management technology and ensure that your employees understand their role in keeping enterprise networks secure from credentials-stealing cybercriminals.

Source: Splash Data

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today