Jump to content

List of 25 worst passwords show importance of proper business security


Recommended Posts

http://cdn.mos.techradar.com/art/TRBC/Abstract/Lock%20on%20keyboard%20button/iStock_000002900430Small-bluestocking-470-75.jpg

SplashData has released the 2014 edition of its list of the 25 most common passwords found on the internet this week. In a momentous victory, and having been in the shadow of 'password' since the data was first collated, '123456' has finally reached the top spot as most used password on the internet.

Among the top ten are 'abc123', '123456789', 'iloveyou' and '111111'. A number in the top 25 are program specific, with registering consumers using passwords like 'adobe123'.

Although SplashData's results offer a light-hearted look at the lethargic views some people have of their password-protected software and their use of overly simple codes like 'qwerty' and 'letmein', there should be a more important lesson for businesses.

Common password, greater risk

Passwords that are weaker are likely to be broken by brute-force attacks, where hackers gain access by rapidly guessing possible password combinations.

When encrypted passwords are stolen, weaker ones are usually quick to follow as cracking software becomes more intricate and effective and hardware like GPGPU more powerful. Add in the potential use of cloud-based services and you have an explosive combination.

The topic of rolling password updates in the workplace has been under debate recently, especially with the rise of BYOD (Bring Your Own Device). Employees losing their own hardware with sensitive data on them should be a real concern for businesses.

Use of common passwords is one of the greatest risks to data security. Most people have one or two passwords they use regularly, usually with variations of numbers attached to the end when forced to renew them.

All it takes is for a user to log into an unsafe conduit, such as a forum, and hackers might take their registered password, used for every account, and within a few hours have complete access to everything that was once secure.

http://rss.feedsportal.com/c/669/f/415085/s/363483cd/sc/46/mf.gif


http://da.feedsportal.com/r/187556674318/u/49/f/415085/c/669/s/363483cd/sc/46/rc/1/rc.img
http://da.feedsportal.com/r/187556674318/u/49/f/415085/c/669/s/363483cd/sc/46/rc/2/rc.img
http://da.feedsportal.com/r/187556674318/u/49/f/415085/c/669/s/363483cd/sc/46/rc/3/rc.img

http://da.feedsportal.com/r/187556674318/u/49/f/415085/c/669/s/363483cd/a2.imghttp://pi.feedsportal.com/r/187556674318/u/49/f/415085/c/669/s/363483cd/a2t.imghttp://feeds.feedburner.com/~r/techradar/software-news/~4/TLLISqDUkRI
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...