{"id":111861,"date":"2019-12-21T16:12:07","date_gmt":"2019-12-21T21:12:07","guid":{"rendered":"http:\/\/rbach.net\/?p=111861"},"modified":"2021-08-18T16:01:11","modified_gmt":"2021-08-18T20:01:11","slug":"stop-using-these-passwords-now","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/stop-using-these-passwords-now\/","title":{"rendered":"Stop Using These Passwords Now"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20210909190836\/http:\/\/www.mythweb.com\/encyc\/entries\/sisyphus.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-111879\" title=\"Stop Using These Passwords Now\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/sisyphus-1.gif?resize=95%2C95&#038;ssl=1\" alt=\"Stop Using These Passwords Now\" width=\"95\" height=\"95\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/sisyphus-1.gif?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/sisyphus-1.gif?resize=75%2C75&amp;ssl=1 75w\" sizes=\"auto, (max-width: 95px) 100vw, 95px\" \/><\/a>The annual list of the <strong>worst passwords<\/strong> is out. People are lazy and still use the <strong>same old compromised passwords<\/strong>. Not much has changed since <a href=\"https:\/\/wp.me\/p2wgaW-nlL\" target=\"_blank\" rel=\"noopener noreferrer\">2018<\/a>, <a href=\"https:\/\/wp.me\/p2wgaW-mdM\" target=\"_blank\" rel=\"noopener noreferrer\">2017<\/a>, or <a href=\"https:\/\/wp.me\/p2wgaW-kzJ\" target=\"_blank\" rel=\"noopener noreferrer\">2016<\/a>. <a href=\"https:\/\/www.splashdata.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>SplashData<\/strong>\u2019s<\/a> 9th annual list of worst passwords looked at 5 million passwords that were leaked in various data breaches in 2019 and found that <strong>123456<\/strong> is still the most frequently used password.<\/p>\n<p>Some other interesting password factoids from the survey include:<\/p>\n<ul>\n<li><strong><em><a href=\"https:\/\/splashdata.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-111875 size-full\" title=\"SplashData logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/splashdata_logo-2-e1576768868591.png?resize=118%2C45&#038;ssl=1\" alt=\"SplashData logo\" width=\"118\" height=\"45\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/splashdata_logo-2-e1576768868591.png?w=118&amp;ssl=1 118w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/splashdata_logo-2-e1576768868591.png?resize=75%2C29&amp;ssl=1 75w\" sizes=\"auto, (max-width: 118px) 100vw, 118px\" \/><\/a>password<\/em>\u00a0<\/strong>has been knocked out of the top two spots for the first time in the list\u2019s history.<\/li>\n<li>Simple patterns using <strong>contiguous keys on the keyboard<\/strong> like <em>1q2w3e4r,<\/em> <em>qwertyuiop, <\/em>and <em>!@#$%^&amp;* <\/em>are new for 2019. They may seem complex but will not fool attackers.<\/li>\n<li><strong>QWERTY<\/strong> is a big mover in 2019. <em>qwerty<\/em> moved up 6 places to #3 in 2019 and <em>qwerty123<\/em> moved up 13 spots to #13 in 2019.<\/li>\n<li>After making his debut on the 2018 annual list \u201c<em><strong>donald<\/strong><\/em>\u201d fell to #34 on the most dangerous password to use.<\/li>\n<\/ul>\n\n<table id=\"tablepress-68\" class=\"tablepress tablepress-id-68\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">Rank<\/th><th class=\"column-2\">Password<\/th><th class=\"column-3\">Change<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">1<\/td><td class=\"column-2\">123456<\/td><td class=\"column-3\">(Rank unchanged from 2018)<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">2<\/td><td class=\"column-2\">123456789<\/td><td class=\"column-3\">(up 1)<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">3<\/td><td class=\"column-2\">qwerty<\/td><td class=\"column-3\">(Up 6)<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">4<\/td><td class=\"column-2\">password<\/td><td class=\"column-3\">(Down 2)<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">5<\/td><td class=\"column-2\">1234567<\/td><td class=\"column-3\">(Up 2)<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">6<\/td><td class=\"column-2\">12345678<\/td><td class=\"column-3\">(Down 2)<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">7<\/td><td class=\"column-2\">12345<\/td><td class=\"column-3\">(Down 2)<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">8<\/td><td class=\"column-2\">iloveyou<\/td><td class=\"column-3\">(Up 2)<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">9<\/td><td class=\"column-2\">111111<\/td><td class=\"column-3\">(Down 3)<\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">10<\/td><td class=\"column-2\">123123<\/td><td class=\"column-3\">(Up 7)<\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">11<\/td><td class=\"column-2\">abc123<\/td><td class=\"column-3\">(Up 4)<\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\">12<\/td><td class=\"column-2\">qwerty123<\/td><td class=\"column-3\">(Up 13)<\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\">13<\/td><td class=\"column-2\">1q2w3e4r<\/td><td class=\"column-3\">(New) <\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\">14<\/td><td class=\"column-2\">admin<\/td><td class=\"column-3\">(Down 2)<\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\">15<\/td><td class=\"column-2\">qwertyuiop<\/td><td class=\"column-3\">(New) <\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\">16<\/td><td class=\"column-2\">654321<\/td><td class=\"column-3\">(Up 3)<\/td>\n<\/tr>\n<tr class=\"row-18\">\n\t<td class=\"column-1\">17<\/td><td class=\"column-2\">555555<\/td><td class=\"column-3\">(New) <\/td>\n<\/tr>\n<tr class=\"row-19\">\n\t<td class=\"column-1\">18<\/td><td class=\"column-2\">lovely<\/td><td class=\"column-3\">(New) <\/td>\n<\/tr>\n<tr class=\"row-20\">\n\t<td class=\"column-1\">19<\/td><td class=\"column-2\">7777777<\/td><td class=\"column-3\">(New) <\/td>\n<\/tr>\n<tr class=\"row-21\">\n\t<td class=\"column-1\">20<\/td><td class=\"column-2\">welcome<\/td><td class=\"column-3\">(Down 7)<\/td>\n<\/tr>\n<tr class=\"row-22\">\n\t<td class=\"column-1\">21<\/td><td class=\"column-2\">888888<\/td><td class=\"column-3\">(New) <\/td>\n<\/tr>\n<tr class=\"row-23\">\n\t<td class=\"column-1\">22<\/td><td class=\"column-2\">princess<\/td><td class=\"column-3\">(Down 11)<\/td>\n<\/tr>\n<tr class=\"row-24\">\n\t<td class=\"column-1\">23<\/td><td class=\"column-2\">dragon<\/td><td class=\"column-3\">(New) <\/td>\n<\/tr>\n<tr class=\"row-25\">\n\t<td class=\"column-1\">24<\/td><td class=\"column-2\">password1<\/td><td class=\"column-3\">(Unchanged) <\/td>\n<\/tr>\n<tr class=\"row-26\">\n\t<td class=\"column-1\">25<\/td><td class=\"column-2\">123qwe<\/td><td class=\"column-3\">(New) <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-68 from cache -->\n<p>Morgan Slain, CEO of SplashData, <a href=\"https:\/\/gizmodo.com\/its-time-to-nervously-mock-the-50-worst-passwords-of-th-1840514905\" target=\"_blank\" rel=\"noopener noreferrer\">told<\/a> <a href=\"https:\/\/gizmodo.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Gizmodo<\/em><\/a>,<\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>Our hope &#8230; is to convince people to take steps to protect themselves online, and we think these and other efforts are finally starting to pay off. We can tell that over the years people have begun moving toward more complex passwords, though they are still not going far enough as hackers can figure out simple alphanumeric patterns.<\/em><\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>So how can you keep your online personal information safe? <\/em><\/p>\n<ol>\n<li><em><a href=\"https:\/\/web.archive.org\/web\/20200813103559\/https:\/\/natashazellerbach.weebly.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-111877\" title=\"how can you keep your online personal information safe?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/woman_business_stress-1-e1576768721717-150x98.jpg?resize=110%2C72&#038;ssl=1\" alt=\"how can you keep your online personal information safe?\" width=\"110\" height=\"72\" \/><\/a>Make sure none of your passwords are on SplashData&#8217;s worst passwords of the year list. If they are <strong>log on and change<\/strong> them immediately. See <a href=\"https:\/\/web.archive.org\/web\/20200502071304\/https:\/\/www.teamsid.com\/100-50-worst-passwords-2019\/\" target=\"_blank\" rel=\"noopener noreferrer\">the full 100 worst passwords<\/a>\u00a0on SplashData\u2019s site.<\/em><\/li>\n<li><em><a href=\"https:\/\/www.techlicious.com\/tip\/two-factor-authentication-2fa-how-it-guards-your-accounts\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Use two-factor authentication<\/strong><\/a>, whenever possible. Even if a hacker has your password, they won\u2019t have that random code and therefore won\u2019t be able to get into your account.<\/em><em> Not sure if your favorite website supports two-factor authentication, <a href=\"https:\/\/twofactorauth.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">search the Two Factor Auth List<\/a> to find out.<\/em><\/li>\n<li><em>Consider a <strong><a href=\"https:\/\/www.techlicious.com\/guide\/best-password-managers\/\" target=\"_blank\" rel=\"noopener noreferrer\">password manager<\/a><\/strong>. Your brain is no longer an adequate password manager. SplashData makes several password managers <a href=\"https:\/\/www.splashid.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">SplashID<\/a>,\u00a0<a href=\"https:\/\/web.archive.org\/web\/20240715110329\/https:\/\/www.teamsid.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">TeamsID<\/a>, and\u00a0<a href=\"https:\/\/gpass.io\/\" target=\"_blank\" rel=\"noopener noreferrer\">Gpass<\/a> depending on your needs.<\/em><\/li>\n<\/ol>\n<p><em><strong>Related article<\/strong><\/em><\/p>\n<ul>\n<li><a href=\"https:\/\/www.businessinsider.com\/worst-password-mistakes-of-2019-2019-12\" target=\"_blank\" rel=\"noopener noreferrer\">The biggest password flubs of 2019, from Facebook&#8217;s stolen data to Lisa Kudrow&#8217;s Instagram<\/a>\u00a0(<a href=\"https:\/\/www.businessinsider.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Business Insider<\/a>)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Splashdata&#8217;s 2019 list of the worst passwords is out People are still using the same compromised passwords 123456 1232456789 qwerty top the list<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3161,2682,2158,2541,4,2351],"class_list":["post-111861","post","type-post","status-publish","format-standard","hentry","category-security","tag-3161","tag-2fa","tag-fail","tag-passwords","tag-security","tag-splashdata"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/111861","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=111861"}],"version-history":[{"count":21,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/111861\/revisions"}],"predecessor-version":[{"id":131834,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/111861\/revisions\/131834"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=111861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=111861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=111861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}