SlideShare une entreprise Scribd logo
1  sur  7
The worst passwords of 2012
It’s getting difficult these days to be a
technology user. You need passwords for
everything, and you can’t use the same
one for everything. Also, IT departments
are increasingly enforcing policy around
how often you must change passwords,
and well as their composition.

One can feel the user’s pain, but still,
there’s no excusing these selections from
SplashData’s “Worst Passwords of 2012”
list. Frankly, if one of these was your
passwords, you’re the reason IT policies
exist.
                                            Image courtesy of digitalartat FreeDigitalPhotos.net



              By Jeff Jedras
#17: welcome (new)
The top newcomer to this year’s worst
passwords list is, appropriately enough,
welcome.

So first of, welcome to the list, welcome. And
second, you’re a horrible password.

You may as well just be saying “welcome to
my computer and its confidential data, evil
doers.”

To look at it more positively, while we may be
a less welcoming society in general these
days, apparently that trend doesn’t apply to     Image courtesy of John Kasawa FreeDigitalPhotos.net

our computers.
#14: sunshine (up 1)
                                                          It’s comforting on one level to know
                                                          that there are happy, cheerful people
                                                          out there that put bright and positive
                                                          words such as sunshine as their
                                                          passwords.

                                                          But while sunshine may be the best
                                                          disinfectant (other than bleach), it’s not
                                                          the best password for your confidential
                                                          accounts.

                                                          For those, a little less sunshine and a
                                                          little more security is probably in order.

Image courtesy of Salvatore Vuono FreeDigitalPhotos.net
#12: trustno1 (down 3)
First of all, kudos for the X-Files
reference (if it’s a reference to Dave
Navarro’s solo album, kudos withdrawn).

And trusting no one is the right attitude
to have when it comes to picking your
password and IT security.

Perhaps you’re still trusting too many
people though, as trustno1 finishing
fairly high up the worst passwords list.

Heed your own advice, and pick a
stronger password.
#11: iloveyou (up 2)
While it is nice to see that the love is
growing, with iloveyou moving two spots up
the worst passwords list this year, the
people that really love it are the password
crackers and hackers.

When it comes to IT security, there’s no
place for love. Not unless you throw in
random capitalization and a random symbol
or two.

That would be a password an IT manager
could love.


  Image courtesy of Stuart Miles FreeDigitalPhotos.net
#7: letmein (up 1)
This is the default password for many IT
shops.

When policy isn’t enforced though, many
users never change it from the default,
which is why it’s so high up on the worst
passwords list and is up one spot over last
year.

At least it’s truth in advertising though: with
letmein as your password, you are proffering
an open invitation for your account to be
hacked.
                                                  Image courtesy of graur codrin FreeDigitalPhotos.net
#1: password (unchanged)
Honestly, if you put password as your
password you should just do yourself a favour
and wire your life savings to Nigeria now.

Perhaps you thought you were being clever.
Maybe your theory was that password is an
easy password to remember, and no one
would think people would be foolish enough
to make password their password, so you’ll
be safe.

Well, you’re crazy. And you have the worst
password of 2012.

                                                Image courtesy of Stuart Miles FreeDigitalPhotos.net
And probably the worst of every other year
too.

Contenu connexe

Plus de JeffJedras

Five weird wearable computers
Five weird wearable computersFive weird wearable computers
Five weird wearable computers
JeffJedras
 

Plus de JeffJedras (20)

The techie’s summer reading list
The techie’s summer reading listThe techie’s summer reading list
The techie’s summer reading list
 
Social media screw-ups you *must* avoid
Social media screw-ups you *must* avoidSocial media screw-ups you *must* avoid
Social media screw-ups you *must* avoid
 
Five must-have apps for your summer travels
Five must-have apps for your summer travelsFive must-have apps for your summer travels
Five must-have apps for your summer travels
 
Five embarrassing mobile device thefts
Five embarrassing mobile device theftsFive embarrassing mobile device thefts
Five embarrassing mobile device thefts
 
Five far-out tech office environments
Five far-out tech office environmentsFive far-out tech office environments
Five far-out tech office environments
 
Five outrageously expensive mobile phones
Five outrageously expensive mobile phonesFive outrageously expensive mobile phones
Five outrageously expensive mobile phones
 
Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)
 
The long, slow, fictional death of the PC
The long, slow, fictional death of the PCThe long, slow, fictional death of the PC
The long, slow, fictional death of the PC
 
Did you know they were Canadian?
Did you know they were Canadian?Did you know they were Canadian?
Did you know they were Canadian?
 
The top tech buzzwords of 2013
The top tech buzzwords of 2013The top tech buzzwords of 2013
The top tech buzzwords of 2013
 
History's most notorious hackers
History's most notorious hackersHistory's most notorious hackers
History's most notorious hackers
 
Top social media hoaxes
Top social media hoaxesTop social media hoaxes
Top social media hoaxes
 
Five innovative laptop concept designs
Five innovative laptop concept designsFive innovative laptop concept designs
Five innovative laptop concept designs
 
Five weird wearable computers
Five weird wearable computersFive weird wearable computers
Five weird wearable computers
 
Baby names with a tech twist
Baby names with a tech twistBaby names with a tech twist
Baby names with a tech twist
 
Six unfortunate tech product names
Six unfortunate tech product namesSix unfortunate tech product names
Six unfortunate tech product names
 
Five spooky IT infographics
Five spooky IT infographicsFive spooky IT infographics
Five spooky IT infographics
 
Five Apple failures to launch
Five Apple failures to launchFive Apple failures to launch
Five Apple failures to launch
 
Six weird iPhone apps
Six weird iPhone appsSix weird iPhone apps
Six weird iPhone apps
 
Six new products we couldn’t possibly need
Six new products we couldn’t possibly needSix new products we couldn’t possibly need
Six new products we couldn’t possibly need
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

The worst passwords of 2012

  • 1. The worst passwords of 2012 It’s getting difficult these days to be a technology user. You need passwords for everything, and you can’t use the same one for everything. Also, IT departments are increasingly enforcing policy around how often you must change passwords, and well as their composition. One can feel the user’s pain, but still, there’s no excusing these selections from SplashData’s “Worst Passwords of 2012” list. Frankly, if one of these was your passwords, you’re the reason IT policies exist. Image courtesy of digitalartat FreeDigitalPhotos.net By Jeff Jedras
  • 2. #17: welcome (new) The top newcomer to this year’s worst passwords list is, appropriately enough, welcome. So first of, welcome to the list, welcome. And second, you’re a horrible password. You may as well just be saying “welcome to my computer and its confidential data, evil doers.” To look at it more positively, while we may be a less welcoming society in general these days, apparently that trend doesn’t apply to Image courtesy of John Kasawa FreeDigitalPhotos.net our computers.
  • 3. #14: sunshine (up 1) It’s comforting on one level to know that there are happy, cheerful people out there that put bright and positive words such as sunshine as their passwords. But while sunshine may be the best disinfectant (other than bleach), it’s not the best password for your confidential accounts. For those, a little less sunshine and a little more security is probably in order. Image courtesy of Salvatore Vuono FreeDigitalPhotos.net
  • 4. #12: trustno1 (down 3) First of all, kudos for the X-Files reference (if it’s a reference to Dave Navarro’s solo album, kudos withdrawn). And trusting no one is the right attitude to have when it comes to picking your password and IT security. Perhaps you’re still trusting too many people though, as trustno1 finishing fairly high up the worst passwords list. Heed your own advice, and pick a stronger password.
  • 5. #11: iloveyou (up 2) While it is nice to see that the love is growing, with iloveyou moving two spots up the worst passwords list this year, the people that really love it are the password crackers and hackers. When it comes to IT security, there’s no place for love. Not unless you throw in random capitalization and a random symbol or two. That would be a password an IT manager could love. Image courtesy of Stuart Miles FreeDigitalPhotos.net
  • 6. #7: letmein (up 1) This is the default password for many IT shops. When policy isn’t enforced though, many users never change it from the default, which is why it’s so high up on the worst passwords list and is up one spot over last year. At least it’s truth in advertising though: with letmein as your password, you are proffering an open invitation for your account to be hacked. Image courtesy of graur codrin FreeDigitalPhotos.net
  • 7. #1: password (unchanged) Honestly, if you put password as your password you should just do yourself a favour and wire your life savings to Nigeria now. Perhaps you thought you were being clever. Maybe your theory was that password is an easy password to remember, and no one would think people would be foolish enough to make password their password, so you’ll be safe. Well, you’re crazy. And you have the worst password of 2012. Image courtesy of Stuart Miles FreeDigitalPhotos.net And probably the worst of every other year too.