4 Things Passwords Everyone Is Failing to Do Right

You have just signed up for an online service. Now, the account prompts you to create a password that meets XYZ and Z requirements. You enter your password. It may be your favorite or a close copy. The account will display a progress bar in red, orange, or green as you type your password. This indicates whether your password is strong, weak, or both.
How does it know this? It knows because there are many information on strong passwords. Similar information is available on what makes a weak password. Unfortunately, the bad guys also know this.
We thought we’d look at some of the more traditional password creation methods that you might want avoid.
Is Your Password like a Fish in A Barrel?
Although you would think that passwords would be difficult to crack, research into hundreds of data breaches has shown that it is not always that simple. Hackers can crack most passwords today. There are many reasons for this, but one thing is the most important: password fatigue.
Learn how to become a security expert with SPOTO’s Cybersecurity Training
Start trainingHow many logins does your business have? The average business user has 191 logins. This is 191 passwords required for certain services. Users tend to use the same password conventions for all services due to their sheer volume. This is a gift for hackers.
Let’s say that you choose a variant of your account’s name for your password. For example, you may choose [email protected]! Facebook. You could also use a combination your family’s birth dates. RedSox2004 could be used to commemorate the year that your favorite team broke the curse known as the Bambino.
There are actually a few passwords that hackers will be most interested in.
10 Password Hackers Will Try First [VIDEO]
Hackers are constantly trying to find new ways to steal your data. If you use any of these passwords, you are making it as easy as possible for hackers.

As you can see, your password might seem random and impossible to guess. But you would be wrong. Here are four common password mistakes hackers will have a hard time exploiting.
Make the first mistake: Do not use a common character sequence or a word.
There are billions upon billions of passwords in the wild. Literally, billions. They were exposed via data breaches, stored in unsecure S3 buckets and accidentally stored within paste bins. There are many passwords out there. They may not be able to access any information, but that doesn’t mean they aren’t useful.
WordPress’ analysis of 15 million passwords revealed that users often used the same formulaic approaches to create their passwords. These are the most common password categories they found. They also included the top three most frequently used passwords in each category.
Base phrase (word/sequence): password, qwerty and dragon
Noun: master, football, killer
Verb: Welcome, enter, please
Color: Red, blue, and black
Animal: fish, bear, monkey
Fruit: apple, orange, banana
Superhero: superman, batman, and ironman
Day of the Week: Friday, Monday, and Sunday
‘I Love …’: iloveyou, iloveU, iloves*x
“My …’: mylove. mypass.

They also discovered that given names such as John, David, and Mark were often found in usernames and passwords.
Base phrases are not always dictionary terms. Popular patterns for smartphones and the computer keyboard are also common. A quick glance at your smartphone’s keyboard will show you why sequences like qwerty and asdfgdh pop up with regularity. You can also check adgjmptw by pressing the keys 1 through 8.
People tend to be predictable when it comes to choosing base phrases. Trustwave’s 2015 Global Security Report outlined common keywords that they found in penetration testing of more than 440,000 corporate client accounts. Nearly 10% of passwors were found during penetration testing of over 440,000 corporate client user accounts.