They‘re all weak passwords! Not only are these passwords predictable, they also top the list of the 25 most widely used passwords of 2016.
So despite security experts’ constant efforts to alert users about cyber security and the need to use unique passwords and avoid patterns, most users reuse their passwords with minor alterations.
Believe me when I say that password increments are the most common of them all.
For instance, when a user changes their password from Pa$$word to Pa$$word1 and finally to Pa$$word2, even a three-year-old can guess what password they’ll use next!
To anyone who asks, “What are the chances of you guessing someone’s password?” (unless you find the little sticky note behind their computer)—have you heard of brute force attacks?
Passwords are often stored as hashes, so once a hacker cracks the hash pattern they can decode hashed passwords. With access to a user’s account, not only can hackers misuse the user’s identity, but they can also cause unimaginable damage inside the organizational network.
With the intent to avoid all kinds of weak password troubles, we’ve come up with a tool that identifies users who have weak passwords. How? By comparing users’ passwords to a customizable list of prohibited words or patterns. That way, admins can generate a detailed report for a particular domain, letting them know which users have weak passwords.
Thanks to the Weak Password Users Report tool, you can take the necessary precautions to avoid weak password usage. Get started right away. It’s completely free!
But guess what’s better than alerting users about their weak passwords? Enforcing a password policy that forces them to choose a smart and secure password. When you have a chance to sandbag hackers, why let it go? Get your passwords up to snuff with ADSelfService Plus. Click here for a free 30-day trial.
P.S. Thanks to ADSelfService Plus’ granular password policy enforcer, dictionary words are ruled out from passwords. Now I can’t use Supercalifragilisticexpialidocious as my password!