This website uses cookies to ensure you get the best experience on our website. Learn more
Why Mark Zuckerberg’s password should concern you
Mark Zuckerberg’s password was hacked earlier this month. Not only did he use a simple password – dadada, but he also reused it across different services. Why should this make you worry? Because Zuckerberg’s negligence reflects current password norms that your employees have made a habit out of, including:
- Using the same password whenever possible;
- Rotating through a variety of similar passwords;
- Keeping a written password in a master book of passwords;
- Using personal information in a password; and
- Avoiding special characters
Take a quick look at how many passwords each employee has to manage and you will understand why it’s tempting to take the shortcuts. A typical person has to manage work emails, personal emails, banks, social media, just to name a few. When employees are juggling a long list of passwords, it is likely that they will choose convenience over password security and make some of the above-mentioned mistakes. So what can you do to change poor password habits?
Here are a few suggestions:
- Never stops training: Most employees have good intentions However, they still make these common mistakes because they are unaware of the security risks. It helps to schedule ongoing training sessions to educate your employees on password best practices.
- Disable dictionary words for single-word passwords: Dictionary words can be common words likely to be used as passwords, including names, dates or numbers. When dictionary words are used alone or with minor modifications such as with a string of numbers e.g. family123, they can be easily discovered through brute-force attacks. Given that most users tend to opt for such passwords, this can be a difficult requirement to meet. A good way to solve this problem is enabling passphrases.
- Enable passphrases. A strong password is a passphrase that is entirely nonsensical to a password cracking tool but memorable to humans. Passphrases don’t need strict dictionary checks since most passphrases have a minimum requirement of 15 characters, making it harder for a dictionary attack to succeed. The length requirement encourages users to create something like ILuv2PlayS@ccer or T@morrow I leave for Disneyland! which are extremely hard for password cracking tools to guess but easy for users to remember.
(Last updated on October 30, 2023)
Related Articles
-
“123456” and “password” continue to be the most commonly used passwords, when will people learn?
Here is a list of the top 25 most common passwords of 2016. Your policy may not allow weak passwords such as 123456 or password, but even if the password complexity requirement is enabled in the standard Windows Password Policy, users can still create insecure passwords such as such as Password123, Company2015, January1 and LetMeIn2015….
Read More -
Create a secure password you can actually remember
A strong password is long and complex. Adding spaces, upper case, and special characters make it harder to crack. But if you take user behavior into consideration, it is unrealistic to expect them to create and remember long passwords made up of random characters. Most users use dictionary words as the root to their complex…
Read More