{"id":660,"date":"2012-11-29T10:00:05","date_gmt":"2012-11-29T15:00:05","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=660"},"modified":"2020-02-26T10:35:55","modified_gmt":"2020-02-26T15:35:55","slug":"the-6-worst-password-ideas","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/the-6-worst-password-ideas\/660\/","title":{"rendered":"The 6 Worst Password Ideas"},"content":{"rendered":"<p>Making a good password is more important than ever and with as many sensitive accounts \u2013 email, credit cards, shared documents \u2013 as we have online today there\u2019s simply no excuse for using bad passwords. You should always create a password that is easy for you to remember but would be very difficult for a stranger to guess. That may sound like a contradiction, but it\u2019s not as difficult as it seems.<\/p>\n<p>Still, some people haven\u2019t caught on to that yet. Here\u2019s a list of the six worst ideas for creating passwords.<\/p>\n<ol>\n<li><strong>Simple, successive<\/strong>: It might be easy for you to remember \u2018123456,\u2019 or \u2018qwerty,\u2019 but guess what: Anyone who has ever seen a keyboard will be in your email in about 30 seconds. Making your password the same as, or related to, your login is also a serious mistake. Remember, when it comes to creating passwords, simplicity is bad, and complexity is your friend.<\/li>\n<li>\u00a0<strong>The name of a loved one<\/strong>: You might love your mom to pieces, but using her name as the key to all things dear to you is easy pickings for an attacker. Your favorite niece\u2019s name or your dog\u2019s name isn\u2019t any better, especially when that information might be posted on your Facebook page for all to see.<\/li>\n<li><strong>Getting cute<\/strong>: Yes, the goal of a password is to keep people out. But using that theme as your password \u2013 \u2018password,\u2019 \u2018keepout,\u2019 \u2018letmein,\u2019 \u2018stayaway\u2019 \u2013 will have exactly the opposite result of what you\u2019re looking for.<\/li>\n<li><strong>Cool words<\/strong>: Some words are cool and easy to remember. That also means that they aren\u2019t just always on the tip of your tongue \u2013 they\u2019re on the tip of hackers\u2019 tongues too. Stay away from words like \u2018dragon,\u2019 \u2018mustang\u2019 and \u2018ninja.\u2019<\/li>\n<li><strong>Sports!<\/strong>: Everybody loves sports, right? Well, hackers do too. If you\u2019re inclined to pick your favorite sport as your password \u2013 don\u2019t. Words like \u2018football,\u2019 \u2018baseball,\u2019 or \u2018soccer\u2019 aren\u2019t worth the digital pixels that created them.<\/li>\n<li><strong>Simple fixes<\/strong>: Taking passwords that are simple and adding the slightest of curveballs won\u2019t work either. Just because you added a numeral or an exclamation mark \u2013 \u2018passw0rd,\u2019 \u2018basebalL\u2019 \u2018mother!\u2019 \u2013 to your easily decodable entry key doesn\u2019t mean your accounts are secure. They aren\u2019t. It\u2019s important to mix lower case letters, upper case letters, numerals and special characters into your password, but don\u2019t be predictable about it.<\/li>\n<\/ol>\n<p><strong>What you can do<\/strong>: Develop complex passwords with a mix of lower and upper case letters, numbers and special characters and ensure you use a different password for each site, according to <a href=\"https:\/\/www.securelist.com\/en\/blog\/208193675\/How_to_survive_attacks_that_result_in_password_leaks\" target=\"_blank\" rel=\"noopener nofollow\">Dmitry Bestuzhev, a Kaspersky Lab researcher<\/a>. \u201cRemember, you can\u2019t stop your service provider being hacked, but you can avoid a bigger disaster when all of your accounts get compromised at once just because you used the same password,\u201d he said.<\/p>\n<p>If you have trouble remembering or creating strong, complex passwords, try <a href=\"https:\/\/usa.kaspersky.com\/products-services\/home-computer-security\/password-manager?domain=kaspersky.com\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>, which can handle those duties for you and stores them in a cryptographically secured state.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Making a good password is more important than ever and with as many sensitive accounts \u2013 email, credit cards, shared documents \u2013 as we have online today there\u2019s simply no<\/p>\n","protected":false},"author":32,"featured_media":669,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[187,97],"class_list":{"0":"post-660","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-passwords","9":"tag-security-2"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/the-6-worst-password-ideas\/660\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/the-6-worst-password-ideas\/660\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/the-6-worst-password-ideas\/660\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/the-6-worst-password-ideas\/660\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/the-6-worst-password-ideas\/660\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/the-6-worst-password-ideas\/441\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/the-6-worst-password-ideas\/660\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/the-6-worst-password-ideas\/660\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/passwords\/","name":"passwords"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/660","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=660"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/660\/revisions"}],"predecessor-version":[{"id":32670,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/660\/revisions\/32670"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/669"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=660"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=660"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}