{"id":9071,"date":"2021-11-22T15:11:26","date_gmt":"2021-11-22T15:11:26","guid":{"rendered":"http:\/\/TheNextWeb=1373802"},"modified":"2021-11-22T15:11:26","modified_gmt":"2021-11-22T15:11:26","slug":"here-are-the-most-common-passwords-of-2021-is-yours-on-the-list","status":"publish","type":"post","link":"https:\/\/www.londonchiropracter.com\/?p=9071","title":{"rendered":"Here are the most common passwords of 2021, is yours on the list?"},"content":{"rendered":"\n<p>If you use \u201c123456\u201d, \u201cpassword\u201d or \u201cqwerty\u201d as a password, you\u2019re probably aware that you\u2019re leaving yourself vulnerable to hackers. But you\u2019re also not alone \u2013 these are three of the top ten most common passwords around the world, according to a <a href=\"https:\/\/nordpass.com\/most-common-passwords-list\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">new report<\/a>.<\/p>\n<p>In partnership with independent researchers, password management service NordPass compiled millions of passwords into a dataset to determine the 200 most commonly used passwords around the world in 2021.<\/p>\n<p>They analyzed the data and presented results across 50 countries, looking at how popular various choices were in different parts of the world. They also looked at password trends by gender.<\/p>\n<p>The findings show password choices are often attached to cultural references. For example, people across several countries take inspiration from their favorite football team. In the UK, \u201cliverpool\u201d was the third most popular password, with 224,160 hits, while the name of Chilean football club \u201ccolocolo\u201d was used by 15,748 people in Chile, making it the fifth most common choice.<\/p>\n<p>In some countries passwords relating to religion were popular. For example, \u201cchrist\u201d was the 19th most common password used in Nigeria, used 7,169 times. Meanwhile, \u201cbismillah\u201d, an Arabic phrase meaning in the name of Allah, was used by 1,599 people in Saudi Arabia \u2013 the 30th most common choice.<\/p>\n<p>The report also reflected differences between genders. Women tend to use more positive and affectionate words and phrases such as \u201csunshine\u201d or \u201ciloveyou\u201d, while men often use sports-related passwords. In some countries, men use more swear words than women.<\/p>\n<p>While music-themed passwords were popular across both genders, choices like \u201conedirection\u201d or \u201cjustinbieber\u201d were more popular among women, whereas men favored bands such as \u201cmetallica\u201d and \u201cslipknot\u201d.<\/p>\n<h2>Choose long and complex passwords<\/h2>\n<p>Passwords remain the main authentication mechanism for computers and network-based products and services. But we know people continue to choose weak passwords and often don\u2019t manage them securely, leaving them vulnerable to online security threats.<\/p>\n<p>Weak passwords are easy to guess and can be cracked with minimal difficulty by attackers using <a href=\"https:\/\/www.cloudflare.com\/en-gb\/learning\/bots\/brute-force-attack\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">brute-force methods<\/a> (trying all letter, number, and symbol combinations to find a match). They are also easy targets for a <a href=\"https:\/\/www.sciencedirect.com\/topics\/computer-science\/dictionary-attack\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">dictionary attack<\/a>, which is a systematic method attackers use to guess a password, trying many common words and variations of these.<\/p>\n<p>To overcome the security issues associated with password-based authentication systems, researchers and developers are now focused on creating authentication systems which <a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=9152694\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">don\u2019t rely<\/a> on passwords at all.<\/p>\n<p>In the meantime, two-factor authentication (2FA) or multi-factor authentication (MFA) methods are a good way to secure your accounts. These methods combine a password with biometrics information (for example, a face scan or fingerprint) or something you have, like a token.<\/p>\n<p>You can create a password that\u2019s both strong and memorable by combining <a href=\"https:\/\/www.ncsc.gov.uk\/blog-post\/three-random-words-or-thinkrandom-0\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">three random words<\/a>. <a href=\"https:\/\/www.ncsc.gov.uk\/collection\/passwords\/updating-your-approach\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Machine-generated passwords<\/a> are also difficult to guess and less likely to appear in password dictionaries used by attackers.<\/p>\n<p>But of course, all of this is easier said than done. One of the challenges we face in today\u2019s digital age is password overload. And it can be difficult to remember complex passwords, particularly machine-generated ones.<\/p>\n<p>So it\u2019s a good idea to use a reliable password manager for this purpose. Relying on your web browser to remember your passwords is less secure \u2013 it\u2019s possible attackers can exploit vulnerabilities in the browser to access stored passwords.<\/p>\n<p>NordPass\u2019 findings, although not published in a peer-reviewed journal, align with what we know from <a href=\"https:\/\/www.teampassword.com\/blog\/top-50-worst-passwords-of-2019\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">similar lists<\/a> published elsewhere \u2013 that the most popular passwords are weak.<\/p>\n<p>Hopefully, if you see one of your passwords on this list, it will be an impetus to change it to something stronger. Ethical hackers \u2013 people who work to prevent computers and networks from being hacked \u2013 could also use these insights for good. On the other hand, we have to acknowledge the possibility that hackers could use this information to target password attacks. This should be all the more reason to strengthen your passwords.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/counter.theconversation.com\/content\/171985\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" class=\"js-lazy\"><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https:\/\/theconversation.com\/republishing-guidelines --><\/p>\n<p><noscript><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/counter.theconversation.com\/content\/171985\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" class><\/noscript><\/p>\n<p><em>Article by <a href=\"https:\/\/theconversation.com\/profiles\/chaminda-hewage-808758\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Chaminda Hewage<\/a>, Reader in Data Security, <a href=\"https:\/\/theconversation.com\/institutions\/cardiff-metropolitan-university-1585\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Cardiff Metropolitan University<\/a> and <a href=\"https:\/\/theconversation.com\/profiles\/elochukwu-ukwandu-1234613\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Elochukwu Ukwandu<\/a>, Lecturer in Computer Security, Department of Computer Science, <a href=\"https:\/\/theconversation.com\/institutions\/cardiff-metropolitan-university-1585\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Cardiff Metropolitan University<\/a><\/em><\/p>\n<p><em>This article is republished from <a href=\"https:\/\/theconversation.com\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/most-common-passwords-of-2021-heres-what-to-do-if-yours-makes-the-list-171985\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">original article<\/a>.<\/em><\/p>\n<p> <a href=\"https:\/\/thenextweb.com\/news\/most-common-passwords-2021-is-yours-on-the-list-syndication\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you use \u201c123456\u201d, \u201cpassword\u201d or \u201cqwerty\u201d as a password, you\u2019re probably aware that you\u2019re leaving yourself vulnerable to hackers. But you\u2019re also not alone \u2013 these are three of the top&#8230;<\/p>\n","protected":false},"author":1,"featured_media":9072,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts\/9071"}],"collection":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9071"}],"version-history":[{"count":0,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts\/9071\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/media\/9072"}],"wp:attachment":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}