{"id":2912,"date":"2017-12-27T18:54:21","date_gmt":"2017-12-27T18:54:21","guid":{"rendered":"https:\/\/tsisupport.com\/?p=2912"},"modified":"2020-05-27T12:51:26","modified_gmt":"2020-05-27T12:51:26","slug":"top-25-popular-passwords-2017","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=2912","title":{"rendered":"Top 25 Most Popular Passwords of 2017"},"content":{"rendered":"<p>Each year, researchers from <a href=\"http:\/\/splashdata.com\/index.htm\" target=\"_blank\" rel=\"noopener noreferrer\">SplashData <\/a>revealed the worst passwords of 2017, based on the over 5 million stolen login credentials made public over the year.\u00a0 Despite the countless warnings from cybersecurity experts, people continue to choose weak, easily guessable passwords to protect their most precious information. Case in point, the top two most popular phrases were yet again \u2018123456\u2019 and \u2018password.\u2019<\/p>\n<p>The list features several other ineffective passwords that have long-remained on the list.\u00a0 This includes \u2018qwerty\u2019 in fourth place, \u2018admin,\u2019 in 11<sup>th<\/sup>, and of course \u2018login\u2019, in 14<sup>th<\/sup>.\u00a0 However, we did see some new entries on SplashData\u2019s annual list, like \u2018starwars,\u2019 \u2018monkey,\u2019 \u2018iloveyou,\u2019 \u2018whatever,\u2019 \u2018freedom,\u2019 and ironically \u2018trustno1,\u2019 to name a few.<\/p>\n<p>\u2018Unfortunately, while the newest episode may be a fantastic addition to the Star Wars franchise, \u2018starwars\u2019 is a dangerous password to use,\u2019 said Morgan Slain, CEO of <a href=\"http:\/\/splashdata.com\/index.htm\" target=\"_blank\" rel=\"noopener noreferrer\">SplashData<\/a>.\u00a0 \u2018Hackers are using common terms from pop culture and sports to break into accounts online because they know many people are using those easy-to-remember words.\u2019<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8607\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/12\/Top-25.png\" alt=\"\" width=\"1650\" height=\"475\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/12\/Top-25.png 1650w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/12\/Top-25-300x86.png 300w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/12\/Top-25-1024x295.png 1024w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/12\/Top-25-768x221.png 768w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/12\/Top-25-1536x442.png 1536w\" sizes=\"(max-width: 1650px) 100vw, 1650px\" \/><\/p>\n<p><a href=\"http:\/\/splashdata.com\/index.htm\" target=\"_blank\" rel=\"noopener noreferrer\">SplashData <\/a>hopes this list will encourage people to take better safety precautions online.\u00a0 There are several themes across the Worst Passwords list, including first names, car brands, and hobbies.<\/p>\n<p style=\"text-align: center;\"><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-93535d52-8e56-4eed-bdd2-bb583f6ed9ca\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-93535d52-8e56-4eed-bdd2-bb583f6ed9ca\" class=\"hs-cta-node hs-cta-93535d52-8e56-4eed-bdd2-bb583f6ed9ca\"><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/700924\/93535d52-8e56-4eed-bdd2-bb583f6ed9ca?utm_source=hs_email\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8608 size-full\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/12\/93535d52-8e56-4eed-bdd2-bb583f6ed9ca.png\" alt=\"\" width=\"419\" height=\"40\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/12\/93535d52-8e56-4eed-bdd2-bb583f6ed9ca.png 419w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/12\/93535d52-8e56-4eed-bdd2-bb583f6ed9ca-300x29.png 300w\" sizes=\"(max-width: 419px) 100vw, 419px\" \/><\/a><!-- [if lte IE 8]><\/p>\n\n\n\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<p><span style=\"color: #800000;\"><strong>Best Practice for Passwords<\/strong><\/span><\/p>\n<p>A strong password should be long.\u00a0 The enemy isn\u2019t some guy in a ski mask trying to guess your password one attempt at a time.\u00a0 It\u2019s a program that automatically runs through massive databases of common passwords or random combinations of characters. It is also highly recommended to avoid regular words as many hackers will use \u201c<a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/dictionary-attack\" target=\"_blank\" rel=\"noopener noreferrer\">dictionary attacks<\/a>\u201d, it\u2019s best to add capital letters, special characters, and numbers. \u00a0Other tips include:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8609\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/12\/5-Tips.png\" alt=\"\" width=\"1650\" height=\"323\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/12\/5-Tips.png 1650w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/12\/5-Tips-300x59.png 300w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/12\/5-Tips-1024x200.png 1024w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/12\/5-Tips-768x150.png 768w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/12\/5-Tips-1536x301.png 1536w\" sizes=\"(max-width: 1650px) 100vw, 1650px\" \/><\/p>\n<p><span style=\"color: #800000;\">Source: <a href=\"http:\/\/splashdata.com\/index.htm\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/splashdata.com\/index.htm<\/a><\/span><\/p>\n<div class=\"fl-builder-content fl-builder-content-8352 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8352\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-5ecccdbce25c0 fl-row-default-height fl-row-align-center fl-row-bg-overlay BlogCTA\" data-node=\"5ecccdbce25c0\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecccdbce2d8e fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecccdbce2d8e\">\n\t\t\t<div class=\"fl-col fl-node-5ecccdbce2f49 fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecccdbce2f49\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5eccce25ec3d2 sec-title title-img-none\" data-node=\"5eccce25ec3d2\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Confident with Your IT Strategy?<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5eccce77546d9\" data-node=\"5eccce77546d9\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you found the information in this blog post helpful and you'd like to discuss your business' technology strategy, then we'd be happy to hear from you.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecccec3237e8 primary-btn\" data-node=\"5ecccec3237e8\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecccf1e8a49c fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecccf1e8a49c\">\n\t<div class=\"fl-col-content fl-node-content\"><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Each year, researchers from SplashData revealed the worst passwords of 2017, based on the over 5 million stolen login credentials made public over the year.\u00a0 Despite the continued warnings from cybersecurity experts, people continue to choose weak, easily guessable passwords to protect their most precious information.<\/p>\n","protected":false},"author":2,"featured_media":8605,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[129,275,175,21],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top 25 Most Popular Passwords of 2017 - TSI Support<\/title>\n<meta name=\"description\" content=\"Here is a list of top 25 ineffective passwords that are more likely to cause damage than protect your data. Also, learn about the best practices for passwords.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 25 Most Popular Passwords of 2017 - TSI Support\" \/>\n<meta property=\"og:description\" content=\"Here is a list of top 25 ineffective passwords that are more likely to cause damage than protect your data. Also, learn about the best practices for passwords.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=2912\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2017-12-27T18:54:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-27T12:51:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/12\/Passwords-Header-1140x381-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"342\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roger Murray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Murray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2912\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2912\",\"name\":\"Top 25 Most Popular Passwords of 2017 - TSI Support\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2912#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2912#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/12\/Passwords-Header-1140x381-1.png\",\"datePublished\":\"2017-12-27T18:54:21+00:00\",\"dateModified\":\"2020-05-27T12:51:26+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\"},\"description\":\"Here is a list of top 25 ineffective passwords that are more likely to cause damage than protect your data. Also, learn about the best practices for passwords.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2912#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=2912\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2912#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/12\/Passwords-Header-1140x381-1.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/12\/Passwords-Header-1140x381-1.png\",\"width\":1024,\"height\":342},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2912#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 25 Most Popular Passwords of 2017\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\",\"name\":\"Roger Murray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"caption\":\"Roger Murray\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 25 Most Popular Passwords of 2017 - TSI Support","description":"Here is a list of top 25 ineffective passwords that are more likely to cause damage than protect your data. Also, learn about the best practices for passwords.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Top 25 Most Popular Passwords of 2017 - TSI Support","og_description":"Here is a list of top 25 ineffective passwords that are more likely to cause damage than protect your data. Also, learn about the best practices for passwords.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=2912","og_site_name":"TSI Support","article_published_time":"2017-12-27T18:54:21+00:00","article_modified_time":"2020-05-27T12:51:26+00:00","og_image":[{"width":1024,"height":342,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/12\/Passwords-Header-1140x381-1.png","type":"image\/png"}],"author":"Roger Murray","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Murray","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2912","url":"https:\/\/tsisupport.com\/tsistaging\/?p=2912","name":"Top 25 Most Popular Passwords of 2017 - TSI Support","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2912#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2912#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/12\/Passwords-Header-1140x381-1.png","datePublished":"2017-12-27T18:54:21+00:00","dateModified":"2020-05-27T12:51:26+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9"},"description":"Here is a list of top 25 ineffective passwords that are more likely to cause damage than protect your data. Also, learn about the best practices for passwords.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2912#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=2912"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2912#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/12\/Passwords-Header-1140x381-1.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/12\/Passwords-Header-1140x381-1.png","width":1024,"height":342},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2912#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Top 25 Most Popular Passwords of 2017"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9","name":"Roger Murray","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","caption":"Roger Murray"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/2912"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2912"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/2912\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8605"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2912"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2912"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2912"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}