Skip to content

The World’s Most Hacked Passwords

Passwords protect our data, safeguard our finances, and ensure personal information stays private. How we choose to secure our system information can be our greatest strength — or the Achilles’ Heel of database management. Keep your company off the list of shame with these simple password do’s and don’t.

The Weak Password Most Wanted List

A recent report published by the UK’s National Cyber Security Center revealed the world’s most hacked passwords. The top ten worst passwords in terms of vulnerability shouldn’t come as a surprise to even the most casual techie, but they’re worth reviewing nonetheless. The big ten when it comes to weak passwords are:

1. 123456

2. 123456789

3. qwerty

4. password

5. 111111

6. 12345678

7. abc123

8. 1234567

9. password1

10. 1234

As a general rule, passwords containing obvious letter or number sequences are extremely easy to hack both manually and by algorithms that run hundreds of possible combinations to crack your security. Any information that is simple to obtain or common knowledge should not be used. This includes names of pets, people, sports teams, musicians, colors, and cities. These kinds are as outdated as dial-up and should be shelved along with certain browsers we won’t mention. When it comes to securing your data, complexity is key.

How to Get on the Nice List

Creating a secure system is simple as 123 — as long as you aren’t using 123 for your password, that is. Opt for passwords that are at least 12 characters. A combination of numbers, letters, and symbols is best. Avoid obvious substitutes such as swapping an “o” for a zero.

Still trying to come up with a combination that works for your computer? Consider using sentences with the aforementioned guidelines (capitals, lowercase, numbers, symbols) and be sure to change your password every six months. If you have trouble remembering your passwords, password managers are highly helpful in keeping track of your credentials. When used alongside fully managed IT services, these resources allow business owners the freedom to devote their energy elsewhere, without the constant worry of a data breach.

If you’ve been considering increasing data security, check out our handy vulnerability test tool and find out how yours stack up. Not quite hitting the mark? Don’t panic! Our tech experts are just a click away to meet all of your compliance needs.

a close up of a radio with the time displayed

Why You Need a UPS in Your Network Equipment

Apart from securing your computer network against breaches, it is advisable to ensure that the network hardware is plugged into a UPS (uninterruptible power supply) system.

the word rules spelled with scrabble tiles

What Are The Three Rules of HIPAA?

The Health Insurance Portability and Accountability Act (HIPAA) lays out three rules for protecting patient health information, namely: The Privacy

wheel house it logo

Let's Start a Conversation

Fill out the form below and a member of our team will contact you within 10 minutes. (Mon-Fri 8am-6pm EST)

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Let's Start a Conversation

Rory from wheel house IT

Call (954) 474-2204, option 2 to speak with a representative.

Send us an email at

Or contact us by form below:

"*" indicates required fields

This field is for validation purposes and should be left unchanged.