IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

7 Characteristics of Weak Passwords (Infographic)

It might be obvious, but adding characters and complexity improves security.

Protecting your online identity by using the name of your first born child or your beloved Golden Retriever as your password might seem an appropriate homage. But a new infographic from PasswordGenie predicts dire consequences for users of unimaginative passwords. In fact, the simpler the password, the faster a hacker can gain access to your protected information and wreak havoc on your finances and your life.

Data from recent password breaches at Yahoo, LinkedIn and reveals that some passwords are particularly vulnerable. An all lowercase password with 6 characters can be hacked into within 10 minutes, while adding complexity with additional characters and the use of upper case letters, numbers and symbols can extend that timeframe into decades and even millennia.

Common components of easy-to-hack passwords:
1. Repeating previously used passwords
2. Names of close family members or friends
3. Your name
4. Words in the dictionary
5. Common names
6. Repeating your login code
7. Keyboard patterns and swipes (i.e., 123456 or QWERTY)

Click on the infographic for a larger view.

PWG_Infographic copy


Special Projects
Sponsored Articles
  • Sponsored
    Smart cities could transform urban living for the better. However, in order to mitigate the risks of cyber threats that can be exacerbated by inadequately secured and mobile edge computing (MEC) technologies, government officials should be aware of smart cities security concerns associated with their supporting infrastructure.
  • Sponsored
    How the convergence of security and networking is accelerating government agencies journey to the cloud.
  • Sponsored
    Microsoft Teams quickly became the business application of choice as state and local governments raced to equip remote teams and maintain business continuity during the COVID-19 lockdown. But in the rush to deploy Teams, many organizations overlook, ignore or fail to anticipate some of the administrative hurdles to successful adoption. As more organizations have matured their use of Teams, a set of lessons learned has emerged to help agencies ensure a successful Teams rollout – or correct course on existing implementations.
  • Sponsored
    Five Key Criteria for Selecting the Right Technology Solution for Communications and Notifications