Gemalto is now part of the Thales Group, find out more.
Skip to content
Gemalto: Security to be free
Our blogs: Conversations around digital security
Search
Back to articles
  • Home
  • Mobile
  • Enterprise Security
  • IoT
  • Financial Services
  • Government
  • Software Monetization
  • Featured Bloggers
    • Gemalto (658)
    • Manfred Kube (113)
    • Tim Cawsey (83)
    • Jennifer Dean (62)
    • Marta Bordonada (59)
    • Rémi de Fouchier (53)
    • Arta Sylejmani (41)
    • Dominique Brulé (38)
    • Philippe Benitez (37)
    • Didier Benkoel-Adechy (32)
    • Maria Barbieri (30)
    • Kristel Teyras (24)
    • Haider Iqbal (21)
    • Xavier Larduinat (21)
    • Neville Pattinson (20)
    • Sebastien Violette (20)
    • Frederic Martinez (20)
    • Sophie Bessin-Py (19)
    • John Ahlberg (19)
    • Ken Abbott (19)
    • Brittany Jedrzejewski (18)
    • Nicole Williams (14)
    • Isabelle Lodo (13)
    • Jennifer Hindle (12)
    • Sek Leong (12)
    • Sharon Ginga (10)
    • Cecile Eurendjian (10)
    • Axel Hansmann (10)
    • Alex Hanway (8)
    • Philippe Vallée (8)

    Latest blog posts by:

    • Maria BarbieriMaria Barbieri
    • Tim CawseyTim Cawsey
    • Dominique BruléDominique Brulé
    • Jennifer HindleJennifer Hindle
    • Marta BordonadaMarta Bordonada
    • Sek LeongSek Leong
    See all bloggers
  • Blogroll
    • Amrit Williams blog
    • Communities Dominate Brands
    • GoMo News
    • HIT Consultant
    • ID Theft Security
    • Independent Identity
    • Kantara Initiative
    • Krebs on Security
    • Life as a Healthcare CIO
    • Michael N. Dundas
    • Mobile Marketer Blog
    • Mobile Marketing Watch
    • Mobile Money Asia
    • Mobile Zeitgeist
    • MSearchGroove (MSG)
    • Musings of a mobile marketer
    • Naked Security
    • Network Security Blog
    • NFC World
    • RFID Journal
    • Ric Ferraro's Blog
    • Schneier on Security
    • SecDev
    • Security Nirvana
    • Virginia Benedict
  • Countries
    • Brazil
    • China
    • France
    • Germany
    • Italy
    • Japan
    • Kenya
    • South Korea
    • Spain
    • Turkey
    • UK
    • US
  • Tags
    • Apple
    • Authentication
    • BYOD
    • Banking
    • Biometrics
    • Cloud
    • Connected devices
    • Contactless
    • Convenience
    • Cybersecurity
    • Data breach
    • Digital Security
    • EMV
    • Ebanking
    • Encryption
    • Facebook
    • Fraud
    • Gemalto
    • IOT
    • Identity
    • Innovation
    • Internet of things
    • LTE
    • M2M
    • MWC
    • Machine-to-machine
    • MasterCard
    • Mobile wallet
    • Mobile marketing
    • Mobile
    • Mobile payment
    • Mobile payments
    • Mobile World Congress
    • Multi-factor authentication
    • NFC
    • OTP
    • Online banking
    • Password
    • Passwords
    • Payments
    • SIM
    • SMS
    • Security
    • Smartphone
    • Strong authentication
    • Technology
    • Trust
    • Two factor authentication
    • USA
    • Visa
Back to articles

Posted on 01 November 2012 by Gemalto in Enterprise Security

Welcome the Ninja Mustangs: The Worst Passwords of 2012

Last updated: 21 March 2014

SplashData has released its list of the 25 worst passwords of 2012, including the usual suspects: ‘password’ (again, staggeringly, at the top of the list), 123456, and abc123. The list is quite similar to the one I discussed last year, albeit with a few arbitrary additions, such as “welcome”, “jesus”, “ninja”, “mustang”, and the ever elusive “password1”.

Unfortunately it seems that when it comes to our account security, we’re no more creative than we are secure. The most common excuses cited for a lackadaisical approach to personal security are that multiple passwords are too difficult to remember for today’s overloaded and time-poor internet users.

I think we can all agree that the internet has brought a certain spontaneity to how we consume and share content. Google Instant means you can search quicker than ever before, Twitter lets you publish a thought to thousands of people in seconds. The world seems to have sped up dramatically over the last decade or two, which is why it can be particularly annoying to be directed to an enormous registration page for some web-based articles you want to read or comment on.

“Social identity pioneers” Janrain recently published an infographic on their Janrainblog looking at this issue (see below for the full infographic). They found that 86% of people may leave a website when asked to create an account.

If, like me, you read a multitude of blogs, news sites and social forums, then the thought of having to set up another account and password can be just plain irritating. But why the aversion? According to the research, 60% of people have more than five unique passwords to remember (in a lot of cases I expect this to be much higher) and 40% of people use the ‘Forgot Password’ feature at least once a month.  It seems we have neither the time nor the capacity to deal with so many requests, which could be leaving us vulnerable.

Debate still rages over what types of passwords are stronger than others (they should ideally be supplemented by multi-factor authentication), although no method is 100% infallible. While we can do much to make our passwords stronger, (not picking any of these as your password would help), the more sites and passwords we have, the more easily we could get confused and start making mistakes or getting complacent in the name of convenience.

As Janrain pointed out, using our social logins to provide an existing ID on other websites could be a useful tool in reducing the burden. Using your Facebook or Twitter login to access a story could work across multiple sites, as well as making it easier to share content on your networks. Of course, this is not a cure for our password problems (see email-marketing firm MailChimp’s blog for an interesting case study on the deployment of social logins), nor by any means is it risk free; but if it helps us focus on the smaller number of login details we really need, it may at least stop us welcoming ninja jesus’ mustang next time we have to register online.

How to Solve the Online Registration Challenge Inforgraphic

How to Solve the Online Registration Challenge – An infographic by the team at Janrain

Related posts:

New EU data protection rules published

Posted on 04 May 2016 by Tom De Cordier in Corporate

The new EU data protection rules have been published in the Official Journal of the EU, giving businesses just two years to comply with GDPR regulations by May 2018.

What two-factor authentication could mean for Twitter

Posted on 30 May 2013 by Gemalto in Corporate

Yesterday’s announcement from Twitter that it will be adopting a mobile phone-based system of two-factor authentication feels like a landmark of sorts. This is not because it is a ground-breaking…

Infiltrating the E-gaming Industry: a hackers pastime

Posted on 20 September 2012 by Gemalto in Corporate

It seems the trend for hackers in 2012 is video games. And they aren’t leaving anyone out: NCsoft’s Guild Wars is the latest video game enterprise to fall victim to…

From Twitter

Loading...
    More from Twitter

    Subscribe to updates

    Delivered by FeedBurner.
    Submitting this form will open a popup window to the FeedBurner website.

    Gemalto: a Thales company
    Visit Gemalto corporate site | Blogs FAQ | Privacy Policy | © 2006 - 2023 Gemalto NV
    This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.

    • ACTIVITIES
    • Defence & Security
    • Digital Identity and Security
    • Aerospace
    • Space
    • Ground Transportation
    • Market-specific solutions
    • GLOBAL
    • Career
    • Investor
    • Journalist
    • Customer Online
    • SOCIAL NETWORKS
    • Facebook
    • Twitter
    • LinkedIn
    • Instagram
    • Youtube
    Decisive technology for decisive moments
    www.thalesgroup.com
    Be aware that this site uses cookies. Before continuing browsing we advise you to click on Privacy Policy to access and read our cookie policy.OkPrivacy policy