Weak passwords increase vulnerability to cyberattacks

zdnet.com

Many people still use weak passwords that can put them at risk of remote desktop attacks. Microsoft's Remote Desktop Protocol (RDP) allows users to access and control remote PCs and servers. However, it is also a target for cybercriminals. A recent report by Specops analyzed over 1 billion stolen passwords from 2024. It revealed the ten most common passwords used in RDP attacks. The top password was "123456," followed by "1234" and "Password1." Other weak passwords included "P@sswOrd," "password," and "Welcome1." Most of these passwords are simple or based on common patterns. The report highlights that many users do not follow good password practices, even for important systems. Cybercriminals often use brute force attacks, trying various combinations until they succeed. To create stronger passwords, users should include a mix of numbers, uppercase and lowercase letters, and special characters. Sadly, less than 8% of the passwords analyzed met these standards. A password with at least 15 characters would be very difficult to crack. To protect yourself, there are several steps to take. First, enforce a strong password policy that encourages complex passwords. Limit RDP access to only certain IP addresses and block the use of weak passwords. It's also essential to ensure your systems are updated regularly and use multi-factor authentication for added security.


With a significance score of 2.8, this news ranks in the top 27% of today's 18109 analyzed articles.

Get summaries of news with significance over 5.5 (usually ~10 stories per week). Read by 9000 minimalists.


loading...