Skip to Main Content
PCMag editors select and review products independently. If you buy through affiliate links, we may earn commissions, which help support our testing.

'12345' Is Really Bad: Your Ultimate Guide to Password Security

If you're still using "qwerty" or "starwars" as a password, you should stop immediately. We tell you what makes a bad password, why you should care, and how to make a good one.

By Neil J. Rubenking
Updated May 3, 2022
(Illustration: René Ramos)

The 47 Ronin of Japanese history identified each other during a night attack with the password “yama” (mountain) and the countersign “kawa” (river). Cool right? Modern password protection isn't nearly as interesting, but it's just as important.

The only safe way to store proper passwords is in a password manager. So why aren’t you using one? A few years ago, in a PCMag survey on passwords, only 24% of you reported using a password manager. The other 76% must be using a highly crackable password like baseball or 12345678, or memorizing one complex password and using it everywhere. Password security is no small matter. Given the enormous scale of the risk, you need to do everything you can to keep your passwords safe.

Even if you're using the best password manager, it doesn't guarantee the safety of your accounts—not if you use the password manager to store the same old, tired passwords. You have to switch out your old and weak passwords for new and stronger ones.

That survey mentioned above revealed that 35% of PCMag readers never change their passwords unless forced to do so by a breach. In general, that's not such a bad thing. The National Institute of Standards and Technology no longer recommends changing passwords every 90 days. NIST now recommends using long phrases like "Correct-Horse-Battery-Staple" and changing them only when necessary. But if you're using terrible passwords, "when necessary" means right now.

Just what makes a bad password? Let's look at some of the attributes of terrible passwords, then give you some pointers on how to make them the right way.


Stay Out of the Dictionary

Every few months a news outlet posts a list of the worst passwords. We see a lot of easy-to-type options, like 123456 and and qwerty. Easy for you? Sure. But also easy for hackers to crack. Other common (and poor) passwords consist of simple dictionary words. We've seen baseball, monkey, and starwars in the list of worst passwords. These, too, are easy to crack.

How Your Password Was Stolen
PCMag Logo How Your Password Was Stolen

Some secure websites lock down after a set number of wrong password attempts, but many don't. For those with no bad-guess lockout, hackers can cross a list of email addresses with a list of popular passwords and set up an automated process to keep trying combinations until they get in.

A properly secured website doesn't store your password anywhere. Instead, it runs the password through a hashing algorithm, a kind of one-way encryption. The same input always produces the same output, but there's no way to get back to the original password from the resulting hash. If the password you type hashes to the same value that's stored, you get access. Even if hackers capture the site's user data, they don't get passwords, just hashes.

But smart hackers can crack weak passwords even when they're hashed if they know what hashing function the site used. They start by running a huge dictionary of common passwords through the hashing function. Then they look for the resulting hashes in the captured data. Each match is a cracked password. Sites with the very best security enhance the hash function with a technique called salting, which makes this kind of table-based cracking impossible, but why take the risk? Just stay out of the dictionary.


Think Differently

A friend once told me her perfect password: 1qaz2wsx3edc4rfv. She could "type" it by just sliding a finger down four slanted columns of the keyboard. It was so perfect, she used it everywhere. And that was a big mistake.

Hardly a week goes by without news of a breach at some company or website, exposing thousands or millions of usernames and passwords. Smart victims change their passwords immediately. Those who ignore the problem may find themselves locked out of their own accounts after the hackers reset the password.

Those hackers know that all too many people recycle their passwords. Once they find a working username and password pair, they try the same credentials on other sites. You may not be so worried about losing access to your Club Penguin Rewritten account, but if you used the same login on your bank's website, you've got big trouble.

It gets worse. If someone else gets control of your email account, they can first lock you out by changing the password. Then they can break into your other accounts by having a password reset link emailed to that account. Worried yet?


Don't Get Personal

Using personal information as the basis for your passwords is awfully tempting, but it's a bad idea. Whether your dog’s name is Rover or Khaleesi, that name probably appears in the dictionaries hackers use for brute-force attacks. Other possibilities such as the initials and birthdate of a family member probably won't fall to a brute-force attack, but if someone wants to hack your account specifically, that personal data can fuel a trial-and-error guessing attack.

Don't think for a minute that your personal details are private. There are dozens of sites people can use to find details about anybody: address, birthdate, marital status, and more. Your social media posts can be another source of personal info, especially if you haven't properly secured your accounts. A determined hacker (or a nosy neighbor) can probably guess any password that you build based on your own data.


Close the Back Door

If you're not using a password manager, you've surely experienced forgetting the password for a site. It's all too common, which is why virtually every login page includes a "Forgot your password?" link. Some sites send a reset link to your email address, while others let you reset the password after answering your security questions. And that opens a back door to anyone wanting to hack your account.

Security Question and Answer

Most sites offer abysmal options for security questions. What is your mother's maiden name? Where did you go to high school? What was your first job? As noted, your personal life is an open book to anyone with internet searching skills. When possible, ignore the preset questions. Create your own question, with a unique answer that you'll always remember but that nobody else could guess.

It's harder when the site doesn't let you define your own questions. In that case, your best bet is to use a memorable answer that's a total lie. My mother's maiden name is Fauci. I went to school at More Science High School. For my first job, I was a linotype operator. There is an element of risk, since you might forget which lie you chose. I would suggest storing these oddball answers as secure notes in your password manager—but if you were using a password manager you wouldn’t have this problem in the first place.


What to Do Now That You Care

I hope I've convinced you that using common passwords is a rotten idea, as is building passwords from personal information. And even the best strong, random password becomes a liability if you use it all over the place. If you're ready to spring into action, here are some starting points:

If a secure site doesn't take care of security, you could still lose that site's credentials to a data breach, but by making all your passwords long, strong, and unique, you've done everything you can to protect your online accounts.

Simple Tricks to Remember Insanely Secure Passwords
PCMag Logo Simple Tricks to Remember Insanely Secure Passwords

And hey! Now that you're on a roll, security-wise, consider adding a Virtual Private Network, or VPN to your toolkit. Using strong passwords for secure sites means others can't break into your accounts; adding a VPN means there's no chance anyone can intercept your connection to those secure sites.

Like What You're Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.


Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Sign up for other newsletters

Table of Contents

TRENDING

About Neil J. Rubenking

Lead Analyst for Security

When the IBM PC was new, I served as the president of the San Francisco PC User Group for three years. That’s how I met PCMag’s editorial team, who brought me on board in 1986. In the years since that fateful meeting, I’ve become PCMag’s expert on security, privacy, and identity protection, putting antivirus tools, security suites, and all kinds of security software through their paces.

Before my current security gig, I supplied PCMag readers with tips and solutions on using popular applications, operating systems, and programming languages in my "User to User" and "Ask Neil" columns, which began in 1990 and ran for almost 20 years. Along the way I wrote more than 40 utility articles, as well as Delphi Programming for Dummies and six other books covering DOS, Windows, and programming. I also reviewed thousands of products of all kinds, ranging from early Sierra Online adventure games to AOL’s precursor Q-Link.

In the early 2000s I turned my focus to security and the growing antivirus industry. After years working with antivirus, I’m known throughout the security industry as an expert on evaluating antivirus tools. I serve as an advisory board member for the Anti-Malware Testing Standards Organization (AMTSO), an international nonprofit group dedicated to coordinating and improving testing of anti-malware solutions.

Read Neil J.'s full bio

Read the latest from Neil J. Rubenking