Keyboard walks such as ‘qwerty’ are weak passwords used by millions of end users.
COPY Specops Software 2024 Specops Breached Password Report · Jan 1, 2025
Password Security End Users Weak passwords Risk
The most commonly used keyboard walk pattern was “Qwerty,” which appeared over 1 million times in a list of compromised passwords.
COPY Specops Software 2024 Specops Breached Password Report · Jan 1, 2025
Password Security Credentials Common passwords Risk
88% of organisations still use passwords as their primary method of authentication.
COPY Specops Software 2024 Specops Breached Password Report · Jan 1, 2025
Authentication Password Security Credentials Organizations
31.1 million breached passwords were over 16 characters in length.
COPY Specops Software 2024 Specops Breached Password Report · Jan 1, 2025
Password Security Credentials Data breach Authentication
83% of compromised passwords satisfied the length and complexity requirements of regulatory password standards.
COPY Specops Software 2024 Specops Breached Password Report · Jan 1, 2025
Password Security Regulatory Compliance Complexity Data breach
Only 12% of organisations have moved away from using passwords as their primary method of authentication.
COPY Specops Software 2024 Specops Breached Password Report · Jan 1, 2025
Authentication Password Security Organizations Technology
Simple passwords like Pass@123 and P@ssw0rd, which meet basic Active Directory requirements, are frequently used, increasing the risk of password reuse.
COPY Specops Software 2024 Specops Breached Password Report · Jan 1, 2025
Password Security Active Directory Credentials Risk
45% of organisations who only check for compromised passwords during expiry or reset events average only two checks for compromised passwords per year.
COPY Specops Software 2024 Specops Breached Password Report · Jan 1, 2025
Password Security Breach Detection Monitoring Organizations
Organisations using SaaS apps have an average of 47,750 passwords to manage.
COPY Specops Software 2024 Specops Breached Password Report · Jan 1, 2025
SaaS Password Security Management Credentials
Over 31 million of the breached passwords were over 16 characters in length.
COPY Specops Software 2024 Specops Breached Password Report · Jan 1, 2025
Password Security Credentials Data breach Authentication
Only 50% of organisations scan for compromised passwords more than once a month.
COPY Specops Software 2024 Specops Breached Password Report · Jan 1, 2025
Password Security Breach Detection Monitoring Organizations
The most common base terms used in breached passwords were “password”, “admin”, and “welcome”.
COPY Specops Software 2024 Specops Breached Password Report · Jan 1, 2025
Password Security Credentials Common passwords Risk
53% of people admit to using the same password across multiple accounts.
COPY Specops Software 2024 Specops Breached Password Report · Jan 1, 2025
Password Security Credentials Account security Risk
The most common length for compromised passwords was 8 characters (212.5 million total).
COPY Specops Software 2024 Specops Breached Password Report · Jan 1, 2025
Password Security Credentials Length Compromised
123456 was the most common compromised password found in a new list of breached cloud application credentials.
COPY Specops Software 2024 Specops Breached Password Report · Jan 1, 2025
Password Security Credentials Data breach Authentication
After analysing 1.8 million breached administrator credentials, 40,000 admin portal accounts were found to be using ‘admin’ as a password.
COPY Specops Software 2024 Specops Breached Password Report · Jan 1, 2025
Password Security Administrator Account Credentials Risk
Requiring an Active Directory password length of at least 13 characters would significantly reduce the risk of cloud application password reuse.
COPY Specops Software 2024 Specops Breached Password Report · Jan 1, 2025
Password Security Active Directory Credentials Risk
Topics Covered Password Security (17) Credentials (12) Risk (7) Authentication (5) Organizations (4) Data breach (4) Common passwords (2) Active Directory (2) Breach Detection (2) Monitoring (2) End Users (1) Weak passwords (1) Regulatory Compliance (1) Complexity (1) Technology (1)