Strengthen your passwords for world password day

Issue 4 2020 Information Security

“The recent headlines about 500 000 Zoom passwords being up for sale confirm how important it is that people change their password habits. Passwords are painful. I get it. But using the same password over and over again puts us at risk. My advice is using a password manager. This means you only have to remember one very strong password, and the password manager takes care of all the other ones. And wherever possible apply multi factor authentication. This is combining your password with something that you own, like a One Time Password app on your phone,” says Anna Collard, MD of KnowBe4 Africa.


Anna Collard.

KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, today announced it has launched a new kit to help people strengthen and improve their password management in recognition of World Password Day on May 7.

The National Cyber Security Centre in the UK found that the most hacked passwords that were used the most overall were as follows: 123456, 123456789, qwerty, password and 111111. First names, premier league football teams, musicians and fictional characters were also found to be popular password categories that are easily cracked.

“Contrary to popular belief, bad guys don’t actually need to crack weak passwords, they can just reuse the billions of passwords already available for sale on the dark web. Using a technique called “credential stuffing”; hackers use account details obtained from older data breaches,” says Collard.

According to the LastPass Psychology of Passwords Report, 91% of people know password reuse is insecure, yet two-thirds do it anyway. Half of respondents hadn’t changed their passwords in over the past 12 months even after hearing about a breach in the news.

“There’s a lot of debate out there about the best password policy and whether or not they should be long, short, how complex, etc.,” said Roger Grimes, data-driven defence evangelist, KnowBe4. “The National Institute of Standards and Technology (NIST) has drastically changed their advice recently, stating that long and complex passwords shouldn’t be required and they don’t need to be changed unless they’ve been compromised in some manner. This has been continuously debated and many security professionals do not agree with this advice. The most important thing to remember is to never reuse the same password for multiple sites. It’s also recommended to use multi-factor authentication whenever possible and a to use a password manager.”

The KnowBe4 World Password Day Kit is available to anyone who is looking to learn more about password best practices and includes:

Complex password guide

Video by Kevin Mitnick on how easy it is to crack a password  

• KnowBe4’s complimentary Password Exposure Test




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
AI security with AI Cloud Protect
Information Security
AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model development, agentic AI applications, and inference workloads with zero impact on performance.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
The overlooked risks of everyday connectivity
Information Security
That free Wi-Fi you are using could end up costing you a lot more money than your hotspot data if it has been compromised, says Richard Frost, head of technology solutions and consulting at Armata Cyber Security.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.