Information Security 3 min read

Common Weak Passwords and Best Practices for Secure Password Creation

The article presents NordPass's annual most‑used password list, highlights the top ten weak passwords in China that can be cracked in seconds, explains why users choose them, and offers four practical recommendations for creating stronger, more secure passwords.

DevOps Operations Practice
DevOps Operations Practice
DevOps Operations Practice
Common Weak Passwords and Best Practices for Secure Password Creation

NordPass released its annual most‑used password list, with “123456” topping the chart and over 4 million users using it.

The top ten passwords in China are: 123456, admin, 111111, super123, 00000, 12345678, 123123, 123456789, 112233, qwer1234.

According to NordPass data, each of these passwords can be cracked by a hacker in about one second, making them extremely weak.

Weak passwords often consist of sequential numbers or common letter combinations, chosen for convenience and memorability rather than security.

Using weak passwords leads to personal and corporate losses, identity theft, and financial damage.

NordPass recommends: (1) avoid dictionary words, simple number sequences, or keyboard patterns; (2) avoid repeated characters and personal information such as phone numbers or birth dates; (3) use passwords at least 12 characters long with mixed case, numbers, and symbols; (4) change passwords at least every 90 days.

Full list: https://nordpass.com/most-common-passwords-list/

The article concludes with a request to like, share, and a promotion for a Prometheus monitoring column.

best practicesinformation securitypassword securityNordPassweak passwords
DevOps Operations Practice
Written by

DevOps Operations Practice

We share professional insights on cloud-native, DevOps & operations, Kubernetes, observability & monitoring, and Linux systems.

0 followers
Reader feedback

How this landed with the community

login Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.