Be honest. Is at least one of your passwords still something like “12345” or “password123”?
If so, you’re not alone.
But that doesn’t mean it’s okay.
Despite years of advice from IT professionals, weak passwords are still everywhere. And they continue to be one of the easiest ways for cyber criminals to break into your business systems.
You’d be surprised how many companies still use passwords that can be cracked in less than a second.
Recent research found that the most common business password is still “123456”.
Not far behind?
“123456789”
“password”
“qwerty123”
These aren’t just poor choices. They’re wide-open doors for attackers.
And it’s not just big companies making this mistake. Small and medium-sized businesses are just as guilty. Unfortunately, they’re often hit harder when things go wrong because they don’t always have the resources to recover.
A single stolen password can give attackers access to:
Your email
Internal files and documents
Financial systems
Client or customer data
The consequences? Costly downtime, reputational damage, and serious financial loss.
Think you don’t have anything worth stealing? Think again.
Even if your team is small, your digital assets — accounts, communications, client records — are all valuable. Cyber criminals are opportunists. They’re not always targeting a specific business. They’re scanning for easy wins.
And weak passwords are the easiest win there is.
Even if you’ve moved past “123456”, your passwords may still be risky.
Research found many people are using:
Their name
Their email address
Sentimental phrases like “iloveyou” or “sunshine”
It might seem harmless, but cyber criminals can easily guess or brute-force these based on leaked personal information.
Start with these essentials:
1. Use strong, randomly generated passwords: Longer is better. Go for a mix of uppercase and lowercase letters, numbers, and special characters. Avoid anything predictable.
2. Use a password manager: No one can remember 30 complex passwords. A password manager creates and stores strong, unique passwords for every account.
3. Enable multi-factor authentication (MFA): Even if someone steals your password, MFA adds a second step to verify it’s really you. A simple code from your phone or app could stop an attack in its tracks.
4. Consider moving to passkeys: Passkeys are password alternatives that use biometrics or secure device-based authentication. They’re safer, faster, and quickly becoming the new standard.
Strong passwords — or even better, password alternatives — are your first line of defence. If anyone on your team is still using “abc123”, now’s the time to act.
We can help you review your password policy, choose the right tools, and roll out stronger login protections across your business.
Let’s make sure your accounts are protected before they become a target.
Are You Ready for a New IT Support Partner?
How much does your business rely on technology? Most people don’t even think about it… until something goes wrong. But when technology fails, it can affect everything.
A great IT support partner can make all the difference, but it’s a big market out there. Our 2025 IT Services Buyer’s Guide is here to ensure you’re equipped to make an informed decision about your IT support partnership, and provide insights into tech revolutions which will affect businesses like yours.
Download our free guide and find out how to choose the right IT support partner for you.
Email: reachout@perigonone.com.au
Phone: 1300 669 220
Head Office
1 George Wiencke Drive
Perth Domestic Airport WA 6105
Victoria Office
Level 27, 459 Collins Street
Melbourne VIC 3000
Brisbane Office
Level 17, 127 Creek Street
Brisbane QLD 4000