Five Password Mistakes Businesses Make Every Day

  • Home
  • Five Password Mistakes Businesses Make Every Day
Five Password Mistakes Businesses Make Every Day

A practical guide for UK businesses who want to stop getting hacked

Passwords are still the biggest weak spot in cybersecurity.
Not AI. Not advanced malware. Passwords.

Every year businesses get compromised because someone in the team uses something daft like Arsenal2024 or Password123!. And in the UK this is especially common because we have predictable habits. Football clubs. Kids’ names. Pets. Dates of birth.

So here is a breakdown of the biggest password mistakes companies make, why they matter, and what to do instead.

The top 20 most commonly used and dangerous passwords

If anyone in your company uses one of these, change it today.

  1. 123456
  2. password
  3. 123456789
  4. qwerty
  5. arsena
  6. abc123
  7. chelsea
  8. football
  9. letmein
  10. 12345
  11. liverpool
  12. monkey
  13. 111111
  14. sunshine
  15. princess
  16. welcome
  17. admin
  18. dragon
  19. manchester
  20. iloveyou

Automated hacking tools can crack these immediately.
Adding a few numbers or symbols does not make them safer.

Five mistakes UK businesses make every single day

1. Reusing the same password everywhere
If one login gets breached, everything that shares that password is instantly at risk.
One weak password can take down the whole business.

2. Using emotional or predictable words
People pick what is familiar.
Football clubs. Dog names. Kids’ names. Favourite bands. Home towns.
Hackers expect all of this and test these words first.

3. Using predictable substitutions
Swapping letters for numbers like 3 for E or 0 for O is completely useless now.
Attackers check for those patterns automatically.

4. Storing passwords badly
Post it notes. Notebooks. Notes apps. Shared spreadsheets.
If a staff member can see someone else’s password, so can anyone shoulder surfing or stealing a laptop.

5. Not using a password manager
Trying to remember multiple strong passwords is impossible.
A password manager solves this but many UK businesses still rely on memory, notes, or WhatsApp messages.

Why you should avoid normal English words in passwords

If you use a “root word” as the stable part of your password system, never use an English dictionary word.
Hackers test dictionary lists immediately.

Better options:

• Spanish words
• Welsh words
• Foreign words in general
• Or made up nonsense words

These are much harder to brute force because they are not in any dictionary.

Examples of good root words:

• Traves
• Gwynt
• Ceniz
• Fribondo
• Nalmex

Anything that does not make sense in English is ideal.

Password managers to recommend (and the truth about LastPass)

Here is a quick breakdown of the reputable password managers worth considering.

NordPass
Very secure, simple, solid for teams.

Keeper
Strong admin controls, good for businesses, excellent auditing.

1Password
Great design, widely trusted, excellent for teams and families.

Bitwarden
Open source, very good value, strong free plan.

RoboForm
Simple, good multi device support, good for everyday users.

Proton Pass
Privacy focused, encrypted, growing rapidly.

LastPass
Very popular, lots of features, easy for non technical staff.
However, it has had several security incidents in the past, which damaged confidence.
Some businesses still use it happily, others prefer to avoid it.
It is not unusable, but it is important to understand the history.

The truth nobody likes to admit

Here is the part people rarely say out loud.
No password is ever 100 percent secure.
Not the long ones, not the clever ones, not the ones with punctuation all over them.

Everything can be cracked given enough time and resources.
The real goal is layers of security, not perfection.

Your formula is one layer.
Your password manager is another.
Your training is another.
Together, these layers reduce risk to a practical level.

Why businesses must use a password manager for sharing

Sharing passwords through email, WhatsApp, or spreadsheets is incredibly risky.
A proper password manager avoids all of this.

A good password manager lets you:

• Share access with staff without revealing the actual password
• Give access to groups instead of individuals
• Remove access instantly if someone leaves
• Avoid constantly changing passwords
• Keep everything encrypted
• Track who has access to what

This is essential because not everyone leaves a company on good terms.
Some people leave upset, annoyed, or holding a grudge.
You want to be able to remove their access in five seconds, not spend the next two days updating login details everywhere.

What makes a good business grade password

A strong password should be:

• Long
• Unique for every login
• Mixed case
• Includes numbers
• Includes at least two special characters
• Not dictionary based
• Not reused
• Stored safely

A simple password formula your staff can actually use

Here is the clean, practical formula that works without confusing anyone.

Pattern:
SiteCode + PersonalNumber + PersonalRootWord + SpecialChars

Where:

SiteCode:
Take the first 3 letters of the website
Shift each letter one forward in the alphabet
Make them uppercase
Gmail → g m a → h n b → HNB

PersonalNumber:
A number you never forget
Example: 4279

PersonalRootWord:
A non English or made up word
Example: Fibin

Special characters:
Pick two you always use
Example: !?

Example passwords

Gmail
HNB4279Fribondo!?

Facebook
GBD4279Fribondo!?

LinkedIn
MJO4279Fribondo!?

Twitter
UXJ4279Fribondo!?

Each one is:

• Long
• Unique
• Includes numbers and symbols
• Easy to recreate
• Hard to guess
• Based on one consistent rule
• Stronger than 99 percent of what staff normally use

The best security is layered security

Good security is not one thing. It is a combination of:

• Strong password policy
• Unique passwords
• Avoiding dictionary words
• Using a password manager for all sharing
• Removing access instantly when someone leaves
• Training staff
• Monitoring for breaches
• Updating passwords after suspicious activity

This is how modern businesses protect themselves.

User names 

While we are discussing passwords it is also worth mentioning user names. 

Hackers use automatic bots to automate the hacking process at speed. Testing thousands of websites per hour and this is becoming more advanced with the advent of AI.  

Websites created with WordPress, for example, creates the first user name as admin and subsequent user names based on the user’s name and so makes it easier for the bots to guess and help the hackers. 

Cpanel, the most common website hosting, also creates a standard user name, using the letters of the domain name. These should also be edited when creating your hosting. 

A lot of CRM and other software come with ‘admin’ as the user name and ask you to edit the password but we also encourage you to edit the name for the admin user to something that the bots wont guess. 

You should never use Admin or admin and if the software allows you should use a user name and not an email address and make it harder to guess. Instead of using ‘steve’ or first and last name like ‘‘steveharwood’ add the first couple of letters of your middle name or just part of your surname. Something like ‘stevewharwood’ or ‘stevewh’.

Combine that with a strong password and you will considerably reduce the risk of getting hacked. 

Final thoughts

Weak passwords are one of the easiest ways for attackers to break into a business.
Strong passwords and a password manager fix most of the problem in under an hour.

Your goal is not to be perfect. Your goal is to be secure enough that attackers move on to an easier target.