The 10 Most Common Password Mistakes People Still Make

Young woman generating random passwords on CreateMeAPassword.com
Image: AI‑generated illustration

We’ve been using passwords for decades… and somehow we’re still tripping over the same banana skins. If you recognise yourself in any of these, no shame — fix them now and you’ll be miles ahead of most people.

TL;DR

Go long, go random, use a manager, and turn on 2FA. Avoid reuse. Change on events (breach), not on a calendar.

1) Using “123456” or “password”

Why it’s bad: Attackers always try the obvious first. These (and things like qwerty, password1, letmein) are in every cracking list.

How it happens: You needed an account quickly and promised you’d “change it later”. You didn’t.

Fix: Go long and random. Aim for 14–16+ characters (more is better). Use a generator.

Better example: vR4m-Ft6e!Jq82wN

2) Reusing the same password everywhere

Why it’s bad: One leaked password = a skeleton key. Attackers run your email + password against hundreds of sites (credential stuffing).

How it happens: You’ve got dozens of logins and can’t remember them all.

Fix: Use a password manager so every account gets a unique password. If one site leaks, the damage doesn’t spread.

Quick win: Change the reused password on your email, banking, and cloud storage first.

3) Making passwords too short

Why it’s bad: Short = fewer combinations = faster to crack.

How it happens: Old policies forced 8 characters with “complexity”. That’s not enough anymore.

Fix: Go for 14–16+ characters as your default. For Wi‑Fi and anything high value, think 20–24.

Tip: Length beats cleverness. A long random passphrase often wins.

4) Using personal info (names, birthdays, pets, football teams)

Why it’s bad: This is exactly the stuff people can find on social media or with basic sleuthing.

How it happens: You wanted something memorable and picked Spurs2012! or your child’s name.

Fix: No real words, no dates, no favourites. Keep it random and unrelated to you.

Bad → Good:
LandoNorris2025!mooncup-harbour-socket-6?river

5) Relying on predictable patterns or lazy “complexity”

Why it’s bad: P@ssw0rd! looks fancy but it’s in attacker dictionaries. Keyboard runs like 1qaz2wsx are common.

How it happens: You’ve been told to add symbols and numbers, so you swap letters for look‑alikes.

Fix: Don’t “decorate” a real word. Use truly random characters or random‑word passphrases.

Example: orchid-slate-9/LION-parking

6) Not changing passwords after a breach

Why it’s bad: Once a site leaks, your password is effectively public.

How it happens: You miss the breach email or assume it won’t matter.

Fix (do these in order):

Pro move: Set up breach alerts for your email address so you don’t miss future incidents.

7) Saving passwords in the browser with no device security

Why it’s bad: If your laptop is stolen or malware lands, saved logins can be exposed.

How it happens: Browsers offer to “save password?” and you click yes forever.

Fix:

8) Skipping two‑factor authentication (2FA)

Why it’s bad: Without 2FA, one stolen password is enough.

How it happens: It feels like a faff. You’ll “do it later”.

Fix: Turn on 2FA everywhere that matters. Best to OK: security key (best), authenticator app/TOTP (great), SMS (better than nothing, but vulnerable to SIM‑swap). Save backup codes safely.

9) Sharing passwords over email/Slack/WhatsApp

Why it’s bad: Messages are forwarded, archived, and breached. You lose control instantly.

How it happens: You need to share the Netflix login or a team account “just for now”.

Fix: Use your manager’s secure share feature, or create a separate account/role. If you must send one, change it immediately after.

10) Creating something impossible to remember… then writing it on a sticky note

Why it’s bad: Shoulder‑surfers and phone cameras exist. Office cleaners and visitors too.

How it happens: You made a monster password and had to put it somewhere.

Fix: Let the manager remember. If you need an offline backup for a master password, use a sealed notebook in a safe place — not the monitor.

A simple, future‑proof setup

Sources & further reading

Image credit: AI‑generated illustration created for this post.

Found this useful? Buy me a coffee