{"id":3326,"date":"2021-03-23T00:00:19","date_gmt":"2021-03-23T00:00:19","guid":{"rendered":"https:\/\/www.dssitservices.com\/?p=3326"},"modified":"2021-03-22T21:48:26","modified_gmt":"2021-03-22T21:48:26","slug":"cyber-security-matters-20-most-common-passwords-found-on-the-dark-web","status":"publish","type":"post","link":"https:\/\/www.dssitservices.com\/sq\/blog\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\/","title":{"rendered":"Cyber Security Matters: 20 Most Common Passwords Found On The Dark Web"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>The Internet is one of the\u00a0<a href=\"https:\/\/smallbiztrends.com\/2017\/07\/impact-the-internet-has-on-society.html\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/smallbiztrends.com\/2017\/07\/impact-the-internet-has-on-society.html&amp;source=gmail&amp;ust=1616156862127000&amp;usg=AFQjCNHDQKvsMVAzgLyD_O_soorD_3_RYg\">most useful tools<\/a>\u00a0that has ever been invented. Unfortunately, it also comes with its share of risks.<\/p>\n<p>Major cyber security threats exist in the form of hackers who prey upon Internet users, and they often congregate on the dark web. We\u2019ve put together a list of the 20 most common passwords that hackers have access to, so it\u2019s in your best interest to avoid using any of them.<\/p>\n<p>Let\u2019s take a look.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h2>What Exactly Is the Dark Web?<\/h2>\n<p>Although the name might sound intimidating, the dark web isn\u2019t an inherently dangerous place. In its simplest form, the region of the Internet\u00a0<a href=\"https:\/\/www.imf.org\/external\/pubs\/ft\/fandd\/2019\/09\/the-truth-about-the-dark-web-kumar.htm\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.imf.org\/external\/pubs\/ft\/fandd\/2019\/09\/the-truth-about-the-dark-web-kumar.htm&amp;source=gmail&amp;ust=1616156862127000&amp;usg=AFQjCNFq5oZ7h5LUhZVSQCdR8i_JBJQ1iw\">known as the dark web<\/a>\u00a0(and sometimes the \u201cdeep web\u201d) is simply a section of the Internet that is not indexed by Google.<\/p>\n<p>This means that you can\u2019t find websites on the dark web within typical search results. In fact, you need to use a specialized browser in order to access any of this information.<\/p>\n<p>Due to the extra layers of security, though, the dark web is an area where cybercriminals gather to communicate with each other and offer services. One of the most prominent services is the selling of compromised passwords.<\/p>\n<p>Criminals will use this platform to purchase passwords in bulk and attempt to use them to hack into different types of accounts.<\/p>\n<h2>What Are the 20 Most Common Compromised Passwords?<\/h2>\n<p>Although some of the passwords on this list are exactly what you might expect, there are some that may surprise you. This is due to the fact that these are the most commonly compromised passwords, not the most commonly used passwords.<\/p>\n<p>These include:<\/p>\n<ol>\n<li>111111<\/li>\n<li>stratfor<\/li>\n<li>lemonfish<\/li>\n<li>sunshine<\/li>\n<li>123123123<\/li>\n<li>1234567890<\/li>\n<li>Password123<\/li>\n<li>123123<\/li>\n<li>1234567<\/li>\n<li>123456<\/li>\n<li>password<\/li>\n<li>12345678<\/li>\n<li>12341234<\/li>\n<li>1asdasdasdasd<\/li>\n<li>Qwerty123<\/li>\n<li>Password1<\/li>\n<li>123456789<\/li>\n<li>Qwerty1<\/li>\n<li>:12345678secret<\/li>\n<li>Abc123<\/li>\n<\/ol>\n<p>If you notice that your password is listed above, is essential that you change it immediately. Otherwise, it\u2019s only a matter of time until your account(s) becomes compromised.<\/p>\n<p>Fortunately, there are steps that you can take in order to prevent this.<\/p>\n<h2>How Can I Keep My Password Better Protected?<\/h2>\n<p>Keeping your passwords safeguarded is relatively easy. But, most people are unaware of the methods that they should use.<\/p>\n<p>Listed below are a few of the most useful that you should keep in mind. Let\u2019s dive in.<\/p>\n<h3>Use a Password Manager<\/h3>\n<p>A password manager is an application that can be used to store the passwords to various different accounts and platforms. Although this sounds inherently dangerous since you will keep all of your passwords in one place, you also need an additional password to encrypt this information.<\/p>\n<p>So, you will initially use a password to log in to your password manager. From here, you can view the passwords that you have for your accounts.<\/p>\n<p>A password manager allows you to generate a high-strength password, as well. This is most often a series of obscure words, letters, or numbers.<\/p>\n<p>Since you will save this information within your password manager, however, you won\u2019t need to remember it on your own.<\/p>\n<h3>Work With an IT Professional<\/h3>\n<p>It should come as no surprise that working with a<a href=\"https:\/\/www.dssitservices.com\/sq\/it-services\/managed-it-services\/\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.dssitservices.com\/it-services\/managed-it-services\/&amp;source=gmail&amp;ust=1616156862127000&amp;usg=AFQjCNGfWc0R13SsRCJWumxFyOtKK69FRQ\">\u00a0qualified IT professional<\/a>\u00a0is one of the most important obligations your business has. A notable benefit is a capability for your provider to actively monitor your network.<\/p>\n<p>This means that they will immediately notice a data breach and can take the necessary action to resolve this issue. Additionally, they are equipped with the most contemporary software and hardware to help them fulfill this role.<\/p>\n<p>Keep this in mind when coming up with ways to boost the overall security of your company.<\/p>\n<h3>Use Unique Passwords for Every Platform<\/h3>\n<p>As you might expect, it\u2019s essential that you use a unique password for each different platform or account. Otherwise, a single incident could result in the compromise of a large amount of sensitive information.<\/p>\n<p>This is particularly true if you happen to use the same password for highly-lucrative data, such as your email account, bank account, etc.<\/p>\n<p>Fortunately, the aforementioned use of a password manager will allow you to easily come up with unique passwords for any number of different accounts.<\/p>\n<h3>Don\u2019t Use Personal Information<\/h3>\n<p>One of the biggest mistakes that people make is using personal information within their passwords. This is particularly concerning if this information can be cross-referenced with other data that these individuals frequently and put into forms.<\/p>\n<p>For example, including things like your birthday, name, address, etc. into your password is something that hackers can easily discover. But, this doesn\u2019t mean that other forms of personal information are always safe.<\/p>\n<p>Somebody who knows you in real life may understand enough about you to guess your password. This is especially true for those who tend to use the name of a pet or child.<\/p>\n<h3>Never Put Numbers in Order<\/h3>\n<p>Sometimes, hackers use a technique known as &#8220;brute force hacking.&#8221; This essentially aims to try as many different passwords as possible in order to find the right one.<\/p>\n<p>Depending on how the program they use works, it may begin guessing passwords in order. To elaborate, there may be a scenario where consecutive guesses include things like the following:<\/p>\n<ul>\n<li>Hello111<\/li>\n<li>Hello112<\/li>\n<li>Hello113<\/li>\n<li>Hello114<\/li>\n<li>Hello115<\/li>\n<\/ul>\n<p>As you can see, your information will be far safer if you never put numbers in order. This list will eventually reach \u201cHello123\u201d, which could very easily be a password someone has chosen.<\/p>\n<h2>Managing This Cyber Security Threat Can Seem Difficult<\/h2>\n<p>The information listed above will help you do so seamlessly, however. From here, you can ensure that this is cyber security concern does not affect you in the future.<\/p>\n<p>Want to learn more about what we have to offer? Feel free to\u00a0<a href=\"https:\/\/www.dssitservices.com\/sq\/contact-us\/\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.dssitservices.com\/contact-us\/&amp;source=gmail&amp;ust=1616156862127000&amp;usg=AFQjCNF7k8bhMwi9Qp6neV9BXqDHZEAD8A\">reach out to us<\/a>\u00a0today and see how we can help.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>Last year saw an increase in remote work across a wide spectrum of industries-from the office, internet dependent jobs to the small business professionals working from home. The work force will likely double this year as more employers see the benefits of remote work.<\/p>","protected":false},"author":3,"featured_media":3399,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[88],"tags":[],"class_list":["post-3326","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security Matters: 20 Most Common Passwords Found On The Dark Web | DSS Management Inc.<\/title>\n<meta name=\"description\" content=\"Last year saw an increase in remote work across a wide spectrum of industries-from the office, internet dependent jobs to the small business professionals working from home\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dssitservices.com\/sq\/blog\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\/\" \/>\n<meta property=\"og:locale\" content=\"sq_AL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security Matters: 20 Most Common Passwords Found On The Dark Web | DSS Management Inc.\" \/>\n<meta property=\"og:description\" content=\"Last year saw an increase in remote work across a wide spectrum of industries-from the office, internet dependent jobs to the small business professionals working from home\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dssitservices.com\/sq\/blog\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\/\" \/>\n<meta property=\"og:site_name\" content=\"DSS - IT &amp; Cyber Security Management\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DSSIT\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-23T00:00:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2021\/03\/pexels-mati-mango-5952651.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"854\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dashmir\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dashmir\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuta\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\\\/\"},\"author\":{\"name\":\"Dashmir\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#\\\/schema\\\/person\\\/e9b3d9606a136b2363eab4eac99de778\"},\"headline\":\"Cyber Security Matters: 20 Most Common Passwords Found On The Dark Web\",\"datePublished\":\"2021-03-23T00:00:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\\\/\"},\"wordCount\":990,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/pexels-mati-mango-5952651.jpg\",\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"sq\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\\\/\",\"url\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\\\/\",\"name\":\"Cyber Security Matters: 20 Most Common Passwords Found On The Dark Web | DSS Management Inc.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/pexels-mati-mango-5952651.jpg\",\"datePublished\":\"2021-03-23T00:00:19+00:00\",\"description\":\"Last year saw an increase in remote work across a wide spectrum of industries-from the office, internet dependent jobs to the small business professionals working from home\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\\\/#breadcrumb\"},\"inLanguage\":\"sq\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sq\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/pexels-mati-mango-5952651.jpg\",\"contentUrl\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/pexels-mati-mango-5952651.jpg\",\"width\":1280,\"height\":854,\"caption\":\"top 20 passwords\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dssitservices.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security Matters: 20 Most Common Passwords Found On The Dark Web\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#website\",\"url\":\"https:\\\/\\\/www.dssitservices.com\\\/\",\"name\":\"DSS - IT & Cyber Security Management\",\"description\":\"DSS IT is your trusted partner for IT Services and Cybersecurity on Long Island providing expert managed services and secure network support backed by over 20 years of experience.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dssitservices.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sq\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#organization\",\"name\":\"DSS Management Inc\",\"url\":\"https:\\\/\\\/www.dssitservices.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sq\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/DSS-Logo-Main-1-1.png\",\"contentUrl\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/DSS-Logo-Main-1-1.png\",\"width\":297,\"height\":100,\"caption\":\"DSS Management Inc\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DSSIT\",\"https:\\\/\\\/www.instagram.com\\\/dssit\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/dssitinc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCUfIRO4HxMQ2vLpza29n0Vg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#\\\/schema\\\/person\\\/e9b3d9606a136b2363eab4eac99de778\",\"name\":\"Dashmir\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sq\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g\",\"caption\":\"Dashmir\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security Matters: 20 Most Common Passwords Found On The Dark Web | DSS Management Inc.","description":"Last year saw an increase in remote work across a wide spectrum of industries-from the office, internet dependent jobs to the small business professionals working from home","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dssitservices.com\/sq\/blog\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\/","og_locale":"sq_AL","og_type":"article","og_title":"Cyber Security Matters: 20 Most Common Passwords Found On The Dark Web | DSS Management Inc.","og_description":"Last year saw an increase in remote work across a wide spectrum of industries-from the office, internet dependent jobs to the small business professionals working from home","og_url":"https:\/\/www.dssitservices.com\/sq\/blog\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\/","og_site_name":"DSS - IT &amp; Cyber Security Management","article_publisher":"https:\/\/www.facebook.com\/DSSIT","article_published_time":"2021-03-23T00:00:19+00:00","og_image":[{"width":1280,"height":854,"url":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2021\/03\/pexels-mati-mango-5952651.jpg","type":"image\/jpeg"}],"author":"Dashmir","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dashmir","Est. reading time":"3 minuta"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dssitservices.com\/blog\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\/#article","isPartOf":{"@id":"https:\/\/www.dssitservices.com\/blog\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\/"},"author":{"name":"Dashmir","@id":"https:\/\/www.dssitservices.com\/#\/schema\/person\/e9b3d9606a136b2363eab4eac99de778"},"headline":"Cyber Security Matters: 20 Most Common Passwords Found On The Dark Web","datePublished":"2021-03-23T00:00:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dssitservices.com\/blog\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\/"},"wordCount":990,"commentCount":0,"publisher":{"@id":"https:\/\/www.dssitservices.com\/#organization"},"image":{"@id":"https:\/\/www.dssitservices.com\/blog\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2021\/03\/pexels-mati-mango-5952651.jpg","articleSection":["Cyber Security"],"inLanguage":"sq","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dssitservices.com\/blog\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dssitservices.com\/blog\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\/","url":"https:\/\/www.dssitservices.com\/blog\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\/","name":"Cyber Security Matters: 20 Most Common Passwords Found On The Dark Web | DSS Management Inc.","isPartOf":{"@id":"https:\/\/www.dssitservices.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dssitservices.com\/blog\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\/#primaryimage"},"image":{"@id":"https:\/\/www.dssitservices.com\/blog\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2021\/03\/pexels-mati-mango-5952651.jpg","datePublished":"2021-03-23T00:00:19+00:00","description":"Last year saw an increase in remote work across a wide spectrum of industries-from the office, internet dependent jobs to the small business professionals working from home","breadcrumb":{"@id":"https:\/\/www.dssitservices.com\/blog\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\/#breadcrumb"},"inLanguage":"sq","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dssitservices.com\/blog\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\/"]}]},{"@type":"ImageObject","inLanguage":"sq","@id":"https:\/\/www.dssitservices.com\/blog\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\/#primaryimage","url":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2021\/03\/pexels-mati-mango-5952651.jpg","contentUrl":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2021\/03\/pexels-mati-mango-5952651.jpg","width":1280,"height":854,"caption":"top 20 passwords"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dssitservices.com\/blog\/cyber-security-matters-20-most-common-passwords-found-on-the-dark-web\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dssitservices.com\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Matters: 20 Most Common Passwords Found On The Dark Web"}]},{"@type":"WebSite","@id":"https:\/\/www.dssitservices.com\/#website","url":"https:\/\/www.dssitservices.com\/","name":"DSS - IT & Cyber Security Management","description":"DSS IT is your trusted partner for IT Services and Cybersecurity on Long Island providing expert managed services and secure network support backed by over 20 years of experience.","publisher":{"@id":"https:\/\/www.dssitservices.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dssitservices.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sq"},{"@type":"Organization","@id":"https:\/\/www.dssitservices.com\/#organization","name":"DSS Management Inc","url":"https:\/\/www.dssitservices.com\/","logo":{"@type":"ImageObject","inLanguage":"sq","@id":"https:\/\/www.dssitservices.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2019\/01\/DSS-Logo-Main-1-1.png","contentUrl":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2019\/01\/DSS-Logo-Main-1-1.png","width":297,"height":100,"caption":"DSS Management Inc"},"image":{"@id":"https:\/\/www.dssitservices.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DSSIT","https:\/\/www.instagram.com\/dssit\/","https:\/\/www.linkedin.com\/company\/dssitinc\/","https:\/\/www.youtube.com\/channel\/UCUfIRO4HxMQ2vLpza29n0Vg"]},{"@type":"Person","@id":"https:\/\/www.dssitservices.com\/#\/schema\/person\/e9b3d9606a136b2363eab4eac99de778","name":"Dashmir","image":{"@type":"ImageObject","inLanguage":"sq","@id":"https:\/\/secure.gravatar.com\/avatar\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g","caption":"Dashmir"}}]}},"_links":{"self":[{"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/posts\/3326","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/comments?post=3326"}],"version-history":[{"count":0,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/posts\/3326\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/media\/3399"}],"wp:attachment":[{"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/media?parent=3326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/categories?post=3326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/tags?post=3326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}