Batman may have top-notch security in his Batcave, but that doesn’t mean you should take inspiration for your passwords (opens in new tab).
As a matter of fact, using superhero names as passwords is a common occurrence, making for low-hanging fruit for criminals looking to brute-force their way into online accounts and business networks.
Cybersecurity firm Specops Software recently analyzed more than 800 million breached passwords, looking for those that include the names of Marvel or DC superheroes.
- Here’s our list of the best password managers (opens in new tab) right now
- We’ve built a list of the best business password managers (opens in new tab) on the market
- Check out our list of the best identity theft protection (opens in new tab) available
The company found that Loki was the most popular choice, appearing more than 151,000 times, while his brother Thor was used almost 148,000 times. DC characters are also well-represented, with Batman's sidekick Robin featuring in 127,000 breached passwords.
In total, more than 1.1 million breached passwords included mention popular Marvel and DC characters.
Although no one wants their personal accounts compromised by cybercriminals, businesses have even more to lose as a result of this worrying trend.
For small and medium-sized businesses, poor password hygiene is one of the weakest links in the cybersecurity chain, the report adds. Many high-profile attacks, including the recent Colonial Pipeline incident, start with compromised credentials.
In order to stay safe, SMBs should focus on robust password policies. There are many measures organizations can take, such as requiring employees to create complex passwords or preventing them from using names of partners, important dates, home addresses and other easily obtainable data.
Businesses should also require employees to create a new password every few months, and make sure they don’t just change the last character when they do. And finally, two-factor authentication should always be enabled where possible, providing an additional layer of protection.
- Here's our rundown of the best identity management software (opens in new tab) around