Somewhere in Western Australia, a government IT employee is probably laughing or crying or pulling their hair out, or maybe all of the above. A security audit of the Western Australian government released this week by the state's auditor general found that 26 per cent of its officials had weak,
Over 1400 Western Australian government officials used 'Password123' as their password
Subscribe to listen
A survey has shown that Government officials are as lazy as everyone else when it comes to selecting passwords. Photo/123RF.
Recent years have seen several huge data breaches at major companies. In 2013, an email account breach at Yahoo exposed the data of 3 billion users. In a 2016 breach at the FriendFinder Network - which included adult content and casual hookup sites like FriendFinder, Penthouse.com and Stripshow.com -- hackers accessed 20 years of data, including passwords and personal information. In 2017, a breach at major U.S. credit bureau Equifax exposed the personal information, including Social Security Numbers, birth dates, addresses and drivers' license numbers, of 143 million consumers.
Weak passwords are easy target for hackers. Last year, Verizon's annual Data Breach Investigations Report, which looked at hacking incidents at 65 companies, found that "81 percent of hacking-related breaches leveraged stolen and/or weak passwords." This number has gone up from 50 percent in the past three years.
This isn't a problem specific to the Western Australian government. In 2014, a U.S. Senate cybersecurity report found that several major breaches in important government agencies, including the Department of Homeland Security, the Internal Revenue Service and the Nuclear Regulatory Commission.
"Data on the nation's weakest dams, including those which could kill Americans if they failed, were stolen by a malicious intruder," the report said. "Nuclear plants' confidential cybersecurity plans have been left unprotected. Blueprints for the technology undergirding the New York Stock Exchange were exposed to hackers."
An analysis of these agencies' cybersecurity practices found tendencies mirroring the Western Australian practices: use of "password" was common for sensitive accounts and databases, as was poorly stored and guarded credential information.
Even unskilled hackers can use resources like lists of common passwords or publicly available personal information to break into accounts. The Romanian hacker Marcel Lehel Lazar, known online as "Guccifer," who first revealed Hillary Clinton was using a private email address as secretary of state, was far from a hacking expert. He told the New York Times he broke into more than 100 accounts, including several high-profile figures like Clinton's adviser Sidney Blumenthal and former Secretary of State Colin Powell, merely by guessing based on their personal information from their Wikipedia pages. (A fun fact: Guccifer was also responsible for leaking former President George W. Bush's paintings.)
The traditional guidelines for strong passwords -- making them long and complicated, including symbols and a mix of upper and lowercase letters, changing them regularly -- were actually making it easier for hackers, Paul Grassi of the National Institute of Standards and Technology told NPR last June. The organization's current guidelines for good passwords dovetails sharply with past wisdom: Passwords should be simple, long and easy to remember. It suggests using normal English words and phrases that are easy for users, but tougher on hackers.
To keep accounts secure, pick something that's lengthy and memorable; if you change it, switch more than a single letter or digit. And for heaven's sake, don't use the word "password."
- Washington Post