While password recovery seems like it should be safe–allowing you to answer a question only you should know–our increasingly large digital trails are making it easier and easier for hackers to deduce what your answers might be. Plus, a lot of passwords just aren’t that strong in the first place. Check out the 20 worst passwords of 2015 for a look at some of the most common weak passwords used. And just think, all it takes is one admin with a weak password, and you might have an intruder all over your files. If you have a lot of customer files, like what was stored in Apple’s cloud, you may want to start moving to two-step authentication like Apple after a recent attack.