Why Are We Still Reusing Passwords? KNP's Collapse Is a Brutal Reminder
Let’s stop pretending this is new.
It is 2025. We have had years, decades of advice, warnings, and horror stories about password security. And still, people are reusing passwords like it is 2005. We are not talking about random Internet users, either. We are talking about businesses, infrastructure, leadership teams, and real people making real decisions that affect livelihoods.
The collapse of KNP, a 158-year-old UK transport firm, should be the final wake-up call.
One reused password. One guessed login.
Ransomware hit.
Seven hundred people out of work.
Finished.
You can read it for yourself. It is all there in the BBC’s coverage.
This was not a sophisticated hack, not cutting-edge malware or state-sponsored espionage. It was a company with weak internal practices, someone using a password that attackers had probably seen before in another breach, and it cost them everything.
Why are we still doing this
Let’s break it down:
- People think they are not a target.
- Businesses still do not enforce strong password policies.
- Most teams do not use password managers.
- MFA is optional when it should be mandatory.
- Cybersecurity gets brought up after something breaks, not before.
Worst of all, we are still not communicating the risk in a way that people actually hear. Too many security messages are wrapped in jargon or delivered in boring one-off training sessions that nobody remembers.
We say use MFA, rotate passwords regularly, and assume the message landed. It did not.
This is not about compliance. It is about consequences.
KNP was not just attacked. They left the door open, and the attackers did not even have to kick it down.
This is the reality:
One reused password can end your business.
One guessed login can cost real people their jobs.
One missed backup can turn a ransomware hit into a total collapse.
And yet, in meeting rooms and inboxes across the country, password policies still get brushed off as overkill.
We also need to train staff. Properly.
If companies are serious about avoiding the next KNP, they need to stop assuming employees already know how to stay safe online. They do not.
Every employee should be trained on basic cyber protection ‒ not just for the office but also for their home life. Compromised personal accounts often lead to compromised work systems, and work from home blurred that line years ago.
Teach people how to spot phishing. How to use password managers. Why they should never reuse passwords. Why their home router settings matter just as much as their work login.
Cybersecurity is no longer just an IT problem. It is a life skill. And if your company is not actively building that skillset in your team, you are leaving the door open.
So are we failing to get the message out? Yes.
And maybe we have been going about it the wrong way.
Instead of shouting technical advice, maybe we should just start showing what happens when you ignore it. KNP is now a case study in what not to do. A 158-year-old company, gone. Not because of innovation. Not because of disruption. But because of basic, avoidable mistakes.
It is not enough to keep repeating the same old advice. We need to be blunt, loud, and clear.
Final word: stop reusing passwords.
Use a password manager, turn on multi-factor authentication, train your team, and take cybersecurity home with you. It does not have to be complicated; it just has to be taken seriously.
Because KNP is not the only one. And if this is still happening in 2025, the next collapse could be closer than you think.