49% of workers, when forced to update their password, reuse the same one with just a minor change:
A survey of 200 people conducted by security outfit HYPR has some alarming findings.
For instance, not only did 72% of users admit that they reused the same passwords in their personal life, but also 49% admitted that when forced to update their passwords in the workplace they reused the same one with a minor change.
Furthermore, many users were clearly relying upon their puny human memory to remember passwords (42% in the office, 35% in their personal lives) rather than something more reliable. This, no doubt, feeds users' tendency to choose weak, easy-to-crack passwords as well as reusing old passwords or making minor changes to existing ones.
What is so bad about changing "Password1" to "Password2"?
(Score: 2) by DannyB on Friday December 13 2019, @06:23PM (1 child)
In other words: the appearance of security. Whether it's actually a good idea or not. It looks good.
Or said differently: "we don't care if we get hacked, as long as we CYA."
To transfer files: right-click on file, pick Copy. Unplug mouse, plug mouse into other computer. Right-click, paste.
(Score: 2) by pipedwho on Saturday December 14 2019, @07:01AM
The CYA mentality only works when you are actually using good practices. When the NIST recommends against your policy, it is in your interest to do something about it. When the lawsuits come in, the CYA becomes 'we are using some inane insecure contraindicated security policy' - and that tends to look pretty bad as a defence to a law suit. I get called in for cybersecurity advice regularly, and some companies choose to ignore recommendations. But, they still sign off on the fault and security analysis, which includes agreeing to take the enumerated and highlighted risks/repercussions.