Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Friday December 13 2019, @03:11PM   Printer-friendly
from the https://xkcd.com/936/ dept.

49% of workers, when forced to update their password, reuse the same one with just a minor change:

A survey of 200 people conducted by security outfit HYPR has some alarming findings.

For instance, not only did 72% of users admit that they reused the same passwords in their personal life, but also 49% admitted that when forced to update their passwords in the workplace they reused the same one with a minor change.

Furthermore, many users were clearly relying upon their puny human memory to remember passwords (42% in the office, 35% in their personal lives) rather than something more reliable. This, no doubt, feeds users' tendency to choose weak, easy-to-crack passwords as well as reusing old passwords or making minor changes to existing ones.

What is so bad about changing "Password1" to "Password2"?


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by DannyB on Friday December 13 2019, @06:23PM (1 child)

    by DannyB (5839) Subscriber Badge on Friday December 13 2019, @06:23PM (#931786) Journal

    It has, on the other hand, everything to do with security *regulations*.

    In other words: the appearance of security. Whether it's actually a good idea or not. It looks good.

    Or said differently: "we don't care if we get hacked, as long as we CYA."

    --
    To transfer files: right-click on file, pick Copy. Unplug mouse, plug mouse into other computer. Right-click, paste.
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 2) by pipedwho on Saturday December 14 2019, @07:01AM

    by pipedwho (2032) on Saturday December 14 2019, @07:01AM (#931971)

    The CYA mentality only works when you are actually using good practices. When the NIST recommends against your policy, it is in your interest to do something about it. When the lawsuits come in, the CYA becomes 'we are using some inane insecure contraindicated security policy' - and that tends to look pretty bad as a defence to a law suit. I get called in for cybersecurity advice regularly, and some companies choose to ignore recommendations. But, they still sign off on the fault and security analysis, which includes agreeing to take the enumerated and highlighted risks/repercussions.