Almost three quarters use same password for different sites

Posted by   Virus Bulletin on   Nov 8, 2010

User continues to be the weakest link.

73% of computer users use the same password across multiple different accounts according to survey results released by security firm BitDefender.

The survey revealed that 12% of respondents were willing to disclose their password to a stranger in order to discover whether it was strong enough. A quarter of respondents used a six-character combination as their password, but only 1% of participants used an alphanumeric sequence longer than 15 characters.

A poll carried out by VB earlier this year showed slightly more optimistic figures, with 25% of users saying they used the same password to access all sites, however a further 51% said that they had a number of passwords but shared them across multiple sites.

Sabina Datcu, BitDefender E-Threats Analyst and Communication Specialist said: "Too many users make it very easy for fraudsters to gain access to their email, social media, bank and other accounts by employing the same password. It is like having a bunch of spare keys to your house and handing them out to anyone who asks."

These results highlight the long recognized fact that the user is the weakest link in the security chain, but what can organizations do to educate their users? At the VB 'Securing Your Organization in the Age of Cybercrime' Seminar, Andrew Lee will discuss practical ways in which the weakest link can be strengthened, without resorting to overly draconian measures that can often bring the opposite of the desired result.

The VB Seminar takes place at the IET London, UK from 9am to 4pm on 25 November 2010. Secure your place by booking online now. (Or download a PDF copy of the booking form and fax the completed form to +44 (0)1865 543153.)

Posted on 08 November 2010 by Virus Bulletin

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

VB2021 localhost is over, but the content is still available to view!

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.