6 facts about passwords that will make you THINK.
We say it a lot and we mean it; cyber security is vital in the online world. Passwords are a huge part of that. However, while many know we should use unique usernames and complex password combinations, we don’t. Even the reports of cyber attacks and breaches over the years haven’t made a huge difference, with bad password habits being far more common than you might think.
Would you like to become a cyber-security champion? Learn about the common ways hackers get hold of your personal data in our FREE White Paper >>
The main reasons for this? Convenience, forgetfulness and sheer laziness.
In light of the above, we have decided to go through some interesting facts about passwords, in the hope that you will think about how you create, use and store your passwords for the future.
Fact #1: Passwords are easily hacked because most humans follow similar patterns
At the beginning of the Web and when passwords were first used, the most popular password was ‘12345’. Today, it may be longer, but is hardly safer – ‘123456’. Additionally, research has found that women are famous for using personal names in their passwords, and men opt for their hobbies.
Amichai Shulman, the Chief Technology Officer at Imperva, which makes software blocking for hackers commented on these patterns when he said “I guess it’s just a genetic flaw in humans … We’ve been following the same patterns since the 1990s”.
Fact #2: 59% of people use the same password everywhere
91% of people know that password recycling poses huge security risks, yet 59% continue to use the same password everywhere. Therefore, if a hacker was to crack one password, they would be able to gain access to all other accounts!
Businesses should ensure they pay close attention to employee password hygiene. Studies have shown that there can often be a lap over with the passwords created for personal and work accounts; 62% of people use the same password for work and personal accounts.
Password generators are great if you struggle to come up with multiple, strong passwords. They are tools that will automatically generate a password using parameters such as mixed-case letters, symbols, numbers, length and strength.
Fact #3: 7 in 10 people no longer trust passwords to protect their online accounts
Passwords are required for nearly everything we do online. So, if people no longer trust them, what is the answer?
Multi-factor authentication (MFA) or two-factor authentication (2FA) are authentication methods that verifies a user’s identity by requiring multiple credentials. These include something you know, something you have and something you are. Something you know could be a password, something you have is a possession such as a generated code on your phone, and something you are could be facial recognition, a fingerprint or an eye scan.
As traditional usernames and passwords can be stolen, they have quickly become a target of hackers. This explains the lack of trust in them for many. MFA or 2FA are effective ways to provide enhanced security for all online accounts.
Fact #4: 86% of people who use 2FA feel their accounts are more secure
Ever since the start of the digital revolution, passwords have been the mainstream form of authentication. Unfortunately, as passwords and encryption methods have become more complex, so have the skills of hackers.
2FA is an essential element of cyber security that all businesses should implement as it adds that extra layer needed to immediately neutralise the risks associated with compromised passwords. Implementing it can be done with relatively little pain for users, and usually, with little or no expense to your organisation.
At entrustIT we understand the importance of good cyber security practices, which is why with our Hosted Desktop, Hosted Application and Office 365 products, we encourage the use of 2FA. This is especially true for more demanding environments such as legal, financial services and local government where it is strictly enforced.
Fact #5: 90% of passwords can be cracked in less than six hours
Think you have a strong password? Think again…
Hackers are continuing to become more sophisticated and have a variety of ways in which they can crack your passwords to gain access to your online accounts. One way to help keep secure is to understand the methods they use, here are four:
- Dictionary attack – A dictionary attack is a method that systematically enters words that can be found in a dictionary. Hence, the name. The only reasons this kind of attack works is because users are remaining to rely on easy-to-guess words for their passwords.
- Brute-Force attack – A brute-force attack is when hackers have a software that tries to guess every possible combination until it hits yours. They often begin with the most commonly used passwords first and then move onto more complicated phrases.
- Credential stuffing – Credential stuffing proves the dangers of re-using usernames and passwords for numerous accounts. It works where credentials obtained from a data breach on one platform are used to attempt log ins on other platforms.
- Social engineering – Phishing has remained on of the top social engineering methods used by hackers to crack passwords. They do this by appearing as a trusted source and concoct a scenario for handing over login credentials or other sensitive personal data.
Fact #6: 18% of employees share their passwords with others
Password sharing is a common mistake of many and can seriously compromise an organisation’s cyber security. But why do employees do this? Research has shown 42% of workers say they do it to more easily collaborate with team members, as well as 38% saying they share passwords because it is company policy.
If a hacker gains entry to your system, shared passwords will make it much easier for them to access other parts of the network. Additionally, how do you establish exactly who is doing what? By taking the time to put an updated password policy in place, you can minimise the risk of both internal and external threats related to password sharing.
Here at entrustIT, we know how important security is. That’s why in April 2014 we invested in obtaining the ISO 27001 accreditation, an international standard published by the ISO. We have continued to maintain this accreditation over the years. Training your staff on cyber security best practices is paramount in the modern workplace. This and looking to cloud services that are encrypted will help to keep your business safe. Why not take the next step by downloading our FREE White Paper >>
Subscribe here!
Recent Posts
Posts by tag
- technology (124)
- Security (97)
- cyber security (85)
- IT Security (81)
- Cloud (65)
- Microsoft 365 (63)
- modern technology (62)
- Managed Service (60)
- business (60)
- cloud computing (59)
- cyber attack (54)
- workplace (54)
- IT support (53)
- cloud it (53)
- Microsoft Teams (52)
- microsoft (51)
- Working from home (50)
- productivity (47)
- office (46)
- cybersecurity (44)
- office 365 (44)
- IT (41)
- Uncategorised (38)
- employees (38)
- entrustit (38)
- flexible work (36)
- Password Security (34)
- Remote (33)
- efficiency (31)
- Hosted Workspace (30)
- hosted desktop (30)
- schools (29)
- independent schools (28)
- school ict (27)
- collaboration (26)
- 2023 (25)
- Cyber (24)
- cyber privacy (22)
- public cloud (22)
- computing (21)
- email security (20)
- password (20)
- it support bournemouth (19)
- passwords (19)
- entrust (18)
- hosted applications (18)
- VoIP (17)
- cloud voip (17)
- covid19 (17)
- hacking (17)
- private cloud (17)
- data (16)
- it support dorset (16)
- teamwork (16)
- Coronavirus (15)
- GDPR (14)
- hackers (14)
- office 365 support (14)
- ransomware (14)
- IT audit (13)
- Protection (13)
- cloud cctv (13)
- covid-19 (13)
- hack (13)
- it support hampshire (13)
- management (13)
- network (13)
- Hosted Desktop and Applications (12)
- Windows Virtual Desktop (12)
- cctv (12)
- hardware (12)
- internet (12)
- it consultancy (12)
- 2020 (11)
- 2022 (11)
- hybrid cloud (11)
- internet safety (11)
- IT costs (10)
- Microsoft Planner (10)
- data breach (10)
- it consultancy bournemouth (10)
- it support southampton (10)
- it support winchester (10)
- phishing (10)
- vulnerabilities (10)
- windows (10)
- windows 10 (10)
- Backup (9)
- bitwarden (9)
- digital (9)
- it consultancy hampshire (9)
- telephony (9)
- attack (8)
- communication (8)
- desk phone (8)
- education (8)
- eu (8)
- it consultancy dorset (8)
- it consultancy southampton (8)
- msp (8)
- planning (8)
- software (8)
- staff (8)
- uk (8)
- Google (7)
- OneDrive (7)
- infrastructure (7)
- mobile (7)
- offsite backup (7)
- outsource (7)
- partnership (7)
- 2019 (6)
- Apple (6)
- Hampshire (6)
- IT Director (6)
- Skype for Business (6)
- apps (6)
- architect (6)
- child protection (6)
- cloud storage (6)
- european union (6)
- hacks (6)
- legal (6)
- legal it (6)
- mobile phones (6)
- onsite backup (6)
- password manager (6)
- remote desktop service (6)
- usecure (6)
- virus (6)
- 3d design desktop (5)
- Azure (5)
- Bournemouth (5)
- Desktop (5)
- ISO (5)
- News (5)
- Risk assessment (5)
- Windows 7 (5)
- awards (5)
- brexit (5)
- designer (5)
- personal data (5)
- resources (5)
- smartphone (5)
- website (5)
- Access Management (4)
- BYOD (4)
- Dorset (4)
- Facebook (4)
- Government (4)
- SharePoint (4)
- VPN (4)
- WannaCry (4)
- ios (4)
- law (4)
- legacy (4)
- proactive (4)
- remote learning (4)
- 2021 (3)
- 2024 (3)
- Attacks (3)
- Case Studies (3)
- General (3)
- Google Drive (3)
- Help (3)
- IP (3)
- Microsoft Forms (3)
- NHS (3)
- New Forest (3)
- Zoom (3)
- big switch off (3)
- budgets (3)
- citrix (3)
- closed cloud (3)
- ddos (3)
- digital hub (3)
- disaster recovery (3)
- guide (3)
- instagram (3)
- internet of things (3)
- meetings (3)
- sme (3)
- storage (3)
- surrey (3)
- teaching (3)
- trump (3)
- twitter (3)
- 2016 (2)
- 2018 (2)
- CAD (2)
- DR (2)
- DR planning (2)
- Environment (2)
- Firewall (2)
- Gen Z (2)
- ISBA (2)
- Local (2)
- Macs (2)
- Microsoft Copilot (2)
- PaaS (2)
- Tiva (2)
- android (2)
- artificial intelligence (2)
- award winning (2)
- bcs (2)
- broadband (2)
- camcloud (2)
- computer performance (2)
- digital transformation (2)
- downtime (2)
- dropbox (2)
- exhibition (2)
- finalist (2)
- innovation (2)
- legalex (2)
- london (2)
- macos (2)
- online meetings (2)
- organisation (2)
- paypal (2)
- predictions (2)
- president (2)
- strategy (2)
- united kingdom (2)
- us (2)
- video conferencing tools (2)
- 1998 (1)
- 5G (1)
- AI (1)
- AMD (1)
- ARM (1)
- Abbey Hill (1)
- Aldwickbury Park (1)
- BBC (1)
- BUNKERS! (1)
- Birchwood Park (1)
- Burhill (1)
- Burhill Group (1)
- Burnout (1)
- CEO (1)
- ChatGPT (1)
- Cloudtango (1)
- GPT-4 (1)
- Go Integrator (1)
- Hoebridge (1)
- Ignite 2018 (1)
- Ignite 2020 (1)
- Leaders (1)
- Loop (1)
- MFA (1)
- MSP Select 2024 (1)
- Market (1)
- May (1)
- Mr Mulligans (1)
- Multi Factor Authentication (1)
- MyAnalytics (1)
- Ninja Warrior UK (1)
- PBX (1)
- PM (1)
- Power BI (1)
- Privacy Shield (1)
- Ramsdale Park (1)
- Redbourn (1)
- Regulation (1)
- Surrey Business Awards (1)
- Sydenhams (1)
- Tech Company of the Year (1)
- The Business Magazine (1)
- Thornbury (1)
- WCry (1)
- WannaCrypt (1)
- Wifi (1)
- Wycombe Heights (1)
- acquisition (1)
- afc bournemouth (1)
- afcb (1)
- ashley madison (1)
- b2b (1)
- bandwidth (1)
- battersea (1)
- beach (1)
- big data (1)
- bloatware (1)
- blockchain (1)
- builders merchant (1)
- cambridge analytica (1)
- canada (1)
- cia (1)
- clinton (1)
- cnn (1)
- copilot (1)
- copilot pro (1)
- copyright (1)
- cryptocurrency (1)
- dark web (1)
- dns (1)
- donald (1)
- dyn (1)
- east grinstead (1)
- election (1)
- equality (1)
- executive order (1)
- farnham (1)
- fax (1)
- football (1)
- gchq (1)
- grinstead (1)
- intel (1)
- intelligence (1)
- josh widdicombe (1)
- landmarks (1)
- learning (1)
- legal technology forum (1)
- machine learning (1)
- meltdown (1)
- millennials (1)
- mirai (1)
- no-deal (1)
- onsite (1)
- paper (1)
- patisserie valerie (1)
- performance reviews (1)
- pound (1)
- premier league (1)
- procrastination (1)
- recruitment (1)
- research (1)
- serval systems (1)
- sharefile (1)
- smishing (1)
- snowden (1)
- solent (1)
- solent business awards (1)
- solentBA (1)
- spectre (1)
- sterling (1)
- storm (1)
- talktalk (1)
- trumppresident (1)
- ukitawards (1)
- united states (1)
- usa (1)
- vault 7 (1)
- vitality stadium (1)
- whatsapp (1)
- white (1)
- white house (1)
- wikileaks (1)
- wireless internet bournemouth (1)
- wireless internet southampton (1)
- women in business (1)
- xiongmai (1)
- year (1)