December 17, 2019 By David Bisson 2 min read

A new study found that most users required a password reset in the last 90 days due to a forgotten password.

In its “Password Usage Study,” HYPR found that 78 percent of full-time workers across the U.S. and Canada required a reset of a forgotten password in their personal life at some point in the last three months. The rate was slightly lower for work-related resets at 57 percent of respondents.

HYPR arrived at these findings despite observing that most survey participants used either a physical or digital list to manage their passwords. Overall, HYPR found that close to two-thirds (65 percent) of U.S. full-time workers used some type of list to manage their passwords for their personal lives. Slightly fewer than that (58 percent) used a list to keep track of their work-related passwords.

Why Are People Forgetting Their Passwords?

As part of its study, HYPR determined that many users are suffering from password overload. Thirty-seven percent of survey participants told the firm that they have over 20 passwords in their personal lives, for instance. Nineteen percent said they had over 10 passwords in their work lives.

Even so, the authentication technology provider observed that respondents hadn’t taken the proper steps to reduce the occurrence of a forgotten password. It specifically noted that many workers were not using password management software at the time of questioning due to a lack of awareness, certainty or trust with how these solutions work. As a result, many workers still relied on their memories to recall their authentication credentials.

These conclusions weren’t singular to HYPR’s study. Back in September 2018, for instance, Rutgers University-New Brunswick conducted a study in which human memory appeared to adapt to and remember passwords based upon their frequency of use. This result tied into a December 2018 survey finding from Digital Guardian that a quarter of users could not count the number of web accounts in their lives that required a password. It’s therefore no surprise that 83 percent of respondents told Cyclonis in a separate study that they reused the same password across multiple sites. Such behavior elevated the likelihood of a password reuse attack in the event that a data breach affected any one of those sites.

How to Help Eliminate the Forgotten Password

Security professionals can help eliminate the risks associated with a forgotten password by not leaving password management up to users. Companies should make it a policy for users to embrace password managers. Beyond that, security teams should also invest in frequent penetration testing and security awareness training to strengthen users’ defenses against phishers and social engineering attacks.

More from

IBM identifies zero-day vulnerability in Zyxel NAS devices

12 min read - While investigating CVE-2023-27992, a vulnerability affecting Zyxel network-attached storage (NAS) devices, the IBM X-Force uncovered two new flaws, which when used together, allow for pre-authenticated remote code execution. Zyxel NAS devices are typically used by consumers as cloud storage devices for homes or small to medium-sized businesses. When used together, the flaws X-Force discovered allow a remote attacker to execute arbitrary code on the device with superuser permissions and without requiring any credentials. This results in complete control over the…

What cybersecurity pros can learn from first responders

4 min read - Though they may initially seem very different, there are some compelling similarities between cybersecurity professionals and traditional first responders like police and EMTs. After all, in a world where a cyberattack on critical infrastructure could cause untold damage and harm, cyber responders must be ready for anything. But are they actually prepared? Compared to the readiness of traditional first responders, how do cybersecurity professionals in incident response stand up? Let’s dig deeper into whether the same sense of urgency exists…

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Stealthy WailingCrab Malware misuses MQTT Messaging Protocol

14 min read - This article was made possible thanks to the hard work of writer Charlotte Hammond and contributions from Ole Villadsen and Kat Metrick. IBM X-Force researchers have been tracking developments to the WailingCrab malware family, in particular, those relating to its C2 communication mechanisms, which include misusing the Internet-of-Things (IoT) messaging protocol MQTT. WailingCrab, also known as WikiLoader, is a sophisticated, multi-component malware delivered almost exclusively by an initial access broker that X-Force tracks as Hive0133, which overlaps with TA544. WailingCrab…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today