Pity the poor password. Maligned for years, it’s nevertheless still hanging on as the dominant form of access and identity protection for online accounts of all types. Despite years of industrywide efforts to educate users about the importance of employing difficult-to-guess passwords, the list of the most frequently used passwords has changed little. One analysis of 10 million breached accounts last year found that 17 percent were protected by the password “123456.”

There are signs, however, that the logjam is about to break. IBM’s recent “Future of Identity Study” unearthed some fascinating demographic trends about password use that draw sharp distinctions between the practices of the millennial generation and their elders. At first glance, the results might appear to indicate that young people are more cavalier about security practices, but a deeper look reveals that the situation is more complex. In fact, millennials may ultimately lead the charge in breaking our addiction to passwords.

Read the IBM Study: The Future of Identity

The Security Age Gap

The study found that only 42 percent of millennials — people born between 1981 and 1997 — use complex passwords combining random capitalization, numbers and symbols. That compares to 49 percent of people over the age of 55. Millennials are also much more likely to use the same password across multiple sites or apps (41 percent versus 31 percent of those 55 and older). On average, the older generations use 12 passwords regularly, while millennials use only eight. That number falls to five for members Generation Z, or people born between 1998 and 2017.

People’s willingness to trade convenience for security also declines sharply with age. Nearly half (47 percent) of those under the age of 24 said they’d use a less secure method of authentication to save a few seconds of time. That’s close to triple the 16 percent of respondents over age 55 who would do the same.

Does this mean young people are less security-aware? Not necessarily. Digging deeper, we find that in some areas, they’re actually more careful than other age groups about access and identity protection. For example, 36 percent of Generation Z respondents said they use digital password managers to store and generate secure credentials, compared to 26 percent of the general population. They’re also somewhat more open to using two-factor authentication (2FA) to provide a second level of protection.

While millennials’ password hygiene may be somewhat sloppier than their elders’, they are more likely to stop using a website or app if their personal data is compromised. Finally, they reported the highest acceptance of biometric authentication, which is more secure than passwords.

A Fresh Perspective on Identity Protection

It’s tempting for the elders among us to shake our heads and mourn the irresponsibility of youth, but we shouldn’t be too quick to judge. The differences between the age groups may be defined more by economics than carelessness.

Consider that few people under 21 have multiple credit cards, large retirement accounts, stock portfolios, credit scores and mortgages. They’re the least likely age group to have families to protect. They don’t worry about identity theft because there isn’t much for thieves to steal. Young people are less likely to have established careers and the associated risk of reputational damage from events such as hijacked social media accounts.

In short, young people have less at stake; it isn’t surprising that they guard their online accounts less fiercely. What they do have is a higher comfort level with technology than many of their older counterparts. Biometric security doesn’t baffle them — in fact, it may be considered cool — and password managers are an efficient way to navigate the internet from the mobile devices that millennials prefer.

This new generation may be the one that finally weans us off our reliance on passwords. Organizations can support them by giving younger employees options to use the authentication factors they find most convenient and preferable. With their predilection toward using technology to solve problems, millennials might even be able to teach their elders a thing or two.

Read the complete IBM Study: The Future of Identity

More from Identity & Access

How to Keep Your Secrets Safe: A Password Primer

There are two kinds of companies in the world: those that have been breached by criminals, and those that have been breached and don't know it yet. Criminals are relentless. Today’s cyberattacks have evolved into high-level espionage perpetrated by robust criminal organizations or nation-states. In the era of software as a service (SaaS), enterprise data is more likely to be stored on the cloud rather than on prem. Using sophisticated cloud scanning software, criminals can breach an enterprise system within…

Making the Leap: The Risks and Benefits of Passwordless Authentication

The password isn't going anywhere. Passwordless authentication is gaining momentum, though. It appears to be winning the battle of how companies are choosing to log in. Like it or not, the security industry must contend with both in the future.  But for some businesses and agencies, going passwordless is the clear strategy. Microsoft, for instance, has recently stopped forcing users to use a password to access their account, which allows access to a wide range of Microsoft business and personal…

Old Habits Die Hard: New Report Finds Businesses Still Introducing Security Risk into Cloud Environments

While cloud computing and its many forms (private, public, hybrid cloud or multi-cloud environments) have become ubiquitous with innovation and growth over the past decade, cybercriminals have closely watched the migration and introduced innovations of their own to exploit the platforms. Most of these exploits are based on poor configurations and human error. New IBM Security X-Force data reveals that many cloud-adopting businesses are falling behind on basic security best practices, introducing more risk to their organizations. Shedding light on…

Why Your Success Depends on Your IAM Capability

It’s truly universal: if you require your workforce, customers, patients, citizens, constituents, students, teachers… anyone, to register before digitally accessing information or buying goods or services, you are enabling that interaction with identity and access management (IAM). Many IAM vendors talk about how IAM solutions can be an enabler for productivity, about the return on investment (ROI) that can be achieved after successfully rolling out an identity strategy. They all talk about reduction in friction, improving users' perception of the…