SlideShare a Scribd company logo
1 of 9
Download to read offline
Survey Guide: Businesses Should Begin
Preparing for the Death of the Password
2
Survey Guide: Businesses Should Begin
Preparing for the Death of the Password
The way digital enterprises connect with their
customers is changing.
Consumers are demanding more trusted and
personalized experiences in exchange for their per-
sonally-identifiable information (PII), while businesses
are struggling to protect user privacy in light of
growing global security and privacy concerns.
Traditional authentication solutions and methods
were simply not built to bridge this widening gap. As
consumer patience for archaic security barriers like
username and password combinations starts to wane, enterprises must find a way to secure
millions of identities while still providing streamlined customer experiences.
Our most recent survey, which collected the perspectives of 4,000 adults in the US and UK,
examines the ways that consumers create and manage their passwords and online accounts,
and how next-generation authentication methods like biometrics are gaining traction among
a variety of age groups. Let’s take a look at the results.
The Challenge of Password Management	
As a means of authentication, traditional username and password combinations
themselves are not inherently secure. Their ability to protect user identities and data
is dependent not just on the technology and security protocols put into place by
organizations, but also dependent on consumers following best practices for creating and
managing passwords.
However, according to our survey results, only 16% of people follow these best practices
by maintaining a unique password for each of their online accounts. Baby Boomers, or
respondents ages 51-69, are the most cautious when it comes to password duplications,
with 65% creating 5 or more passwords across their online accounts, compared to just
44% of Millennials, or respondents ages 18-34. Re-using the same password across
multiple accounts increases risk in that if one account is compromised, others can be
easily accessed as well.
3
To make matters worse, 56% of people use passwords that they know are not secure, such
as those that include their names or birthdates. Baby Boomers are more cautious when
it comes to protecting their identities than younger generations, with 53% claiming they
never create easy-to-remember yet unsecure passwords, compared to 42% of Generation X
respondents and 33% of Millennials.
With identity fraud costing Americans alone $16 billion per year, one would expect
consumers to be more cautious when it comes to protecting their financial accounts.
However, more than one quarter of all respondents say that they do not take the time to
create more complicated passwords for online accounts linked to financial information, such
as banks, eCommerce sites, etc.
HOW MANY DIFFERENT
PASSWORDS DO YOU USE
ACROSS ALL OF YOUR
ONLINE ACCOUNTS?
DO YOU CREATE MORE COMPLICATED PASSWORDS FOR YOUR ONLINE
ACCOUNTS THAT ARE TIED TO FINANCIAL INFORMATION (ONLINE
STORES, BANKS, CREDIT MONITORING, ETC.)?
¼ OF PEOPLE
don’t create more complicated
passwords for financial accounts.
Millennials
18-34
Generation X
35-50
Baby Boomers
51-69
I Use the Same Password for
All of My Online Accounts
I Create a Unique Password for
Every Online Account
2-4
5+
8% 6% 4%
48%
35%
31%
32%
43%
45%
12% 16% 20%
4
Perhaps the most surprising illustration of Baby Boomers taking security much more
seriously than their younger counterparts is that they are nearly twice as likely as Millennials
to activate two-factor authentication when logging in to an online account. Two-factor
authentication ensures the validity of a user’s identity and minimizes account phishing
by adding an additional authentication step during the login process, such as sending a
verification code via SMS to the user’s mobile phone.
Likely due to the real-time nature of new technologies and platforms like mobile devices and
social networks, Millennials appear to lack the patience and dedication of older generations
when it comes to following password creation and management best practices.
User Experience Suffers the Consequences
As consumers create unsecure passwords and reuse login credentials across devices and
domains, they generate risk for businesses by leaving their accounts open to phishing
and fraud. In fact, our survey results show that more than 25% of respondents have had
an online account compromised in the past 12 months. For Millennials, this number jumps
to 35%, which is more than likely a direct reflection of this age group’s failure to follow
password best practices. In contrast, this number drops to less than 20% for Baby Boomers.
In an effort to combat this risk, many businesses employ account creation features such as
CAPTCHA and password strength meters, or enforce password requirements like special
characters and numbers. Unfortunately, attempts to enhance password security often have
a negative impact on users’ registration experiences, with one third of consumers admitting
to abandoning the creation of an online account due to complex password requirements.
Millennials Generation X Baby Boomers
0 65% 72% 82%
1-3 27% 22% 17%
4-6 6% 4% 1%
7-9 1% 1% 0%
10+ 1% 1% 0%
In the past 12 months, how many of your online accounts have been compromised?
5
Even if users do make it past the hurdle of account creation, login roadblocks such as
forgetting a username, password or answer to a security question have caused more than
half of consumers to abandon a site. This happens more than one may think: 84% of people
forgot and had to reset a password at least once in the last year, while 25% forget six times
or more in the same 12-month period.
HAVE STRICT PASSWORD COMPLEXITY
REQUIREMENTS SUCH AS IN THE
EXAMPLE ABOVE EVER LED YOU
TO COMPLETELY ABANDON THE
CREATION OF AN ONLINE ACCOUNT?
HAVE YOU EVER COMPLETELY
ABANDONED A LOGIN PAGE DUE TO
COMPLICATIONS LIKE A FORGOTTEN
USERNAME, FORGOTTEN PASSWORD
OR AN INCORRECT ANSWER TO A
SECURITY QUESTION?
YES
32%NO
68%
YES
55%
NO
45%
6
With Millennials unwilling to follow password creation best practices and attempts to
combat the associated risk resulting in poor user experiences, businesses looking to stay
connected with consumers must start exploring authentication solutions that are both
secure and convenient.
The Rise of Next-Gen Authentication
Given the security and customer experience challenges associated with traditional online
account registration flows, 52% of consumers say that, if given the option, they would do away
with usernames and passwords altogether in favor of other forms of authentication. In fact,
according to our survey results, they have already started to explore these other options.
While biometric authentication is still in its infancy, with just 20% of Baby Boomers having
used biometric technology like Apple’s Touch ID fingerprint scanner, it is gaining much
higher traction with Millennials, almost 50% of whom claim to have used at least one form
of biometric authentication. In the same vein, 66% of Millennials, compared to just 48% of
Gen X and 30% of Baby Boomers, say they own at least one device that offers some form of
biometric authentication.
IN A 12-MONTH PERIOD, THE AVERAGE CONSUMER FORGETS A PASSWORD…
16%
17%
8%
59%
0 TIMES
11+
Times
7
OF ALL OF THE DEVICES (SMARTPHONE, TABLET, LAPTOP, ETC.) THAT
YOU OWN, HOW MANY OF THEM OFFER SOME FORM OF BIOMETRIC
AUTHENTICATION (FINGERPRINT SCANNING TECHNOLOGY, VOICE
RECOGNITION, FACIAL RECOGNITION, IRIS SCAN)?
Millennials Generation X Baby Boomers
0 34% 52% 70%
1 44% 30% 22%
2-3 20% 17% 8%
4+ 2% 1% 0%
WHICH OF THE FOLLOWING FORMS
OF BIOMETRIC AUTHENTICATION
HAVE YOU USED BEFORE? SELECT
ALL THAT APPLY.
FINGERPRINT
SCANNING
TECHNOLOGY
(like Apple Touch ID )
VOICE
RECOGNITION
FACIAL
RECOGNITION
IRIS (EYE)
SCAN
NONE
38%
51%
68%
80%
21%
14% 15%
9%
3%
11%
8%
4% 5% 3% 4%
MILLENNIALS
GENERATIONX
BABY BOOMERS
However, these low percentages signal that consumer understanding and awareness of
biometric technologies still have significant room for growth. Any device with a camera or
microphone has the potential to be a biometric-enabled device, and 91% of UK and 80% of
US Millennials own a smartphone.
8
The Future of Authentication
Of course, scanning one’s finger or face is far more
convenient than creating and remembering yet another
username/password combination. What’s more, 80% of
consumers who expressed a preference believe that
biometric authentication is more secure than traditional
registration. With passwords failing to provide the
better, more trusted experiences today’s consumers
are demanding, biometrics and other methods of next-
generation authentication are sure to begin emerging
at a faster and higher rate.
Amidst these changes only one thing is for certain:
the password is dying. Is your business prepared?
For more information about registration best practices and the future of authentication, visit
www.gigya.com or call us at 650.353.7230.
YES
80%
NO
20%
Is biometric authentication perceived
to be safer than traditional registration?
Is Biometric
authentication
safer?
Of consumers who expressed a preference
The Leader in Customer
Identity Management
© 2016 Gigya, Inc.  |  2513 Charleston Road #200, Mountain View, CA 94043  |  T : (650) 353.7230  |  www.gigya.com
Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in the United States and/or other countries. All other
trademarks are the property of their respective owners. Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya’s services available
to our clients and their end users. Gigya acts as an agent or back-end vendor of its client’s website or mobile application, to which the end user of our client granted permissions (if applicable).
Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its clients and at its clients’ direction. For more information, please see Gigya’s Privacy Policy, available at
http://www.gigya.com/privacy-policy/. Gigya_WP_Businesses_Preparing_Death_Password_042016		
About Gigya
Gigya’s Customer Identity Management Platform helps companies
build better customer relationships by turning unknown site visitors
into known, loyal and engaged customers. With Gigya’s technology,
businesses increase registrations and identify customers across
devices, consolidate data into rich customer profiles, and provide
better service, products and experiences by integrating data into
marketing and service applications.
Gigya’s platform was designed from the ground up for social
identities, mobile devices, consumer privacy and modern marketing.
Gigya provides developers with the APIs they need to easily build
and maintain secure and scalable registration, authentication, profile
management, data analytics and third-party integrations.
More than 700 of the world’s leading businesses such as Fox, Forbes,
and ASOS rely on Gigya to build identity-driven relationships and to
provide scalable, secure Customer Identity Management.
To learn how Gigya can help your business manage customer
identities, visit gigya.com, or call us at 650.353.7230.

More Related Content

More from Gigya

White Paper: 2017 Predictions - French
White Paper: 2017 Predictions - FrenchWhite Paper: 2017 Predictions - French
White Paper: 2017 Predictions - FrenchGigya
 
White Paper: 2017 Predictions - German
White Paper: 2017 Predictions - GermanWhite Paper: 2017 Predictions - German
White Paper: 2017 Predictions - GermanGigya
 
Case study - American Kennel Club
Case study - American Kennel ClubCase study - American Kennel Club
Case study - American Kennel ClubGigya
 
Data Sheet: Corporate Overview
Data Sheet: Corporate OverviewData Sheet: Corporate Overview
Data Sheet: Corporate OverviewGigya
 
Gigya Infographic - Death Of A Password
Gigya Infographic - Death Of A PasswordGigya Infographic - Death Of A Password
Gigya Infographic - Death Of A PasswordGigya
 
GDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - GermanGDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - GermanGigya
 
White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)Gigya
 
White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)Gigya
 
Case Study: International CPG Company
Case Study: International CPG CompanyCase Study: International CPG Company
Case Study: International CPG CompanyGigya
 
Case Study: Travel and Hospitality Company
Case Study: Travel and Hospitality CompanyCase Study: Travel and Hospitality Company
Case Study: Travel and Hospitality CompanyGigya
 
Case Study: Enterprise Media Company
Case Study: Enterprise Media CompanyCase Study: Enterprise Media Company
Case Study: Enterprise Media CompanyGigya
 
Case Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce CompanyCase Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce CompanyGigya
 
Gigya Corporate Overview - French Edition
Gigya Corporate Overview - French EditionGigya Corporate Overview - French Edition
Gigya Corporate Overview - French EditionGigya
 
Managing Consumer Data Privacy
Managing Consumer Data PrivacyManaging Consumer Data Privacy
Managing Consumer Data PrivacyGigya
 
Information Security and Data Privacy Practices
Information Security and Data Privacy PracticesInformation Security and Data Privacy Practices
Information Security and Data Privacy PracticesGigya
 
Russian Data Center
Russian Data CenterRussian Data Center
Russian Data CenterGigya
 
Connect, Collect, Convert
Connect, Collect, ConvertConnect, Collect, Convert
Connect, Collect, ConvertGigya
 
Gigya and Marketo
Gigya and MarketoGigya and Marketo
Gigya and MarketoGigya
 
White Paper: 5 Ways Airports Can Drive Non-Aviation Revenue
White Paper: 5 Ways Airports Can Drive Non-Aviation RevenueWhite Paper: 5 Ways Airports Can Drive Non-Aviation Revenue
White Paper: 5 Ways Airports Can Drive Non-Aviation RevenueGigya
 
Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...
Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...
Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...Gigya
 

More from Gigya (20)

White Paper: 2017 Predictions - French
White Paper: 2017 Predictions - FrenchWhite Paper: 2017 Predictions - French
White Paper: 2017 Predictions - French
 
White Paper: 2017 Predictions - German
White Paper: 2017 Predictions - GermanWhite Paper: 2017 Predictions - German
White Paper: 2017 Predictions - German
 
Case study - American Kennel Club
Case study - American Kennel ClubCase study - American Kennel Club
Case study - American Kennel Club
 
Data Sheet: Corporate Overview
Data Sheet: Corporate OverviewData Sheet: Corporate Overview
Data Sheet: Corporate Overview
 
Gigya Infographic - Death Of A Password
Gigya Infographic - Death Of A PasswordGigya Infographic - Death Of A Password
Gigya Infographic - Death Of A Password
 
GDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - GermanGDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - German
 
White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)
 
White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)
 
Case Study: International CPG Company
Case Study: International CPG CompanyCase Study: International CPG Company
Case Study: International CPG Company
 
Case Study: Travel and Hospitality Company
Case Study: Travel and Hospitality CompanyCase Study: Travel and Hospitality Company
Case Study: Travel and Hospitality Company
 
Case Study: Enterprise Media Company
Case Study: Enterprise Media CompanyCase Study: Enterprise Media Company
Case Study: Enterprise Media Company
 
Case Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce CompanyCase Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce Company
 
Gigya Corporate Overview - French Edition
Gigya Corporate Overview - French EditionGigya Corporate Overview - French Edition
Gigya Corporate Overview - French Edition
 
Managing Consumer Data Privacy
Managing Consumer Data PrivacyManaging Consumer Data Privacy
Managing Consumer Data Privacy
 
Information Security and Data Privacy Practices
Information Security and Data Privacy PracticesInformation Security and Data Privacy Practices
Information Security and Data Privacy Practices
 
Russian Data Center
Russian Data CenterRussian Data Center
Russian Data Center
 
Connect, Collect, Convert
Connect, Collect, ConvertConnect, Collect, Convert
Connect, Collect, Convert
 
Gigya and Marketo
Gigya and MarketoGigya and Marketo
Gigya and Marketo
 
White Paper: 5 Ways Airports Can Drive Non-Aviation Revenue
White Paper: 5 Ways Airports Can Drive Non-Aviation RevenueWhite Paper: 5 Ways Airports Can Drive Non-Aviation Revenue
White Paper: 5 Ways Airports Can Drive Non-Aviation Revenue
 
Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...
Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...
Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...
 

Recently uploaded

Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Hararemasabamasaba
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in sowetomasabamasaba
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 
tonesoftg
tonesoftgtonesoftg
tonesoftglanshi9
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...chiefasafspells
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benonimasabamasaba
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 

Recently uploaded (20)

Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

  • 1. Survey Guide: Businesses Should Begin Preparing for the Death of the Password
  • 2. 2 Survey Guide: Businesses Should Begin Preparing for the Death of the Password The way digital enterprises connect with their customers is changing. Consumers are demanding more trusted and personalized experiences in exchange for their per- sonally-identifiable information (PII), while businesses are struggling to protect user privacy in light of growing global security and privacy concerns. Traditional authentication solutions and methods were simply not built to bridge this widening gap. As consumer patience for archaic security barriers like username and password combinations starts to wane, enterprises must find a way to secure millions of identities while still providing streamlined customer experiences. Our most recent survey, which collected the perspectives of 4,000 adults in the US and UK, examines the ways that consumers create and manage their passwords and online accounts, and how next-generation authentication methods like biometrics are gaining traction among a variety of age groups. Let’s take a look at the results. The Challenge of Password Management As a means of authentication, traditional username and password combinations themselves are not inherently secure. Their ability to protect user identities and data is dependent not just on the technology and security protocols put into place by organizations, but also dependent on consumers following best practices for creating and managing passwords. However, according to our survey results, only 16% of people follow these best practices by maintaining a unique password for each of their online accounts. Baby Boomers, or respondents ages 51-69, are the most cautious when it comes to password duplications, with 65% creating 5 or more passwords across their online accounts, compared to just 44% of Millennials, or respondents ages 18-34. Re-using the same password across multiple accounts increases risk in that if one account is compromised, others can be easily accessed as well.
  • 3. 3 To make matters worse, 56% of people use passwords that they know are not secure, such as those that include their names or birthdates. Baby Boomers are more cautious when it comes to protecting their identities than younger generations, with 53% claiming they never create easy-to-remember yet unsecure passwords, compared to 42% of Generation X respondents and 33% of Millennials. With identity fraud costing Americans alone $16 billion per year, one would expect consumers to be more cautious when it comes to protecting their financial accounts. However, more than one quarter of all respondents say that they do not take the time to create more complicated passwords for online accounts linked to financial information, such as banks, eCommerce sites, etc. HOW MANY DIFFERENT PASSWORDS DO YOU USE ACROSS ALL OF YOUR ONLINE ACCOUNTS? DO YOU CREATE MORE COMPLICATED PASSWORDS FOR YOUR ONLINE ACCOUNTS THAT ARE TIED TO FINANCIAL INFORMATION (ONLINE STORES, BANKS, CREDIT MONITORING, ETC.)? ¼ OF PEOPLE don’t create more complicated passwords for financial accounts. Millennials 18-34 Generation X 35-50 Baby Boomers 51-69 I Use the Same Password for All of My Online Accounts I Create a Unique Password for Every Online Account 2-4 5+ 8% 6% 4% 48% 35% 31% 32% 43% 45% 12% 16% 20%
  • 4. 4 Perhaps the most surprising illustration of Baby Boomers taking security much more seriously than their younger counterparts is that they are nearly twice as likely as Millennials to activate two-factor authentication when logging in to an online account. Two-factor authentication ensures the validity of a user’s identity and minimizes account phishing by adding an additional authentication step during the login process, such as sending a verification code via SMS to the user’s mobile phone. Likely due to the real-time nature of new technologies and platforms like mobile devices and social networks, Millennials appear to lack the patience and dedication of older generations when it comes to following password creation and management best practices. User Experience Suffers the Consequences As consumers create unsecure passwords and reuse login credentials across devices and domains, they generate risk for businesses by leaving their accounts open to phishing and fraud. In fact, our survey results show that more than 25% of respondents have had an online account compromised in the past 12 months. For Millennials, this number jumps to 35%, which is more than likely a direct reflection of this age group’s failure to follow password best practices. In contrast, this number drops to less than 20% for Baby Boomers. In an effort to combat this risk, many businesses employ account creation features such as CAPTCHA and password strength meters, or enforce password requirements like special characters and numbers. Unfortunately, attempts to enhance password security often have a negative impact on users’ registration experiences, with one third of consumers admitting to abandoning the creation of an online account due to complex password requirements. Millennials Generation X Baby Boomers 0 65% 72% 82% 1-3 27% 22% 17% 4-6 6% 4% 1% 7-9 1% 1% 0% 10+ 1% 1% 0% In the past 12 months, how many of your online accounts have been compromised?
  • 5. 5 Even if users do make it past the hurdle of account creation, login roadblocks such as forgetting a username, password or answer to a security question have caused more than half of consumers to abandon a site. This happens more than one may think: 84% of people forgot and had to reset a password at least once in the last year, while 25% forget six times or more in the same 12-month period. HAVE STRICT PASSWORD COMPLEXITY REQUIREMENTS SUCH AS IN THE EXAMPLE ABOVE EVER LED YOU TO COMPLETELY ABANDON THE CREATION OF AN ONLINE ACCOUNT? HAVE YOU EVER COMPLETELY ABANDONED A LOGIN PAGE DUE TO COMPLICATIONS LIKE A FORGOTTEN USERNAME, FORGOTTEN PASSWORD OR AN INCORRECT ANSWER TO A SECURITY QUESTION? YES 32%NO 68% YES 55% NO 45%
  • 6. 6 With Millennials unwilling to follow password creation best practices and attempts to combat the associated risk resulting in poor user experiences, businesses looking to stay connected with consumers must start exploring authentication solutions that are both secure and convenient. The Rise of Next-Gen Authentication Given the security and customer experience challenges associated with traditional online account registration flows, 52% of consumers say that, if given the option, they would do away with usernames and passwords altogether in favor of other forms of authentication. In fact, according to our survey results, they have already started to explore these other options. While biometric authentication is still in its infancy, with just 20% of Baby Boomers having used biometric technology like Apple’s Touch ID fingerprint scanner, it is gaining much higher traction with Millennials, almost 50% of whom claim to have used at least one form of biometric authentication. In the same vein, 66% of Millennials, compared to just 48% of Gen X and 30% of Baby Boomers, say they own at least one device that offers some form of biometric authentication. IN A 12-MONTH PERIOD, THE AVERAGE CONSUMER FORGETS A PASSWORD… 16% 17% 8% 59% 0 TIMES 11+ Times
  • 7. 7 OF ALL OF THE DEVICES (SMARTPHONE, TABLET, LAPTOP, ETC.) THAT YOU OWN, HOW MANY OF THEM OFFER SOME FORM OF BIOMETRIC AUTHENTICATION (FINGERPRINT SCANNING TECHNOLOGY, VOICE RECOGNITION, FACIAL RECOGNITION, IRIS SCAN)? Millennials Generation X Baby Boomers 0 34% 52% 70% 1 44% 30% 22% 2-3 20% 17% 8% 4+ 2% 1% 0% WHICH OF THE FOLLOWING FORMS OF BIOMETRIC AUTHENTICATION HAVE YOU USED BEFORE? SELECT ALL THAT APPLY. FINGERPRINT SCANNING TECHNOLOGY (like Apple Touch ID ) VOICE RECOGNITION FACIAL RECOGNITION IRIS (EYE) SCAN NONE 38% 51% 68% 80% 21% 14% 15% 9% 3% 11% 8% 4% 5% 3% 4% MILLENNIALS GENERATIONX BABY BOOMERS However, these low percentages signal that consumer understanding and awareness of biometric technologies still have significant room for growth. Any device with a camera or microphone has the potential to be a biometric-enabled device, and 91% of UK and 80% of US Millennials own a smartphone.
  • 8. 8 The Future of Authentication Of course, scanning one’s finger or face is far more convenient than creating and remembering yet another username/password combination. What’s more, 80% of consumers who expressed a preference believe that biometric authentication is more secure than traditional registration. With passwords failing to provide the better, more trusted experiences today’s consumers are demanding, biometrics and other methods of next- generation authentication are sure to begin emerging at a faster and higher rate. Amidst these changes only one thing is for certain: the password is dying. Is your business prepared? For more information about registration best practices and the future of authentication, visit www.gigya.com or call us at 650.353.7230. YES 80% NO 20% Is biometric authentication perceived to be safer than traditional registration? Is Biometric authentication safer? Of consumers who expressed a preference
  • 9. The Leader in Customer Identity Management © 2016 Gigya, Inc.  |  2513 Charleston Road #200, Mountain View, CA 94043  |  T : (650) 353.7230  |  www.gigya.com Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in the United States and/or other countries. All other trademarks are the property of their respective owners. Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya’s services available to our clients and their end users. Gigya acts as an agent or back-end vendor of its client’s website or mobile application, to which the end user of our client granted permissions (if applicable). Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its clients and at its clients’ direction. For more information, please see Gigya’s Privacy Policy, available at http://www.gigya.com/privacy-policy/. Gigya_WP_Businesses_Preparing_Death_Password_042016 About Gigya Gigya’s Customer Identity Management Platform helps companies build better customer relationships by turning unknown site visitors into known, loyal and engaged customers. With Gigya’s technology, businesses increase registrations and identify customers across devices, consolidate data into rich customer profiles, and provide better service, products and experiences by integrating data into marketing and service applications. Gigya’s platform was designed from the ground up for social identities, mobile devices, consumer privacy and modern marketing. Gigya provides developers with the APIs they need to easily build and maintain secure and scalable registration, authentication, profile management, data analytics and third-party integrations. More than 700 of the world’s leading businesses such as Fox, Forbes, and ASOS rely on Gigya to build identity-driven relationships and to provide scalable, secure Customer Identity Management. To learn how Gigya can help your business manage customer identities, visit gigya.com, or call us at 650.353.7230.