SlideShare a Scribd company logo
8 SCARY
STATISTICS
ABOUT
PASSWORD
REUSE
swipe left
According to a Google survey, at
least 65% of people reuse passwords
across multiple, if not all, sites.
01
swipe left
Source: Google
72% of individuals reuse passwords
in their personal life while nearly half
(49%) of employees simply change
or add a digit or character to their
password when updating their
company password every 90 days.
These forced resets are an
ineffective tactic.
02
swipe left
According to Security.org, 76% of
millennials recycle their passwords.
03
swipe left
73% of users duplicate their
passwords in both their personal
and work accounts.
04
swipe left
Source: Microsoft
Another recent survey found that
91% of respondents claim to
understand the risks of reusing
passwords across multiple accounts,
but 59% admitted to doing it
anyway.
05
swipe left
06
swipe left
The average person reuses each
password as many as 14 times.
Microsoft recently announced that a
staggering 44 million accounts were
vulnerable to account takeover due
to compromised or stolen
passwords.
07
swipe left
Compromised passwords are
responsible for 81% of hacking-
related breaches, according to the
Verizon Data Breach Investigations
Report.
08
swipe left
Source: Verizon
InstaSafe empowers organizations in their digital
transformation journey, by enabling secure access
of enterprise applications to users, with enhanced
security, seamless experience, and minimal risk.
As an industry pioneer in Zero Trust, human-centric
solutions, we, at InstaSafe have backed the belief
that at the center of security for businesses, lies the
ability to enable workforces to unleash their
potential, irrespective of where they are. Which is
why we help organizations in fulfilling their goal of
productivity on scale, by simplifying the challenge
of ACCESS.
With our hyperscalable and modular solutions, we
aim to make the cloud and remote journey for
businesses and workforces, much simpler, and
much more secure.
We are InstaSafe

More Related Content

More from InstaSafe Technologies

InstaSafe vs Zscaler Private Access V2_Editable Verison
InstaSafe vs Zscaler Private Access V2_Editable VerisonInstaSafe vs Zscaler Private Access V2_Editable Verison
InstaSafe vs Zscaler Private Access V2_Editable Verison
InstaSafe Technologies
 
Introduction to InstaSafe Zero Trust
Introduction to InstaSafe Zero TrustIntroduction to InstaSafe Zero Trust
Introduction to InstaSafe Zero Trust
InstaSafe Technologies
 
Frequently Asked Questions on InstaSafe Zero Trust Solutions
Frequently Asked Questions on InstaSafe Zero Trust SolutionsFrequently Asked Questions on InstaSafe Zero Trust Solutions
Frequently Asked Questions on InstaSafe Zero Trust Solutions
InstaSafe Technologies
 
Total visibility with InstaSafe : The Master Key to Zero Trust
Total visibility with InstaSafe : The Master Key to Zero TrustTotal visibility with InstaSafe : The Master Key to Zero Trust
Total visibility with InstaSafe : The Master Key to Zero Trust
InstaSafe Technologies
 
InstaSafe Zero Trust - A better alternative to VPNs
InstaSafe Zero Trust - A better alternative to VPNsInstaSafe Zero Trust - A better alternative to VPNs
InstaSafe Zero Trust - A better alternative to VPNs
InstaSafe Technologies
 
InstaSafe Zero Trust solution - Multiple Scenarios and use cases
InstaSafe Zero Trust solution - Multiple Scenarios and use casesInstaSafe Zero Trust solution - Multiple Scenarios and use cases
InstaSafe Zero Trust solution - Multiple Scenarios and use cases
InstaSafe Technologies
 
InstaSafe Zero Trust vs Legacy VPN solutions
InstaSafe Zero Trust vs Legacy VPN solutionsInstaSafe Zero Trust vs Legacy VPN solutions
InstaSafe Zero Trust vs Legacy VPN solutions
InstaSafe Technologies
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Technologies
 
Datasheet-Remote Access Use Case
Datasheet-Remote Access Use CaseDatasheet-Remote Access Use Case
Datasheet-Remote Access Use Case
InstaSafe Technologies
 
InstaSafe secures VoIP and applications access for the world's largest BPM firm
InstaSafe secures VoIP and applications access for the world's largest BPM firmInstaSafe secures VoIP and applications access for the world's largest BPM firm
InstaSafe secures VoIP and applications access for the world's largest BPM firm
InstaSafe Technologies
 
Copy of 7 Security Tips to Manage Global Remote Workforces
Copy of 7 Security Tips to Manage Global Remote WorkforcesCopy of 7 Security Tips to Manage Global Remote Workforces
Copy of 7 Security Tips to Manage Global Remote Workforces
InstaSafe Technologies
 
Top 6 Industries At Risk For Cyber Attacks
Top 6 Industries At Risk For Cyber AttacksTop 6 Industries At Risk For Cyber Attacks
Top 6 Industries At Risk For Cyber Attacks
InstaSafe Technologies
 
Kaseya Ransomware
Kaseya RansomwareKaseya Ransomware
Kaseya Ransomware
InstaSafe Technologies
 
Cybersecurity Trends 2022
Cybersecurity Trends 2022 Cybersecurity Trends 2022
Cybersecurity Trends 2022
InstaSafe Technologies
 
Zero Trust An Answer to the Ransomware Menace
Zero Trust An Answer to the Ransomware MenaceZero Trust An Answer to the Ransomware Menace
Zero Trust An Answer to the Ransomware Menace
InstaSafe Technologies
 
Why Zero Trust is a Better Alternative to Business VPNs
Why Zero Trust is a Better Alternative to Business VPNsWhy Zero Trust is a Better Alternative to Business VPNs
Why Zero Trust is a Better Alternative to Business VPNs
InstaSafe Technologies
 
Top 10 Cloud Security Risks
Top 10 Cloud Security RisksTop 10 Cloud Security Risks
Top 10 Cloud Security Risks
InstaSafe Technologies
 
Top 7 Enterprise Cybersecurity Challenges in 2022
Top 7 Enterprise Cybersecurity Challenges in 2022Top 7 Enterprise Cybersecurity Challenges in 2022
Top 7 Enterprise Cybersecurity Challenges in 2022
InstaSafe Technologies
 
Top 6 Ways To Secure Remote Access For Your Company
Top 6 Ways To Secure Remote Access For Your CompanyTop 6 Ways To Secure Remote Access For Your Company
Top 6 Ways To Secure Remote Access For Your Company
InstaSafe Technologies
 
SolarWinds Attack
SolarWinds AttackSolarWinds Attack
SolarWinds Attack
InstaSafe Technologies
 

More from InstaSafe Technologies (20)

InstaSafe vs Zscaler Private Access V2_Editable Verison
InstaSafe vs Zscaler Private Access V2_Editable VerisonInstaSafe vs Zscaler Private Access V2_Editable Verison
InstaSafe vs Zscaler Private Access V2_Editable Verison
 
Introduction to InstaSafe Zero Trust
Introduction to InstaSafe Zero TrustIntroduction to InstaSafe Zero Trust
Introduction to InstaSafe Zero Trust
 
Frequently Asked Questions on InstaSafe Zero Trust Solutions
Frequently Asked Questions on InstaSafe Zero Trust SolutionsFrequently Asked Questions on InstaSafe Zero Trust Solutions
Frequently Asked Questions on InstaSafe Zero Trust Solutions
 
Total visibility with InstaSafe : The Master Key to Zero Trust
Total visibility with InstaSafe : The Master Key to Zero TrustTotal visibility with InstaSafe : The Master Key to Zero Trust
Total visibility with InstaSafe : The Master Key to Zero Trust
 
InstaSafe Zero Trust - A better alternative to VPNs
InstaSafe Zero Trust - A better alternative to VPNsInstaSafe Zero Trust - A better alternative to VPNs
InstaSafe Zero Trust - A better alternative to VPNs
 
InstaSafe Zero Trust solution - Multiple Scenarios and use cases
InstaSafe Zero Trust solution - Multiple Scenarios and use casesInstaSafe Zero Trust solution - Multiple Scenarios and use cases
InstaSafe Zero Trust solution - Multiple Scenarios and use cases
 
InstaSafe Zero Trust vs Legacy VPN solutions
InstaSafe Zero Trust vs Legacy VPN solutionsInstaSafe Zero Trust vs Legacy VPN solutions
InstaSafe Zero Trust vs Legacy VPN solutions
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and Benefits
 
Datasheet-Remote Access Use Case
Datasheet-Remote Access Use CaseDatasheet-Remote Access Use Case
Datasheet-Remote Access Use Case
 
InstaSafe secures VoIP and applications access for the world's largest BPM firm
InstaSafe secures VoIP and applications access for the world's largest BPM firmInstaSafe secures VoIP and applications access for the world's largest BPM firm
InstaSafe secures VoIP and applications access for the world's largest BPM firm
 
Copy of 7 Security Tips to Manage Global Remote Workforces
Copy of 7 Security Tips to Manage Global Remote WorkforcesCopy of 7 Security Tips to Manage Global Remote Workforces
Copy of 7 Security Tips to Manage Global Remote Workforces
 
Top 6 Industries At Risk For Cyber Attacks
Top 6 Industries At Risk For Cyber AttacksTop 6 Industries At Risk For Cyber Attacks
Top 6 Industries At Risk For Cyber Attacks
 
Kaseya Ransomware
Kaseya RansomwareKaseya Ransomware
Kaseya Ransomware
 
Cybersecurity Trends 2022
Cybersecurity Trends 2022 Cybersecurity Trends 2022
Cybersecurity Trends 2022
 
Zero Trust An Answer to the Ransomware Menace
Zero Trust An Answer to the Ransomware MenaceZero Trust An Answer to the Ransomware Menace
Zero Trust An Answer to the Ransomware Menace
 
Why Zero Trust is a Better Alternative to Business VPNs
Why Zero Trust is a Better Alternative to Business VPNsWhy Zero Trust is a Better Alternative to Business VPNs
Why Zero Trust is a Better Alternative to Business VPNs
 
Top 10 Cloud Security Risks
Top 10 Cloud Security RisksTop 10 Cloud Security Risks
Top 10 Cloud Security Risks
 
Top 7 Enterprise Cybersecurity Challenges in 2022
Top 7 Enterprise Cybersecurity Challenges in 2022Top 7 Enterprise Cybersecurity Challenges in 2022
Top 7 Enterprise Cybersecurity Challenges in 2022
 
Top 6 Ways To Secure Remote Access For Your Company
Top 6 Ways To Secure Remote Access For Your CompanyTop 6 Ways To Secure Remote Access For Your Company
Top 6 Ways To Secure Remote Access For Your Company
 
SolarWinds Attack
SolarWinds AttackSolarWinds Attack
SolarWinds Attack
 

8 Scary Statistics About Password Reuse

  • 2. According to a Google survey, at least 65% of people reuse passwords across multiple, if not all, sites. 01 swipe left Source: Google
  • 3. 72% of individuals reuse passwords in their personal life while nearly half (49%) of employees simply change or add a digit or character to their password when updating their company password every 90 days. These forced resets are an ineffective tactic. 02 swipe left
  • 4. According to Security.org, 76% of millennials recycle their passwords. 03 swipe left
  • 5. 73% of users duplicate their passwords in both their personal and work accounts. 04 swipe left Source: Microsoft
  • 6. Another recent survey found that 91% of respondents claim to understand the risks of reusing passwords across multiple accounts, but 59% admitted to doing it anyway. 05 swipe left
  • 7. 06 swipe left The average person reuses each password as many as 14 times.
  • 8. Microsoft recently announced that a staggering 44 million accounts were vulnerable to account takeover due to compromised or stolen passwords. 07 swipe left
  • 9. Compromised passwords are responsible for 81% of hacking- related breaches, according to the Verizon Data Breach Investigations Report. 08 swipe left Source: Verizon
  • 10. InstaSafe empowers organizations in their digital transformation journey, by enabling secure access of enterprise applications to users, with enhanced security, seamless experience, and minimal risk. As an industry pioneer in Zero Trust, human-centric solutions, we, at InstaSafe have backed the belief that at the center of security for businesses, lies the ability to enable workforces to unleash their potential, irrespective of where they are. Which is why we help organizations in fulfilling their goal of productivity on scale, by simplifying the challenge of ACCESS. With our hyperscalable and modular solutions, we aim to make the cloud and remote journey for businesses and workforces, much simpler, and much more secure. We are InstaSafe