Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

8/27/2015
08:00 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Consumers Want Password Alternatives

Consumer confidence in online passwords wanes and their password hygiene remains as sketchy as ever, study finds.

Consumers would be very much behind the elimination of passwords from the online environment if retailers, banks and other services could get it together to institute an alternative, according to a new survey out this week.

The study showed that, as things stand, most consumers are not confident in online brands or the efforts they've made so far to supplement password security. And, like many password surveys before it, this one shows once again that part of that mistrust stems from consumers' admitted inability to effectively manage password hygiene for their own accounts.

“Passwords are inherently insecure as a method of authentication, and their efficacy relies on end users, developers, system administrators, and the applications themselves, all of which are vulnerable to a wide variety of attack vectors currently being exploited by cyberattacks around the world," says Geoff Sanders, CEO of LaunchKey, which conducted the survey among 589 respondents.

The report confirms similar numbers from past surveys. For example, 68 percent of respondents reuse passwords across multiple accounts and 77 percent often forget passwords and have to write them down. This comes largely from the volume of login details they must remember. Nearly half of respondents have to manage more than 10 passwords at a time.

In spite of many major brands working on efforts to institute two-factor authentication, nearly two-thirds of consumers are still unfamiliar with these additional authentication methods and only about 20 percent believe they are easy to use, according to the survey.

Another survey out this week by Ponemon Institute shows that growing awareness of two-factor methods have started to up the ante on consumer perception of password security online environments. Looking at what drives consumer confidence in online brands, the study showed that 31 percent of consumers don't trust websites that only rely on passwords to identify and authenticate them.

Tellingly in the LaunchKey survey, 52 percent of survey respondents said they had little to no confidence in online retailers and 76 percent feel their data would be more secure with an alternative form of verification. Just over half of them support the idea of getting rid of passwords altogether. Approximately 59 percent of respondents say they'd prefer using fingerprint scans over passwords.

"The future of authentication is free from traditional passwords,” Sanders said. “We must remove the vulnerability and liability that passwords have created while implementing more secure authentication methods that account for an evolving and diversified landscape of use cases, end users and threats.”

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
sillieabbe
50%
50%
sillieabbe,
User Rank: Apprentice
9/7/2015 | 4:04:50 AM
A passwordless world would bring a nightmare.
In a world where we live without remembered passwords, say, where our identity is established without our volitional participation, we would be able to have a safe sleep only when we are alone in a firmly locked room. Is this what we want?
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-22675
PUBLISHED: 2021-05-07
The affected product is vulnerable to integer overflow while parsing malformed over-the-air firmware update files, which may allow an attacker to remotely execute code on SimpleLink Wi-Fi (MSP432E4 SDK: v4.20.00.12 and prior, CC32XX SDK v4.30.00.06 and prior, CC13X0 SDK versions prior to v4.10.03, C...
CVE-2021-22679
PUBLISHED: 2021-05-07
The affected product is vulnerable to an integer overflow while processing HTTP headers, which may allow an attacker to remotely execute code on the SimpleLink Wi-Fi (MSP432E4 SDK: v4.20.00.12 and prior, CC32XX SDK v4.30.00.06 and prior, CC13X0 SDK versions prior to v4.10.03, CC13X2 and CC26XX SDK v...
CVE-2020-14009
PUBLISHED: 2021-05-07
Proofpoint Enterprise Protection (PPS/PoD) before 8.17.0 contains a vulnerability that could allow an attacker to deliver an email message with a malicious attachment that bypasses scanning and file-blocking rules. The vulnerability exists because messages with certain crafted and malformed multipar...
CVE-2021-21984
PUBLISHED: 2021-05-07
VMware vRealize Business for Cloud 7.x prior to 7.6.0 contains a remote code execution vulnerability due to an unauthorised end point. A malicious actor with network access may exploit this issue causing unauthorised remote code execution on vRealize Business for Cloud Virtual Appliance.
CVE-2021-26122
PUBLISHED: 2021-05-07
LivingLogic XIST4C before 0.107.8 allows XSS via feedback.htm or feedback.wihtm.