• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
Facility, Network Security, News

The Generation With the Worst Password Hygiene Is…

This generational group is more likely to reuse passwords for work, a sign of bad password hygiene practices which could make your company less secure.

January 4, 2021 TechDecisions Staff Leave a Comment

the generation with the worst password hygiene, Video Surveillance Trends 2021

About two-thirds of full-time employees in the USA reuse passwords on work accounts and devices, according to Visual Objects.

Recycling the same password on multiple accounts is like having one key for every door — if cybercriminals crack that password, they can access all those accounts.

Visual Objects is not a cybersecurity company; instead, it serves as a portfolio website that showcases work from top creative firms. As such, Visual Objects enables businesses to see creative agencies’ work and visualize future projects.

The survey showed Millennial workers are 6.5 times more likely to reuse work passwords than Baby Boomers, who use safer password practices. The company’s survey also found 91% of employees believe their company is responsible for cybersecurity practices.

In a press release, Visual Objects cites Brad Bussie, vice president of Entisys360’s Advyz Cyber Risk Services, who says Millennials’ comfort with technology encourages poor password behavior.

“Millennials tend to trust that large services have their best interests in mind and that security is built-in,” Bussie adds. “They are the first generation that had easy access to global information.”

Cybersecurity experts recommend companies integrate a two-factor authentication system or a password manager. Neither requires employees to recall complex strings of characters, and both better protect data.

Employees Use Work Devices for Personal Activities

Currently, 63% of employees aren’t concerned about storing personal information on work devices, according to the survey. More than one-fourth of Baby Boomers (27%) are very comfortable with keeping personal information on work devices, despite associated cyber risks. However, only 17% of Millennials felt this way.

Using work devices for personal activities can make work data more vulnerable. Some experts feel Baby Boomers may not understand the importance of separating work and personal data. However, Christine Sabino, senior associate at data breach claims company Hayes Connor, thinks Millennials are better suited to separate their web activity across multiple devices.

Related: Why Cybersecurity Experts Choose the Good Side

“[Millennials] have more technological devices, like a personal laptop, tablet, mobile phone, and games console,” says Sabino, cited in the press release. “They are less likely to require the use of their work laptop for these [personal] activities.”

Also cited in the press release: Olga Gutenko is a business development manager for security at Vaimo who emphasizes employees share much of the responsibility for cybersecurity.

“Even in this remote work period, employers need to develop a security-focused culture that has buy-in from all employees, [where] employees share the responsibility for security,” Gutenko says.

Visual Objects surveyed 500 full-time U.S. employees to learn about how employees affect cybersecurity at their companies. View the full report here.

This article originally appeared on our sister site, Security Sales & Integration.

Tagged With: Password Security

Related Content:

  • This Week in IT, IT News, Microsoft, Google, Dell This Week in IT: Windows 11 Update, Tech…
  • Cloud THreats, Proofpoint Third Parties and Partners are Leading to Increased…
  • Google Curated Detections Chronicle Google Releases Curated Detections in Chronicle
  • Vendors interacting in an office. CompTIA: Technology Vendor Partner Programs Growing

Free downloadable guide you may like:

  • Shadow ITBlueprint Series: How to Reduce Shadow IT

    The distributed work model gives employees the flexibility they demand, but it can lead to shadow IT and introduce unnecessary security risk. Research finds that this distributed work environment is leading to IT management blind spots and shadow IT.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Shadow IT
Blueprint Series: How to Reduce Shadow IT

The distributed work model gives employees the flexibility they demand, but it can lead to shadow IT and introduce unnecessary security risk. Resea...

Hybrid Work webinar
Featured Webcast: Collaboration 2.0 — Where Are We Now?

In this webinar, subject matter experts discuss the transformation of the workplace, the rise of hybrid workers, the importance of open connectivit...

guide to end user training cover
Pro Tips for Conducting End User Training

Effective trainings are the glue that can make the difference following a new technology implementation that your team has spent so much time, effo...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2022 Emerald X, LLC. All rights reserved.