Study: Three in Four People at Risk of Being Hacked Due to Poor Password Practices

Study: Three in Four People at Risk of Being Hacked Due to Poor Password Practices

Keeper Security has recently released the results of its latest study, The Keeper Password Management Report: Unifying Perception with Reality. Assessing the password habits of over 8,000 individuals across the US, UK, France and Germany , the report reveals that 3 in 4 (75%) people globally don't adhere to widely-accepted password best practices, with a majority (64%) either using weak passwords or repeat variations of passwords to protect their online accounts. More than a third of people also admitted to feeling overwhelmed when it came to taking action to improve their cybersecurity; an indication that these feelings might be putting people at greater risk of being hacked.

"In order to analyze people's personal cybersecurity hygiene, we asked which animal they would identify with in regard to their cybersecurity behaviors," said Darren Guccione , CEO and Co-founder of Keeper Security. "With over one in four people describing themselves either as an ostrich burying their head in the sand, careless as a bull in a china shop or a possum paralyzed with fear, the industry clearly still has much work to do to get more people comfortable with cybersecurity and better protected as a result."

According to Verizon's annual Data Breach Index Report, up to 80% of successful data breaches are the result of compromised login credentials. However, according to Keeper's study, 57% claim they watch their passwords 'like a hawk' or say they're like a 'lion who confidently takes charge.' Of the former, 40% had no idea whether their passwords had been breached, suggesting a large number of those surveyed are grossly overestimating their cyber-savvy or are wilfully ignoring password hygiene advice. Additionally, only 7% of respondents globally recognized password managers as the best way to achieve personal cybersecurity.

"Password management does not need to be complex, overwhelming or difficult to understand even with a large number of digital accounts to secure," said Craig Lurey , CTO and Co-founder of Keeper Security. "Using a password manager is an ideal way for anyone to protect themself. Along with creating and storing strong and unique passwords for all digital accounts, a password manager can offer protection against phishing attacks and malicious links, because it will not fill credentials if the URL doesn't match what's in the user's vault. A password manager can also be paired with dark web monitoring so users can stay abreast of all account information and take action immediately, if credentials are compromised."

Other significant statistics in the report include:

  • 30% of people still use simple passwords to protect their digital accounts, while 34% admit to repeating variations of the same password.
  • 39% of respondents are unaware of whether they've been breached and 32% do not know whether their passwords are available on the dark web.
  • 64% of respondents are not confident that they are managing their passwords well.
  • 41% of respondents said cybersecurity is too difficult to understand.
  • 29% of Baby Boomers use strong and unique passwords for every account, compared to only 20% of Gen Z respondents, of which 40% found cybersecurity overwhelming – the highest of all the age groups.
  • Men are more confident than women about password security – 39% of men vs. 31% of women.
  • For the full report, please visit: https://www.keepersecurity.com/password-management-report-unifying-perception-with-reality/

    Featured

    • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

      Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

      • Guard Services
    • Identity Governance at the Crossroads of Complexity and Scale

      Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

    • Eagle Eye Networks Launches AI Camera Gun Detection

      Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

    • Report: AI is Supercharging Old-School Cybercriminal Tactics

      AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

    • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

      Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

    New Products

    • ResponderLink

      ResponderLink

      Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

    • AC Nio

      AC Nio

      Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

    • Luma x20

      Luma x20

      Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”