BitDepthFeatured

The password problem

3 Mins read
  • Compromised passwords are the root cause of most cybersecurity problems.
  • YouTube has the highest password reset frequency with 4.3 times per year.
  • The digital identity market is projected to reach USD 133.19 billion by 2030.

Above: Illustration by nao701030455/DepositPhotos

BitDepth#1506 for April 14, 2025

At the heart of most cybersecurity problems is a compromised password.

A password that was guessed.
A password unknowingly shared with a hacker in a phishing operation.
A password found in a data breach that remained unchanged.

It doesn’t matter how well something is locked down if the key can be easily found or replicated.

Passwords are a problem, not least because they are such a pain to think up, to remember and to change with any kind of non-mandated frequency.

Heepsy, an online service for tracking influencers for marketing recently published its findings about password reset frequency.

Why would a user request a password reset? They might have forgotten the password. They might be concerned that a data breach might have left their account vulnerable.

The user might also be in the midst of having their account hijacked through a phishing email and a careless response might make the situation even worse.

Heepsy tallied the search requests by platform for the terms, “password reset,” “forgot password” and “recover account.”

YouTube topped Heepsy’s evaluation, with 35,899 searches per 100,000 users and an estimated password reset frequency of 4.3 times per year.

The top ten lineup in this ranking of password resets runs the way you would expect. A platform with more users tends to have more password reset requests.

YouTube, with 3.9 billion active users and Facebook with 2.1 billion are ranked first and second, but you have to skip two placings, past Pinterest and X, to get to the third largest platform profiled.

Instagram has 1.6 billion users but just 5,894 search requests per 100,00 users and only 0.7 reset requests per year.

It’s unlikely that Facebook has different levels of user security on Facebook and Instagram, so how and where the platform is used might play a role in understanding the wide variance in password vulnerability.

One key difference between Instagram and the other high volume user platforms, YouTube and Facebook, is access.

Just two per cent of Instagram account holders visit the site on the desktop. It is overwhelmingly a mobile app platform.

The platform with the next largest user base, LinkedIn, with less than a quarter of Instagram’s users at 386 million, logs 0.3 resets annually.

What’s causing this epidemic of password resets and recovery?

Y’all keep using weak passwords. Nordpass noted in its 2024 report on the weakest passwords being used that “123456” again topped the rankings with three million instances found in dark web data dumps.

Following close behind was “123456789” with 1.6 million instances. People. We aren’t even trying here.

Heepsy’s list of the top websites and their reset password search profiles.

Passwords are reused across multiple sites and apps by 85 per cent of users, increasing the ripple effect of hacks.

Weak or stolen passwords are responsible for 80 per cent of data breaches.

Password managers seemed like a good solution at one point. Allow the password manager to create truly gibberish passwords and have just one password that unlocks it.

You can probably figure out what happened next.

With a tempting cache of user passwords available, hackers turned their attention to breaching the security of password manager sites.

Lastpass was attacked twice in 2022, losing source code in the first breach and exposing customer data in the second.

Norton Lifelock warned 6,000 of their customers after being breached in a 2023 credential stuffing attack, a brute force assault that uses passwords sourced in other breaches.

Bitwarden users were lured with a phishing attack in a fake Google ad.

Password State faced a sophisticated attack which began with a fake software update that used phishing techniques to capture user credentials.

Efforts at implementing passwordless systems are still in early implementation. Authenticators tend to be required, not sought out.

Even the best two-factor authentication systems can be annoying to use and the available authenticators from Google and Microsoft aren’t as widely deployed as entry control systems as they should be by now.

It doesn’t help that the lock-in on both systems is so thorough. If you choose to commit to one system, you will have to start the authentication process over entirely to change software.

Google’s authenticator has to do some serious work on feature parity, particularly back-end security and biometric support to match Microsofts’ rival app.

Authenticator apps are the public face of a much larger movement to identity solutions that are embedded in digital services and products.

It’s a growth industry estimated to grow from USD 42.12 billion in 2024 to USD 133.19 billion by 2030.

We won’t be escaping the confusing tyranny of passwords anytime soon, so a personal strategy for creating complex but memorable passwords should be part of your online agenda.

Unfinished symphonies

Unfinished symphonies

The market viability of creative projects often can't be realistically assessed until the work is done.
Read More
Do you know who your child is talking to?

Do you know who your child is talking to?

That gorgeous, soft-spoken Swedish girl who admires your boy-child might a retired Nigerian prince looking for a new revenue stream.
Read More
Windows on a Mac, 2025

Windows on a Mac, 2025

Software virtualisation solutions were a great solution for users who just needed to run one or two apps on Windows that weren't processor intensive.
Read More
An Affinity for Canva

An Affinity for Canva

Professionally oriented software that integrates seamlessly with a consumer grade design tool is next level gamesmanship.
Read More
When the cloud bursts

When the cloud bursts

Hyperscalers typically operate networks of hundreds of data centers with millions of servers distributed globally.
Read More
Encryption, privacy and public safety

Encryption, privacy and public safety

Without encryption, that data can be read, copied or changed in transit. Encryption makes that data unreadable to outsiders
Read More
Big budget for tech, unclear spending strategy

Big budget for tech, unclear spending strategy

ICT is now the single largest line item under economic infrastructure spending in the 2026 PSIP with almost a third of that budget at $400 million.
Read More
Caribbean cryptocurrency concerns

Caribbean cryptocurrency concerns

In a pause with a defined timeline, operators may move outside the jurisdiction or take government to court and hope it drags on.
Read More
Suddenly, 30 years later…

Suddenly, 30 years later…

It’s really difficult to get excited over shiny and new when you’ve seen how quickly that gloss gets tarnished and eventually rots.
Read More
A blanket ban on cryptocurrency is a Luddite’s strategy

A blanket ban on cryptocurrency is a Luddite’s strategy

The government has not made it clear to what extent the new bill is intended to deepen compliance requirements with the FATF.
Read More
The parable of the rake

The parable of the rake

The first school reopening that included rake distribution was, predictably, somewhat chaotic.
Read More
AI and the jobs of the future

AI and the jobs of the future

Of the three broad classes of jobs, making, thinking, and caring, the ones that are likely to survive will be those that are driven by thinking and caring.
Read More
What Barbados’ Banyan acquisition teaches us

What Barbados’ Banyan acquisition teaches us

Our continuing national mistake in art, culture and journalism has been to treat the final product as the only product.
Read More
Is the M4MacMini a workstation?

Is the M4MacMini a workstation?

This computer can't be upgraded after purchase. You have to choose your specs on purchase and live with it
Read More
Jamaica’s digital transformation journey

Jamaica’s digital transformation journey

"Failure to share the vision and mission can lead to misalignment of that business or ministry with the IT plan."
Read More
How USB-C failed us

How USB-C failed us

USB-C cables shipped with smartphones were often cheap and delivered power, but limited or no data transfer at all.
Read More
How AI summaries will break knowledge

How AI summaries will break knowledge

Google has been indexing the collective wisdom of the open internet for the last two-and-a-half decades.
Read More
Drifting to data-driven decisions

Drifting to data-driven decisions

"Many organizations are collecting data, but few are converting it into action."
Read More
What .POST means for secure communications

What .POST means for secure communications

Posts are not just offering digital postal services, they are offering digital services across multiple sectors.
Read More
Samsung launches new Z series Flip, Fold

Samsung launches new Z series Flip, Fold

A foldable phone looks like a standard smartphone when shut and usually has a functional screen on its face.
Read More
Unfinished symphonies Unfinished symphonies
Do you know who your child is talking to? Do you know who your child...
Windows on a Mac, 2025 Windows on a Mac, 2025
An Affinity for Canva An Affinity for Canva
When the cloud bursts When the cloud bursts
Encryption, privacy and public safety Encryption, privacy and public safety
Big budget for tech, unclear spending strategy Big budget for tech, unclear spending...
Caribbean cryptocurrency concerns Caribbean cryptocurrency concerns
Suddenly, 30 years later… Suddenly, 30 years later…
A blanket ban on cryptocurrency is a Luddite’s strategy A blanket ban on cryptocurrency is...
The parable of the rake The parable of the rake
AI and the jobs of the future AI and the jobs of the...
What Barbados’ Banyan acquisition teaches us What Barbados’ Banyan acquisition teaches us
Is the M4MacMini a workstation? Is the M4MacMini a workstation?
Jamaica’s digital transformation journey Jamaica’s digital transformation journey
How USB-C failed us How USB-C failed us
How AI summaries will break knowledge How AI summaries will break knowledge
Drifting to data-driven decisions Drifting to data-driven decisions
What .POST means for secure communications What .POST means for secure communications
Samsung launches new Z series Flip, Fold Samsung launches new Z series Flip,...

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
BitDepthFeatured

Encryption, privacy and public safety

4 Mins read
Without encryption, that data can be read, copied or changed in transit. Encryption makes that data unreadable to outsiders
FeaturedNews Briefs

Venture Credit Union announces recovery from ransomware attack

2 Mins read
The Qilin ransomware group has become increasingly active in the Caribbean in 2025.
Press Releases

iGovTT hosts first two-day cyberdrill

2 Mins read
The core of the event focused on practical skill-building and collaboration.
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
×
FeaturedTechnology Reporting

Where cybersecurity threats begin: Phishing

0
Share your perspective in the comments!x
()
x