Key Takeaways
- A 2023 Keeper Security survey of over 1,200 consumers found that 79% of respondents admitted to reusing the same password across multiple online accounts, increasing vulnerability to credential stuffing attacks
- Google's 2019 study analyzing 118 million Google accounts revealed that 52% of users had passwords that appeared on dark web lists from previous breaches due to reuse across sites
- A 2022 NordPass report based on data from 200,000 users showed that 69% of people reuse passwords, with the average user having identical passwords on 10 different accounts
- Verizon's 2023 DBIR analyzed 16,000 breaches, finding credential reuse contributed to 49% of incidents
- IBM's 2023 Cost of a Data Breach report stated password reuse led to 29% faster breach identification times but 15% higher costs averaging $4.45M
- Ponemon Institute's 2022 study on 550 organizations showed reuse-related credential stuffing caused 24% of breaches
- A 2022 Google survey of 1,500 users found only 24% were aware that password reuse increases breach risk by 10x
- Keeper's 2023 survey revealed 65% of users know reuse is risky but still do it due to forgetfulness
- NordPass 2022 poll of 2,000 showed 58% believe unique passwords are too hard to remember, leading to reuse
- Verizon 2023 DBIR enterprise section reported 74% of firms have reuse policies, but 49% compliance failure
- IBM 2023 X-Force report on 1,000 enterprises found 62% had reuse in Active Directory
- Ponemon 2022 enterprise survey of 500 orgs showed 68% employees reuse across cloud services
- Keeper Enterprise 2023 report on 5,000 orgs found password managers reduced reuse by 92% where adopted
- LastPass Business 2022 study showed MFA + unique pw cut breach risk from reuse by 99.9%
- Bitwarden Enterprise 2023 audit found 87% drop in reuse after 6 months of deployment
Most people reuse passwords, making them highly vulnerable to widespread cyberattacks.
Enterprise Password Reuse
Enterprise Password Reuse Interpretation
Impact on Security Breaches
Impact on Security Breaches Interpretation
Mitigation and Password Manager Adoption
Mitigation and Password Manager Adoption Interpretation
Prevalence of Password Reuse
Prevalence of Password Reuse Interpretation
User Awareness and Behavior
User Awareness and Behavior Interpretation
Sources & References
- Reference 1KEEPERSECURITYkeepersecurity.comVisit source
- Reference 2BLOGblog.googleVisit source
- Reference 3NORDPASSnordpass.comVisit source
- Reference 4BLOGblog.lastpass.comVisit source
- Reference 5BITWARDENbitwarden.comVisit source
- Reference 6YORKyork.ac.ukVisit source
- Reference 7DASHLANEdashlane.comVisit source
- Reference 8BLOGblog.1password.comVisit source
- Reference 9TEAMPASSWORDteampassword.comVisit source
- Reference 10SPECOPSSOFTspecopssoft.comVisit source
- Reference 11JAVELINSTRATEGYjavelinstrategy.comVisit source
- Reference 12MICROSOFTmicrosoft.comVisit source
- Reference 13HAVEIBEENPWNEDhaveibeenpwned.comVisit source
- Reference 14CYBERSECURITY-INSIDERScybersecurity-insiders.comVisit source
- Reference 15ENZOICenzoic.comVisit source
- Reference 16PEWRESEARCHpewresearch.orgVisit source
- Reference 17AURAaura.comVisit source
- Reference 18STRONGDMstrongdm.comVisit source
- Reference 19UPGUARDupguard.comVisit source
- Reference 20ZOHOzoho.comVisit source
- Reference 21IDCidc.comVisit source
- Reference 22PROOFPOINTproofpoint.comVisit source
- Reference 23OKTAokta.comVisit source
- Reference 24SAILPOINTsailpoint.comVisit source
- Reference 25CYBERARKcyberark.comVisit source
- Reference 26VERIZONverizon.comVisit source
- Reference 27IBMibm.comVisit source
- Reference 28PONEMONponemon.orgVisit source
- Reference 29MANDIANTmandiant.comVisit source
- Reference 30CROWDSTRIKEcrowdstrike.comVisit source
- Reference 31SOPHOSsophos.comVisit source
- Reference 32RAPID7rapid7.comVisit source
- Reference 33UNIT42unit42.paloaltonetworks.comVisit source
- Reference 34FIREEYEfireeye.comVisit source
- Reference 35AKAMAIakamai.comVisit source
- Reference 36IMPERVAimperva.comVisit source
- Reference 37F5f5.comVisit source
- Reference 38SIFTsift.comVisit source
- Reference 39KNOWBE4knowbe4.comVisit source
- Reference 40EMSISOFTemsisoft.comVisit source
- Reference 41CHAINALYSISchainalysis.comVisit source
- Reference 42RECORDEDFUTURErecordedfuture.comVisit source
- Reference 43BLOGblog.talosintelligence.comVisit source
- Reference 44EXTRAHOPextrahop.comVisit source
- Reference 45DARKTRACEdarktrace.comVisit source
- Reference 46CLcl.cam.ac.ukVisit source
- Reference 471PASSWORD1password.comVisit source
- Reference 48DUOduo.comVisit source
- Reference 49YUBICOyubico.comVisit source
- Reference 50PINGIDENTITYpingidentity.comVisit source
- Reference 51FORGROCKforgrock.comVisit source
- Reference 52AUTH0auth0.comVisit source
- Reference 53CLOUDcloud.google.comVisit source
- Reference 54ZSCALERzscaler.comVisit source
- Reference 55NETSKOPEnetskope.comVisit source
- Reference 56HASHICORPhashicorp.comVisit source






