• Contact Sales
  • Resellers
  • Support
Yubico Header Text LogoYubico Header Text Logo
Why Yubicoexpand_more
Why Yubico
  • Enterprises
  • SMBs
  • Individuals
  • Developers
  • Careers
  • Partner programs
  • Affiliate program
  • Contact Sales
  • Events
  • Press room
  • Yubico Blog
  • Yubico Executive Connect
  • About us
  • The team
  • Innovation history
  • Secure it Forward
Easy-to-use, secure authentication

With YubiKey there’s no tradeoff between great security and usability

Why YubiKey
  • authentication
  • enterprise security
Proven at scale at Google

Google defends against account takeovers and reduces IT costs

Google Case Study
  • authentication
  • enterprise security
Protecting vulnerable organizations

Secure it Forward: One YubiKey donated for every 20 sold

Learn about Secure it Forward
  • authentication
  • enterprise security
Productsexpand_more
All products
  • YubiKey 5 Series
  • YubiKey 5 FIPS Series
  • YubiKey Bio Series
  • Security Key Series
  • YubiKey 5 CSPN Series
  • YubiHSM 2 & YubiHSM 2 FIPS
  • YubiEnterprise Subscription
  • YubiEnterprise Delivery
  • Yubico Authenticator
  • Computer login tools
  • Software Development Toolkits
  • YubiCloud
  • Using YubiKey is easy
  • Find the right YubiKey
  • Works with YubiKey
  • Compare YubiKeys
One key for hundreds of apps and services

YubiKey works out-of-the-box and has no client software or battery

Yubico protects you
  • authentication
  • enterprise security
See YubiKeys as a Service
YubiEnterprise Subscription delivers scale and savings

Gain a future-proofed solution and faster MFA rollouts

See YubiKeys as a Service
  • authentication
  • enterprise security
Solutionsexpand_more
Solutions overview
  • Zero Trust
  • Executive Order OMB M-22-09
  • Phishing-resistant MFA
  • Passwordless
  • Compliance
  • Cyber Insurance
  • Secure supply chain
  • Hybrid & remote workers
  • Secure privileged users
  • Mobile restricted environments
  • Call centers
  • Shared workstations
  • Microsoft ecosystem
  • Salesforce workspace
  • IAM solutions
  • AWS environment
The Bridge to Passwordless

Begin the journey to make your organization passwordless

Get the white paper
  • authentication
  • enterprise security
Accelerate your Zero Trust Strategy

7 best strong authentication practices to jumpstart your Zero Trust program

Get the white paper
  • authentication
  • enterprise security
Federal cybersecurity requirements

See guidance for CIOs and leaders to prepare for the modern cyber threat era

Get the white paper
  • authentication
  • enterprise security
Industriesexpand_more
Industries overview
  • High tech
  • Federal government
  • State & local government
  • Education
  • Financial services
  • Manufacturing
  • Energy & natural resources
  • Retail & hospitality
  • Telecommunications
  • Healthcare
  • Pharmaceuticals
  • Cryptocurrency
  • Elections & campaigns
Manufacturing and supply chain security

Authentication best practices for manufacturing using highest-assurance security

Get the white paper
  • authentication
  • enterprise security
Phishing-resistant MFA: Fact vs. Fiction

Meet requirements for phishing-resistant MFA in OMB M-22-09 guidelines

Get the white paper
  • authentication
  • enterprise security
Secure energy and natural resources from cyber threats

Best practices for phishing-resistant MFA to safeguard your critical infrastructure

Get the white paper
  • authentication
  • enterprise security
Resourcesexpand_more
All resources
  • Yubico Blog
  • Cybersecurity glossary
  • Authentication standards
  • Resource library
  • Developer program
  • Product briefs
  • Solution briefs
  • Case studies
  • Get a pilot started
  • White papers and reports
  • Webinars
BeyondTrust: secured with a subscription

A leader in Privileged Access Management simplifies YubiKey deployment

How they optimized ROI
  • authentication
  • enterprise security
S&P Global Market Intelligence report: old habits die hard

Only 46% of respondents protect their applications with MFA. How about you?

Read the report
  • authentication
  • enterprise security
Secure shared workstations against cyber threats

Shared workstations can be secured with phishing-resistant MFA

Get the white paper
  • authentication
  • enterprise security
Supportexpand_more
Support home
  • Find the right YubiKey
  • Set up your YubiKey
  • Downloads
  • Product documentation
  • Support articles
  • Support Services
  • Professional Services
  • YubiEnterprise Subscription
  • Works with YubiKey Program
  • Buying and shipping information
  • Security advisories
  • Help center
How to set up your YubiKey

Follow our guided tutorials to start protecting your favorite services

Set up your YubiKey
  • authentication
  • enterprise security
Find the best YubiKey for your needs

Take the guided quiz and see which YubiKey best fits your or your businesses needs

Take the quiz
  • authentication
  • enterprise security
Accelerate your YubiKey deployment

Technical and operational guidance for your YubiKey implementation and rollout

Professional Services
  • authentication
  • enterprise security
SubscribeStore
  • Home » Blog » Yubico releases 2020 State of Password and Authentication Security Behaviors report

    Yubico releases 2020 State of Password and Authentication Security Behaviors report

    Ronnie Manning

    Ronnie Manning

    February 19, 2020
    3 minute read
    Share on FacebookShare on TwitterShare on LinkedInShare via Email

    Today, Yubico released its second annual State of Password and Authentication Security Behaviors Report, conducted by Ponemon Institute. The study surveyed 2,507 IT security practitioners in Australia, France, Germany, Sweden, United Kingdom, and United States, as well as 563 individual users.

    Last year’s report strictly focused on IT security professionals and their password and authentication behaviors and beliefs, so in this year’s report we were curious to see if any of these habits improved. Additionally, we wanted to see how their security practices or preferences compared to the individual users — employees and customers — that IT professionals are serving.

    Ultimately, we discovered that both IT practitioners and individuals are engaging in risky security practices. Password problems continue to prevail, two-factor authentication (2FA) lacks adoption, and mobile use introduces a new set of security challenges and complexities.

    • 50% of IT respondents and 39% of individual users reuse passwords across workplace accounts.
    • 59% of IT security respondents report that their organization relies on human memory to manage passwords. 
    • 42% of IT security respondents report that their organization relies on sticky notes to manage passwords.
    • Less than half (46%) of IT professionals require the use of 2FA to gain access to corporate accounts. 
    • 62% of organizations don’t believe that they take the necessary steps to protect information on mobile devices. 

    What’s also interesting about this year’s report is that we can see the gaps between the solutions and technologies that IT security respondents are implementing, and the preferences from individual users.

    • 37% of organizations that implement 2FA to secure business accounts rely on mobile authentication apps and 28% rely on SMS codes. 
    • 23% of individuals believe SMS or mobile authentication app 2FA methods are very inconvenient.
    • 56% of individuals will only adopt new technologies that are easy to use and significantly improve account security. 
    • 56% of individuals who use a personal device to access work-related items don’t use 2FA.

    These findings underscore the need for easy-to-use and highly secure solutions for IT professionals and individual users to reach a safer future together. The good news is that we are well on our way with the growing adoption of FIDO and WebAuthn open standards. Today, WebAuthn is supported in all major platforms and browsers, bringing the benefits of security keys and the promise of passwordless login to millions around the world — two solutions that both IT and individual respondents rated as desirable.

    See our infographic below for a high-level view of some of the most salient findings.

    To download the full research report and infographic, please visit yubico.com/authentication-report-2020. To learn more about cybersecurity trends on the path to digital transformation, sign up for the upcoming Yubico webinar on March 18 at 10 a.m. PST.

    Ponemon report infographic

    Share this article:

    Share on FacebookShare on TwitterShare on LinkedInShare via Email

    Recommended Posts

    • Microsoft Entra ID (Azure AD) adds FIDO2 support on iOS and Conditional Access Authentication Strengths now generally available

      In an effort to protect the nation’s infrastructure and improve cybersecurity, the Executive Order 14028 and the Office of Management and Budget Memo M-22-09 took a strong stance to require phishing-resistant authentication for all federal agencies. The M-22-09 memo also specifies two standards-based authentication protocols that will satisfy the phishing-resistant requirements, FIDO2/WebAuthn and PIV smart […]

      Read more
      • Azure AD
      • Conditional Access Authentication Strengths
      • iOS
      • Microsoft
      • Safari
    • YubiEnterprise Services update: Single sign-on capabilities for greater enterprise scale and speed

      Yubico’s YubiEnterprise Subscription pioneers hardware multi-factor authentication (MFA), the gold standard of enterprise authentication, as a phishing-resistant MFA ‘as-a-Service’ model that helps organizations save money and gain flexibility while experiencing faster rollouts. As part of consistently delivering value to organizations that are raising the bar for security at scale, we are prioritizing delivering meaningful updates […]

      Read more
      • SSO
      • YubiEnterprise
      • YubiEnterprise Subscription
    • Amazon Web Services (AWS) announces support for FIDO2 security keys in AWS GovCloud, IAM policy improvements

      Amazon recently announced improved support for using FIDO2 security keys as an MFA device to log on to the Amazon Web Services (AWS) console. As a result, FIDO2 security keys like the YubiKey are now supported on AWS GovCloud (US region) – providing phishing-resistant MFA for all users.  Additionally, AWS has improved their support for […]

      Read more
      • Amazon Web Services
      • AWS
      • FIDO2
      • GovCloud
      • government
      • IAM
    • Are your shared workstations secured against cyber attacks?

      Shared workstation environments are common across many industries –from point-of-sale (POS) terminals in retail and grab-and-go devices for healthcare workers to call center kiosks and shared computers on manufacturing shop floors. While there can be cost savings and increase in productivity when multiple employees share, this can pose a significant security threat to businesses if […]

      Read more
      • Hyatt
      • shared workstations
      • user experience
Yubico Text LogoYubico Text Logo
  • RSS
  • Twitter
  • LinkedIn
  • Facebook
  • Instagram
  • YouTube
  • GitHub
  • Product finder quiz
  • Find set-up guides
  • Buy online
  • Contact sales
  • Get Yubico updates
  • Careers
  • Events
  • Press room
  • About us
  • Partner programs
  • Affiliate program
  • YubiKey 5 Series
  • YubiKey 5 FIPS Series
  • YubiKey Bio Series
  • Security Key Series
  • YubiKey 5 CSPN Series
  • YubiHSM 2 & YubiHSM 2 FIPS
  • Yubico Authenticator
  • Zero Trust
  • Phishing-resistant MFA
  • Passwordless
  • Cyber insurance
  • More solutions
  • Industries overview
  • Yubico blog
  • Resource library
  • Cybersecurity glossary
  • Authentication standards
  • Developer program
  • Works with YubiKey
  • Help center
  • Downloads
  • Product documentation
  • Support Services
  • Professional Services
  • Contact support
Yubico © 2023 All Rights Reserved.
  • Sitemap
  • Cookies
  • Legal
  • Privacy
  • Patents
  • Terms of use
  • Trust