SHARE
Facebook X Pinterest WhatsApp

Social Media Blamed for Rise in Stolen Passwords

Mar 13, 2017

Social Media Blamed for Rise in Stolen Passwords

Social Media Blamed for Rise in Stolen PasswordsSocial Media Blamed for Rise in Stolen Passwords

A study says the huge growth in passwords and users’ unawareness of shared data between social media platforms will lead to more password thefts and breaches.

Passwords Per User Will IncreasePasswords Per User Will Increase

By 2020, users are expected to have an average of 25 passwords. With 3.5 billion people online, that brings the number of passwords for humans to 87.5 billion by 2020.

Social Media Accounts Increase RiskSocial Media Accounts Increase Risk

There are 1.7 billion Facebook accounts, 500 million Instagram accounts, 450 million Linked In accounts, and 300 million G+ accounts. Social media platforms introduce significant risks because of social logins or application passwords, which allow a single login to be linked to these accounts.

Accounts Per User Logons AccelerateAccounts Per User Logons Accelerate

In 2016, the average number of accounts per user was 26 in the United States and 36 in United Kingdom. By 2020, the number of accounts is expected to rise to 90 per user in some regions.

Social Logins Reduce Fatigue, Increase ThreatsSocial Logins Reduce Fatigue, Increase Threats

Although social logins reduce the growing fatigue of having to remember many passwords, they increase the risk of cyber-security threats. Access to these logins should be revoked when no longer required.

Social Media and Continuous SharingSocial Media and Continuous Sharing

Social Media platforms often continuously share customer data without users’ knowledge. For example, using public WiFi and your social login when registering to a website creates a link to those accounts. A third-party provider has continuous access to your data until you revoke it.

Sharing Information Is RiskySharing Information Is Risky

Sharing information on social media can lead to identity theft, virtual kidnapping, or spear phishing against friends, colleagues or relatives. According to Verizon, it is now the third most common cause of data breaches—and it’s rising.

Fake Accounts on Social MediaFake Accounts on Social Media

It is easy to create fake accounts and impersonate others on social media. Furthermore, people co-opt other peoples’ photos and present them as their own.

Social Media Passwords Are WeakSocial Media Passwords Are Weak

Very few social media users use multifactor authentication when logging in, and 60% use weak or reused passwords. Result: A breach at one site can easily lead to accounts at other sites being taken over.

Machine Passwords Are VulnerableMachine Passwords Are Vulnerable

Hackers compromise machine user accounts and leapfrog across the IT infrastructure to take over privileged accounts. 60% to 80% of these are managed by using common passwords across multiple systems.

Damages Will GrowDamages Will Grow

Based on the accelerating frequency and growing costs of security breaches, damages worldwide are expected to grow from $3 billion in 2015 to $6 trillion by 2021.

Recommended for you...

Storage Vulnerabilities: The Neglected Cybersecurity Frontier
Drew Robb
Sep 7, 2022
NGFW vs UTM: Differences & Use Cases
Don Hall
Aug 12, 2022
Top Next-Generation Firewall (NGFW) Software
Jenna Phipps
Jul 19, 2022
Perimeter 81 vs NordLayer: Network Security Comparison
Devin Partida
Jun 24, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.