Cloud Infographic: Personal Data Security

Cloud Infographic: Personal Data Security

Recently, Dashlane released a report that analyzed the password policies of the top 100 e-commerce sites.

The results of this report are staggering. They demonstrate that the majority of the top e-commerce sites fail to comply with the recommended password security principles. In their infographic titled “The Illusion of Personal Data Security in E-commerce”, they provide groundbreaking information to support their stance.

The main findings of their report state that 55% of the top 100 e-commerce sites still accept weak passwords such as “123456” and “password”. Furthermore, 93% of the sites do not offer on-screen password assessments that would tell users the real-time strength level of their passwords. Half of the companies do not block entry after the users provide 10 consecutive incorrect login attempts. As a result, this opens the way for automated password cracking. Lastly, the report states that only 38% of the top e-commerce sites require passwords with at least 1 letter and 1 number.

To summarize the findings of the report, 64% of the top e-commerce sites have highly questionable passwords policies.

personal-data-infographic

Infographic Source: Dashline

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

4 Responses to Cloud Infographic: Personal Data Security

  1. One of the most common causes of data getting in the wrong hands is the loss of mobile devices that often contain a frightening amount of private information. I want to share a protection option that worked for me. Tracer tags let someone who finds your lost stuff contact you directly without exposing your private information.  I use them on almost everything I take when I travel after one of the tags was responsible for getting my lost laptop returned to me in Rome one time. You can get them at mystufflostandfound.com

  2. All too often it is perceived that information security is someone else’s problem, evidenced above by pointing out flaws in password policy. While the point is valid, it is time for us to also encourage individual responsibility. That means we need to stop talking “security” (which is an amorphous concept to many) and focus on the selfish interests of the user … privacy. –Paul Calento

  3. Great article, it’s sad most websites don’t require best practices. 
    Guess it’s up to us to decide whats secure and hope for the best, I’ve been using roboform to throw together complex passwords myself and not really regretting it, had I had a password breach of some sort 3 years back everything probably would’ve been compromised.

  4. Well this is a little frightening, this is also exactly why I use RoboForm (similar to dashlane but has been around much longer) to generate unique passwords for all of the website I visit, it’s almost impossible to know what sites can be trusted.

Comics

At CloudTweaks, we're plugged into the cloud, the internet of things and all that the web has to offer. From wearable technology, to mobile computing, cloud computing and big data, CloudTweaks is your source for updates and news on the most innovative technology.

Popular

Top Viral Impact

Cloud Infographic – Big Data Survey: What Are The Trends?

Cloud Infographic – Big Data Survey: What Are The Trends?

Jaspersoft Big Data Survey Shows Rise in Commitment to Projects and Decline in Confusion Nearly 1,600 Jaspersoft Community Members Participate in Second Jaspersoft Big Data Survey San Francisco, February 4, 2014 – Jaspersoft, the Intelligence Inside applications and business processes, today shared results from its Big Data Survey. Nearly 1,600 Jaspersoft community members responded to…

Cloud Infographic – Cyber Security And The New Frontier

Cloud Infographic – Cyber Security And The New Frontier

Cyber Security: The New Frontier The security environment of the 21st century is constantly evolving, and it’s difficult to predict where the next threats and dangers will come from. But one thing is clear: the ever-expanding frontier of digital space will continue to present firms and governments with security challenges. From politically-motivated Denial-of-Service attacks to…

BYOD Will Continue To Define Workplaces In 2014

BYOD Will Continue To Define Workplaces In 2014

BYOD Will Continue To Define Workplaces In 2014 The bring-your-own-device trend has been the subject of scrutiny ever since its initial formation. Given how quickly personal smartphones and tablets became a fixture in everyday life, it makes perfect sense that these mobile machines would slip into workplaces. While BYOD has caused headaches for many businesses,…

Cloud Infographic: Most Used Cloud Apps

Cloud Infographic: Most Used Cloud Apps

Cloud app and analytics company, Netskope released its quarterly Cloud Report. The new report reveals that enterprise employees are using an average of 397 different cloud apps (most of which are unsanctioned), when IT estimated they have 40-50 — that’s a tenfold underestimation. Below is an infographic provided courtesy of the group at Netskope which goes into further detail.…

Featured Sponsors

Moving From Email Into The Cloud

Moving From Email Into The Cloud

Mobile Collaboration In The Cloud Imagine that you, as a manager, are told by the powers that be that you have to find “efficiencies” within your department that will result in one million dollars of savings annually. You struggle with this. You send an email to everyone on your senior team. “Where can we save…

Watching You Shop: Stores And Mannequins “Read” Their Customers And Respond

Watching You Shop: Stores And Mannequins “Read” Their Customers And Respond

Watching You Shop The mannequin in the store window stares blankly ahead as shoppers look at the clothes it is dressed in and contemplate a purchase. One shopper makes some comments. “It’s nice. I wonder if they have my size.” Another takes a few steps inside the store to see where these particular clothes might…

Sponsors

Built For The Cloud vs. Adapting To The Cloud

Built For The Cloud vs. Adapting To The Cloud

Built For The Cloud vs. Adapting To The Cloud It may just sound like semantics, but there is a real difference between something that was “built for” versus “adapted to.” Would you rather buy a house that was “designed for” energy efficiency or one that was “adapted to” be energy efficient? “Built for” describes a…

Placement Opportunities - Find Out!

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

You can help continue to support our community by social sharing, sponsoring, partnering or contributing to this great educational resource.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter