Cloud Infographic: Personal Data Security

Cloud Infographic: Personal Data Security

Recently, Dashlane released a report that analyzed the password policies of the top 100 e-commerce sites.

The results of this report are staggering. They demonstrate that the majority of the top e-commerce sites fail to comply with the recommended password security principles. In their infographic titled “The Illusion of Personal Data Security in E-commerce”, they provide groundbreaking information to support their stance.

The main findings of their report state that 55% of the top 100 e-commerce sites still accept weak passwords such as “123456” and “password”. Furthermore, 93% of the sites do not offer on-screen password assessments that would tell users the real-time strength level of their passwords. Half of the companies do not block entry after the users provide 10 consecutive incorrect login attempts. As a result, this opens the way for automated password cracking. Lastly, the report states that only 38% of the top e-commerce sites require passwords with at least 1 letter and 1 number.

To summarize the findings of the report, 64% of the top e-commerce sites have highly questionable passwords policies.

personal-data-infographic

Infographic Source: Dashline

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

4 Responses to Cloud Infographic: Personal Data Security

  1. One of the most common causes of data getting in the wrong hands is the loss of mobile devices that often contain a frightening amount of private information. I want to share a protection option that worked for me. Tracer tags let someone who finds your lost stuff contact you directly without exposing your private information.  I use them on almost everything I take when I travel after one of the tags was responsible for getting my lost laptop returned to me in Rome one time. You can get them at mystufflostandfound.com

  2. All too often it is perceived that information security is someone else’s problem, evidenced above by pointing out flaws in password policy. While the point is valid, it is time for us to also encourage individual responsibility. That means we need to stop talking “security” (which is an amorphous concept to many) and focus on the selfish interests of the user … privacy. –Paul Calento

  3. Great article, it’s sad most websites don’t require best practices. 
    Guess it’s up to us to decide whats secure and hope for the best, I’ve been using roboform to throw together complex passwords myself and not really regretting it, had I had a password breach of some sort 3 years back everything probably would’ve been compromised.

  4. Well this is a little frightening, this is also exactly why I use RoboForm (similar to dashlane but has been around much longer) to generate unique passwords for all of the website I visit, it’s almost impossible to know what sites can be trusted.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Contributors

Cloud Infographic – Wearable Tech And Preventative Healthcare

Cloud Infographic – Wearable Tech And Preventative Healthcare

Wearable Tech And Preventative Healthcare There are so many exciting new opportunities available to utilize wearable technology in the future.  Areas such as nanotechnology disease monitoring, crowdfunding to wearable accessories are some excellent examples of the potential. Estimates vary, but appear to suggest that the market will produce between $14-50 Billion over the next few years. Included below

Ten Tips For Successful Business Intelligence Implementation

Ten Tips For Successful Business Intelligence Implementation

Ten Tips for Successful Business Intelligence Implementation The cost of Business Intelligence (BI) software goes far beyond the purchase price. Time spent researching, implementing, and maintaining your BI investment can snowball quickly and mistakes are often expensive. Your time is valuable – save it by learning from other businesses’ experiences. We’ve compiled the top ten

Knots And Cloud Service Providers

Knots And Cloud Service Providers

How Do These Two Compare? In Boy Scouts, I learned how to tie knots. The quickest knot you can tie is the slipknot. It’s very effective for connecting one thing to another via the rope you have. It was used in setting up tents, mooring boats to docks temporarily and lifting your food up into

Big Data

To Have and Have Not: Big Data Initiatives In Developing Countries

To Have and Have Not: Big Data Initiatives In Developing Countries

Big Data Initiatives In Developing Countries The poor of the developing countries are becoming increasingly connected, to the point where they too are part of the Big Data revolution that’s happening across the globe. It didn’t come with laptops, though, as some supposed it would. Whereas it costs a fortune to connect broadband to a

Big Data In Your Garden: Initiatives For Better Understanding Nature

Big Data In Your Garden: Initiatives For Better Understanding Nature

Big Data in Your Garden Big Data and IoT initiatives are springing up all across the globe, making cities, protesters–and just about everything else–smarter. However, thus far there’s been little attention paid to the interactions between these bizarre technologies and living things other than humans. Biology, that is, human biology is one field where Big

Who Holds the Key to the City: Big Data and City Management

Who Holds the Key to the City: Big Data and City Management

Big Data and City Management Cities like New York, Madrid, and especially Rio de Janeiro are augmented with Big Data-powered initiatives that range from combating crime with predictive analytics (New York & Madrid) to providing real-time data for improved management. Although Big Data is no panacea and is mainly used in conjunction with a greater

Internet of Things

Gartner Research – Homes In 2022 Will Contain Hundreds Of Smart Objects

Gartner Research – Homes In 2022 Will Contain Hundreds Of Smart Objects

How the Internet of Things is Saving Lives Just hearing the phrase ‘internet of things’ is enough to strike fear into the hearts of many elderly people. As the world’s economy shifts increasingly towards online-only, the oldest people among us often feel left behind, confused that the ‘way things used to be done’ – the

Where’s the Capital of the Internet of Things?

Where’s the Capital of the Internet of Things?

Where’s the Capital? We all know the capitals of fashion are London, New York and Paris, while the capital of film is Hollywood (or Bollywood!) – but what’s the new capital of the internet? Specifically, the internet of things? The answer – according to new research by Ozy – might surprise you. It’s not Tokyo, Seoul,

Aggregated News

Popular News Sources

Security Startup – Illumio, Is Winning Big Contracts

Security Startup – Illumio, Is Winning Big Contracts

Security Startup – Illumio A hot new security startup called Illumio has launched today with a repertoire of highly coveted businesses as part of their client portfolio. Illumio today publicly unveiled its Adaptive Security Platform (ASP), the first-ever software platform that provides granular visibility and security for all data center and cloud computing environments. Global

Bits Blog: Coming of Age in Cloud Computing

Bits Blog: Coming of Age in Cloud Computing

Cloud computing has been criticized as undependable and tough to manage. A number of recent announcements suggest that some companies are trying to address the issue. Read the source article at NY Times About Latest Posts Follow Us!CloudTweaksEstablished in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of

Bitcasa Partners With Hutchison Telecommunications Hong Kong

Bitcasa Partners With Hutchison Telecommunications Hong Kong

Bitcasa Partners With Hutchison Telecommunications Hong Kong 3 Hong Kong, the mobile operation of Hutchison Telecommunications Hong Kong Holdings Limited today announced the launch of 3 Super Cloud, a multi-platform cloud storage service, powered by Bitcasa, the … Read the source article at Yahoo Finance About Latest Posts Follow Us!CloudTweaksEstablished in 2009, CloudTweaks.com is recognized as