{"id":44539,"date":"2021-12-22T21:26:44","date_gmt":"2021-12-22T21:26:44","guid":{"rendered":"https:\/\/www.darkreading.com\/risk\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse"},"modified":"2021-12-22T21:26:44","modified_gmt":"2021-12-22T21:26:44","slug":"nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\/","title":{"rendered":"Nearly 50% of People Will Abandon Sites Prohibiting Password Reuse"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt15ac5bd774737695\/61c378ce461bc127f013464d\/BeyondIdentitySurveyCharts.jpeg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Nearly half&nbsp;(48%) of users say it&#8217;s &#8220;very likely&#8221; they would abandon a website when told a new password cannot be the same as their old password, according to research on consumer password resets. Another 21% say it&#8217;s &#8220;somewhat&#8221; likely they would abandon the site.<\/p>\n<p>The Beyond Identity <a href=\"https:\/\/www.beyondidentity.com\/blog\/password-resets-and-the-consumer-journey\" target=\"_blank\" rel=\"noopener\">study<\/a>, based on more than 1,000 responses, also found one in four online shoppers were willing to abandon a cart of $100+ if they had to reset their password to check out. On average, researchers found an online cart totaling $162 was the highest amount respondents would be willing to abandon when experiencing password difficulties while shopping.<\/p>\n<p>In other key findings, nearly 50%&nbsp;of respondents reported having to reset their bill-paying account password at least once a year because of login issues. Baby boomers were the generation&nbsp;most likely to use old passwords when resetting account credentials.<\/p>\n<p>&#8220;Consumers have a lot of friction with passwords,&#8221; says Jing Gu, senior product marketing manager at Beyond Identity. &#8220;In many instances, consumers are not able to complete the interaction with a product, whether it&#8217;s transferring money, paying bills, purchasing from gaming sites, or accessing info while traveling. The password is a revenue problem. When customers drop off, you can lose them forever.&#8221;<\/p>\n<p>The study&#8217;s results correlate&nbsp;with some highly regarded industry research from the past few years, Gu adds. Gartner has <a href=\"https:\/\/www.onelogin.com\/blog\/is-password-reset-the-pebble-in-your-businesses-shoe\" target=\"_blank\" rel=\"noopener\">reported<\/a> that between 20% and 50% of all help desk calls are for password resets. Forrester Research found the average help desk labor cost for a single password reset is about $70.<strong><\/strong><strong><br \/><\/strong><\/p>\n<p><strong>A Passwordless Future?<br \/><\/strong>Beyond Identity&#8217;s research inevitably leads to a discussion about passwordless authentication, a technology that prompts a range of responses from security practitioners. <\/p>\n<p>This fall, the company released a new product for business-to-consumer websites that gives site visitors the option to set up passwordless authentication for themselves. It is currently being piloted by businesses across financial technology, travel, and software. <\/p>\n<p>How it works: The tool lets visitors opt in to passwordless authentication by signing up with their username (typically an email address). They are then sent a link; when they click, a public-private key pairing is made and an X.509 certificate gets issued. From then on, when the visitor accesses the site, they can enter their email address and are fully logged on. <\/p>\n<p>&#8220;The burden of authentication is taken off the user,&#8221; Gu says. <\/p>\n<p>Sounds too good to be true, right? Security analysts and researchers are mixed on the new tech. Some are all-in; others aren&#8217;t so sure. <\/p>\n<p>Frank Dickson, program vice president for security and trust at IDC, is on the more cautious side, though he says the industry has been moving closer to the reduction of passwords. <\/p>\n<p>&#8220;The reality is that consumers are making vendor selection choices based on the friction presented,&#8221; Dickson says. &#8220;Companies are weighing technology investment decisions against fraud expenses and lost customer opportunity. Customer e-commerce experiences are becoming a differentiator, clearly. More elegant consumer authentications are not a question of &#8216;if&#8217; but &#8216;when.&#8217; The &#8216;when&#8217; will be a story of evolution rather than revolution.&#8221; <\/p>\n<p>Jack Poller, a senior analyst with Enterprise Strategy Group, believes more passwordless applications will emerge in 2022, and points out that Microsoft has been driving passwordless authentication by setting it as a default in Windows 11. As more Windows 11 machines emerge, especially around the holidays, this default setting will help more users better understand the new authentication method. <\/p>\n<p>&#8220;And then consumers will demand passwordless for their most treasured and important online accounts \u2013 banking and shopping,&#8221; Poller says. &#8220;Next, they&#8217;ll want that same convenience and security for their work accounts.&#8221; <\/p>\n<p>Some security researchers were a bit more skeptical. <\/p>\n<p>John Bambenek, principal threat hunter at Netenrich, says passwordless authentication holds promise, but in practice, it simply becomes &#8220;authenticationless.&#8221; <\/p>\n<p>&#8220;What helps account takeovers is true multifactor authentication and the use of password managers, which can help minimize password resets or enable the ability to detect account takeover,&#8221; Bambenek says. &#8220;While e-commerce sites want to maximize the flow of orders, that priority can\u2019t lead to a security race-to-the-bottom.&#8221; <\/p>\n<p>Tyler Shields, CMO at JupiterOne, says enterprises need to drive toward creating easy-to-use security experiences that deliver an adequate level of security to the technologies modern consumers demand. A great example of this is the move to single sign-on and passwordless authentication. <\/p>\n<p>&#8220;Users have failed to maintain proper passwords for decades,&#8221; Shields says. &#8220;That will never change. So, innovation must build an easy-to-use alternative that provides proper security with a better user experience. Enterprises must find the right balance of technology innovation alongside security for traditional models.&#8221; <\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/risk\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new study investigating consumer password use found 25% of online shoppers would abandon their carts of $100 if prompted to reset a password at checkout.Read More <a href=\"https:\/\/www.darkreading.com\/risk\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-44539","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Nearly 50% of People Will Abandon Sites Prohibiting Password Reuse 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nearly 50% of People Will Abandon Sites Prohibiting Password Reuse 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-22T21:26:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt15ac5bd774737695\/61c378ce461bc127f013464d\/BeyondIdentitySurveyCharts.jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Nearly 50% of People Will Abandon Sites Prohibiting Password Reuse\",\"datePublished\":\"2021-12-22T21:26:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\\\/\"},\"wordCount\":774,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt15ac5bd774737695\\\/61c378ce461bc127f013464d\\\/BeyondIdentitySurveyCharts.jpeg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\\\/\",\"name\":\"Nearly 50% of People Will Abandon Sites Prohibiting Password Reuse 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt15ac5bd774737695\\\/61c378ce461bc127f013464d\\\/BeyondIdentitySurveyCharts.jpeg\",\"datePublished\":\"2021-12-22T21:26:44+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt15ac5bd774737695\\\/61c378ce461bc127f013464d\\\/BeyondIdentitySurveyCharts.jpeg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt15ac5bd774737695\\\/61c378ce461bc127f013464d\\\/BeyondIdentitySurveyCharts.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nearly 50% of People Will Abandon Sites Prohibiting Password Reuse\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nearly 50% of People Will Abandon Sites Prohibiting Password Reuse 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\/","og_locale":"en_US","og_type":"article","og_title":"Nearly 50% of People Will Abandon Sites Prohibiting Password Reuse 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-12-22T21:26:44+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt15ac5bd774737695\/61c378ce461bc127f013464d\/BeyondIdentitySurveyCharts.jpeg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Nearly 50% of People Will Abandon Sites Prohibiting Password Reuse","datePublished":"2021-12-22T21:26:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\/"},"wordCount":774,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt15ac5bd774737695\/61c378ce461bc127f013464d\/BeyondIdentitySurveyCharts.jpeg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\/","url":"https:\/\/www.threatshub.org\/blog\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\/","name":"Nearly 50% of People Will Abandon Sites Prohibiting Password Reuse 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt15ac5bd774737695\/61c378ce461bc127f013464d\/BeyondIdentitySurveyCharts.jpeg","datePublished":"2021-12-22T21:26:44+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt15ac5bd774737695\/61c378ce461bc127f013464d\/BeyondIdentitySurveyCharts.jpeg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt15ac5bd774737695\/61c378ce461bc127f013464d\/BeyondIdentitySurveyCharts.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/nearly-50-of-people-will-abandon-sites-prohibiting-password-reuse\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Nearly 50% of People Will Abandon Sites Prohibiting Password Reuse"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44539","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44539"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44539\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44539"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44539"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}