{"id":7205,"date":"2025-02-07T12:32:08","date_gmt":"2025-02-07T12:32:08","guid":{"rendered":"https:\/\/www.securitytoday.de\/2026\/04\/02\/post_id-3374\/"},"modified":"2026-04-10T08:21:45","modified_gmt":"2026-04-10T08:21:45","slug":"one-in-four-deliberately-uses-simple-passwords","status":"publish","type":"post","link":"https:\/\/www.securitytoday.de\/en\/2025\/02\/07\/one-in-four-deliberately-uses-simple-passwords\/","title":{"rendered":"One in Four Deliberately Uses Simple Passwords"},"content":{"rendered":"<p style=\"color:#69d8ed;font-size:0.9em;margin:0 0 16px;padding:0;\">3 min Reading Time<\/p>\n<p><strong>On &#8220;Change Your Password Day&#8221; on February 1, 2025, the Bitkom industry association published figures on how Germans handle their passwords. The results are sobering.<\/strong><\/p>\n<h2>TL;DR<\/h2>\n<ul>\n<li><strong>23 percent<\/strong> of Germans deliberately choose simple passwords to remember them more easily.<\/li>\n<li><strong>33 percent<\/strong> use the same password for different services.<\/li>\n<li><strong>Passkeys as an alternative:<\/strong> Biometric identification with a cryptographic key pair replaces insecure passwords.<\/li>\n<li><strong>2FA is mandatory:<\/strong> Especially for bank accounts and corporate data, it is indispensable.<\/li>\n<li><strong>Password managers recommended:<\/strong> Only one master password is needed; the rest is securely generated and stored.<\/li>\n<\/ul>\n<p>Behavioral research suggests that people can remember things more easily if they act them out or dance them out. With numbers, letters, and special characters for passwords, one would have to exert oneself quite a bit for that.<\/p>\n<p>Many prefer their beloved sticky notes or memorable combinations of letters and numbers like &#8220;password&#8221; or &#8220;123456,&#8221; the name or birthday of a child or other family members. If at least one number and a special character are required, they append these at the end or insert them in the middle.<\/p>\n<h2>&#8220;123456&#8221; or &#8220;Password&#8221; a No-Go<\/h2>\n<p>The figures presented by Bitkom on &#8220;Change Your Password Day&#8221; on February 1, 2025, show that many people are still just as reckless in choosing their passwords and thereby open the door to cybercriminals. And not just in the private sphere, but even worse, in the business environment as well.<\/p>\n<p>Around a quarter (23 percent) of the 1,021 internet users aged 16 and above surveyed in Germany on behalf of Bitkom admitted to deliberately choosing simple passwords to remember them more easily. A third (33 percent) of those surveyed confessed to using the same password for different services.<\/p>\n<p>&#8220;Change Your Password Day on February 1 is a good opportunity to get an overview of your own passwords now and say goodbye to simple or reused ones and replace them,&#8221; emphasizes Bitkom security expert Felix Kuhlenkamp.<\/p>\n<p>He further states: &#8220;But those who choose good passwords and combine them with two-factor authentication wherever possible or use passkeys right away don&#8217;t need an annual reminder day to change their passwords. That&#8217;s only necessary if there are indications of data leaks.&#8221;<\/p>\n<h2>5 Tips for More Secure Online Access:<\/h2>\n<p><strong>Avoid simple passwords<\/strong> made from easily guessable personal terms and numbers like the name or birthday of a child or partner. Better is a combination of different words and syllables, preferably with uppercase and lowercase letters, numbers, and special characters  &#8211;  the longer, the more secure.<\/p>\n<p><strong>Do not reuse passwords<\/strong>, but use a unique one for each online service. This should apply especially to central online services like those of email providers and for other services where account details are stored. Combining the same password with different numbers and special characters is also not advisable.<\/p>\n<p><strong>Do not use sticky notes or simple text files<\/strong> to write down passwords because they are easily found and visible. It is better to use password managers, which are also available as apps for smartphones. Then you only need to remember the master password or can open the respective password with a fingerprint or iris scan.<\/p>\n<p><strong>Two-factor or even multi-factor authentication<\/strong> is particularly advisable under the motto &#8220;two is better than one&#8221; when it comes to accessing bank accounts or corporate data. Because even the strongest passwords can be cracked. Some services offer a combination of password and fingerprint via the smartphone, providing double security.<\/p>\n<p><strong>Passkeys are considered a particularly secure alternative to passwords<\/strong>, where identification and release occur purely via fingerprint, facial recognition, or a generated PIN similar to a TAN generator for online banking. Instead of a more or less easily memorable password, two very long, cryptic keys are issued during registration. One remains as a &#8220;private key&#8221; on the device and never goes outside, so it cannot be &#8220;intercepted.&#8221; The other part, the &#8220;public key,&#8221; goes to the provider and is stored there. Together with the biometric or PIN-generated identification, this makes passkeys particularly secure.<\/p>\n<h2>Key Facts at a Glance<\/h2>\n<p><strong>Deliberately simple passwords:<\/strong> 23 percent of respondents<\/p>\n<p><strong>Password reuse:<\/strong> 33 percent use the same password multiple times<\/p>\n<p><strong>Immediate updaters:<\/strong> Only 30 percent install updates immediately<\/p>\n<p><strong>Sample size:<\/strong> 1,021 internet users aged 16 and above (Bitkom, February 2025)<\/p>\n<p><strong>Safest alternative:<\/strong> Passkeys with biometric identification<\/p>\n<p><strong>Fact:<\/strong> According to a Bitkom study, 29 percent of Germans use the same password for multiple online services.<\/p>\n<p><strong>Fact:<\/strong> The Verizon DBIR 2024 shows that 81 percent of all hacking-related data breaches are due to weak or stolen passwords.<\/p>\n<h2>Frequently Asked Questions<\/h2>\n<h3>Why are simple passwords so dangerous?<\/h3>\n<p>Simple passwords like &#8220;123456&#8221; or birthdates can be cracked by brute-force tools in seconds. Cybercriminals use automated tools that test millions of combinations per second. The shorter and more predictable a password, the faster it is compromised.<\/p>\n<h3>What makes a secure password?<\/h3>\n<p>A secure password combines uppercase and lowercase letters, numbers, and special characters with a minimum length of 12 characters. Ideally, it consists of several unrelated words or syllables. Crucial: Use a unique password for each service.<\/p>\n<h3>What are passkeys and why are they considered more secure?<\/h3>\n<p>Passkeys replace passwords with a cryptographic key pair. The private key remains on the device and is never transmitted. Identification occurs via fingerprint, facial recognition, or PIN. Since no password exists that can be stolen, passkeys are immune to phishing.<\/p>\n<h3>Is a password manager worth it?<\/h3>\n<p>Yes. Password managers generate and store secure, unique passwords for each service. The user only needs to remember one master password. Good managers also offer warnings about data breaches, automatic filling, and synchronization across devices.<\/p>\n<h3>What is two-factor authentication (2FA)?<\/h3>\n<p>2FA supplements the password with a second factor  &#8211;  such as a code via SMS, authenticator app, or biometric verification. Even if a password is stolen, attackers cannot access the account without the second factor. Especially indispensable for banking and corporate data.<\/p>\n<h2>Further Reading in the Network<\/h2>\n<p>What Germans spend on IT security: 5.10 \u20ac  &#8211;  no more for IT security (Security Today)<\/p>\n<p>Cloud identity management and access security: <a href=\"https:\/\/www.cloudmagazin.com\/en\/2026\/02\/28\/cloud-trends-2026-was-it-entscheider-jetzt-auf-dem-radar-haben-muessen\/\" target=\"_blank\" rel=\"noopener\">cloudmagazin.com<\/a><\/p>\n<p>Digital security as a business factor: <a href=\"https:\/\/mybusinessfuture.com\/en\/ki-made-in-germany-935-startups-oekosystem\/\" target=\"_blank\" rel=\"noopener\">mybusinessfuture.com<\/a><\/p>\n<h2>Related Articles<\/h2>\n<ul>\n<\/ul>\n<h2>More from the MBF Media Network<\/h2>\n<p><a href=\"https:\/\/www.cloudmagazin.com\" target=\"_blank\">cloudmagazin<\/a> | <a href=\"https:\/\/mybusinessfuture.com\" target=\"_blank\">MyBusinessFuture<\/a> | <a href=\"https:\/\/www.digital-chiefs.de\" target=\"_blank\">Digital Chiefs<\/a><\/p>\n<p style=\"text-align: right;\"><em>Header Image Source: Unsplash \/ Towfiqu Barbhuiya<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"3 min Reading Time On &#8220;Change Your Password Day&#8221; on February 1, 2025, the Bitkom industry association published figures on how Germans handle their passwords. The results are sobering. TL;DR 23 percent of Germans deliberately choose simple passwords to remember them more easily. 33 percent use the same password for different services. Passkeys as an [&hellip;]","protected":false},"author":55,"featured_media":3378,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"simple passwords","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"One in four uses weak passwords\u2014discover why strong passwords matter and how to protect your data. Learn more and secure your accounts today!","_yoast_wpseo_meta-robots-noindex":"","_yoast_wpseo_meta-robots-nofollow":"","_yoast_wpseo_meta-robots-adv":"","_yoast_wpseo_canonical":"","_yoast_wpseo_opengraph-title":"","_yoast_wpseo_opengraph-description":"","_yoast_wpseo_opengraph-image":"","_yoast_wpseo_opengraph-image-id":"","_yoast_wpseo_twitter-title":"","_yoast_wpseo_twitter-description":"","_yoast_wpseo_twitter-image":"","_yoast_wpseo_twitter-image-id":"","footnotes":""},"categories":[251],"tags":[],"class_list":["post-7205","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"wpml_language":"en","wpml_translation_of":3374,"_links":{"self":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts\/7205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/users\/55"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/comments?post=7205"}],"version-history":[{"count":3,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts\/7205\/revisions"}],"predecessor-version":[{"id":9999,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/posts\/7205\/revisions\/9999"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/media\/3378"}],"wp:attachment":[{"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/media?parent=7205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/categories?post=7205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securitytoday.de\/en\/wp-json\/wp\/v2\/tags?post=7205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}