Log In


Problems logging in?

Contact us

Welcome to the redesigned Risk Management Plus+ Online, a robust website brought to you by Travelers designed to help you mitigate your management liability and crime exposures. The new Risk Management Plus+ Online includes articles, checklists, best practice minute videos, podcasts, and a sample employee handbook to help you manage not only your employment practices risks, but also cyber, crime, directors & officers, fiduciary, kidnap & ransom, and identity fraud exposures. The site has been redesigned to provide this content in a streamlined and efficient manner.

print   email   Share

Is Cybersecurity Fatigue The Cause Of So Many Hacks?

During the past eight years, hackers have stolen the personal information of 7.1 billion online identities.

Think about it: 7.1 billon identities are stolen, although there are approximately 7.5 billion people living on this planet.

A recent survey of hackers found that weak passwords were what hackers exploit.

Is "password fatigue" to blame? Remembering and changing passwords regularly is one of the main sources of cybersecurity fatigue for users, meaning that many users do not follow password best practices because they find it too difficult. Because users have so many online accounts, many use the same password repeatedly for convenience. However, that leaves users vulnerable to hackers and identity thieves. Romita Majumdar "Poor password hygiene makes you a soft target for hackers," www.business-standard.com (Aug. 27, 2017). 


Your organization’s information will be vulnerable unless you require the use of strong passwords (different for every site employees use), multi-factor authentication, and encryption.

Employers should require strong, unique passwords for all computers and devices. Passwords for sensitive accounts must be at least 8-10 characters long, and contain a mix of capital letters, numbers, and special characters. The longer the password, the more security it provides.

Password manager applications can help. With a password manager, employees can pick one password to remember to enter the password manager application, which stores all other usernames and passwords. Password manager apps will also generate lengthy, complex passwords that cannot be easily hacked.

Finally, employers should also consider a policy that requires use of strong passwords, multi-factor authentication and encryption. During cybersecurity training sessions, educate employees on the reason for your policy and on the dangers of giving in to cybersecurity protection fatigue.

Finally, your opinion is important to us. Please complete the opinion survey:

Twitter Feed