Survey Reveals Workers Misuse Former Employers' Passwords

Survey Reveals Workers Misuse Former Employers' Passwords
Lax security enables former employees to log in to old accounts
PasswordManager.com has conducted a revealing survey highlighting how workers are mishandling workplace passwords. The survey involved 1,200 currently employed U.S. adults and provided striking insights about digital security and the concerning behavior of many individuals who find ways to access their previous employers' accounts.
The findings indicate that 40 percent of respondents admit to using login credentials from jobs they previously held. Of these, 15 percent acknowledge they continue to access these accounts actively. The majority of respondents cited a common motive: saving money. Among those accessing their former employers' accounts, 53 percent confess it's to avoid paying for tools or services, with some reporting savings that exceed $300 monthly.
Security oversights on the part of employers appear to contribute significantly to this issue. According to the survey, three out of five participants were able to log into accounts because their former employer had not changed the password. Others found access through coworkers still tied to the company (28%), or they simply managed to guess the password (20%).
Credential sharing isn't exclusive to previous positions, either. The survey revealed that 27 percent of current employees share their employer's passwords with outsiders. Nearly half of these individuals admit they do this because the external party assists with their job functions, while a third share access to help someone save costs.
Leading cybersecurity expert Gunnar Kallstrom emphasizes the urgency of addressing credential sharing by stating, "To effectively mitigate this issue, companies should enforce employees to sign an Acceptable Use Policy and participate in regular security training sessions. Implementing Role-Based Access Controls, multi-factor authentication, and thorough offboarding processes are also essential steps to enhance security."
Interestingly, despite the risks associated, many former employees have reported never being caught while utilizing these old credentials. Alarmingly, 1 in 10 admit to continuing this behavior for over four years. In some cases, former employers even reach out to ex-employees for assistance, with 17 percent stating they had been contacted due to a company forgetting a password.
The survey, commissioned by PasswordManager.com, was executed online through Pollfish in July 2025. It employed random device engagement methodologies to gather responses from a diverse group of full-time U.S. workers, providing vital insights into the trends of password security.
ABOUT PASSWORDMANAGER.COM
PasswordManager.com stands as a core leader in the field of password security and internet safety. The platform provides consumers with free resources to safeguard their online accounts and personal information rigorously. Helmed by a skilled team of experts, researchers, and analysts, the company is dedicated to enhancing the internet safety of its users and educating them on effective password management. To explore further, visit PasswordManager.com.
Frequently Asked Questions
What did the survey reveal about password misuse?
The survey uncovered that a significant portion of workers admit to using passwords from previous jobs for personal benefits.
How many workers are actively accessing former employer's accounts?
Approximately 15 percent of workers acknowledged that they are currently using the login credentials of their prior employers.
What are the primary reasons for accessing former employers' accounts?
Many respondents cited saving money as the primary motivation, with some avoiding costs upwards of $300.
What security gaps contribute to this issue?
Security oversights such as unchanged passwords and accessible credentials through still-employed coworkers enable this behavior.
What actions should companies take to improve security?
Implementing an Acceptable Use Policy, Role-Based Access Controls, and regular security training can help mitigate these risks.
About The Author
Contact Dylan Bailey privately here. Or send an email with ATTN: Dylan Bailey as the subject to contact@investorshangout.com.
About Investors Hangout
Investors Hangout is a leading online stock forum for financial discussion and learning, offering a wide range of free tools and resources. It draws in traders of all levels, who exchange market knowledge, investigate trading tactics, and keep an eye on industry developments in real time. Featuring financial articles, stock message boards, quotes, charts, company profiles, and live news updates. Through cooperative learning and a wealth of informational resources, it helps users from novices creating their first portfolios to experts honing their techniques. Join Investors Hangout today: https://investorshangout.com/
The content of this article is based on factual, publicly available information and does not represent legal, financial, or investment advice. Investors Hangout does not offer financial advice, and the author is not a licensed financial advisor. Consult a qualified advisor before making any financial or investment decisions based on this article. This article should not be considered advice to purchase, sell, or hold any securities or other investments. If any of the material provided here is inaccurate, please contact us for corrections.