Feeds

One in 10 Brits leaves web passwords in their will

You will inherit your parents' iTunes accounts

Combat fraud and increase customer satisfaction

Your gran could pass on her iTunes password along with the family silver as a survey suggests that 11 per cent of Brits have either put internet passwords into their wills or plan to do so.

The main reason for passing on the keys to internet accounts was the valuable content amassed in the cloud – with 25 per cent of the 2,000 adults questioned saying that they had collected films, music and software worth at least £200.

The other reason given was that stuff of sentimental value such as family snaps were stored online and that people wanted to pass these on too, as a "digital inheritance".

The research from the Goldsmiths University Creative and Social Technology centre – commissioned by cloud computing company Rackspace – found that 53 per cent of those polled held "treasured possessions" in such services. A quarter said they had "special photos" stored online, one in 10 said they had treasured videos there and the same number kept sentimental emails from loved ones.

On a more practical note, the estate of a deceased person may become liable for online subscription – so giving passwords to executors makes practical sense.

Just make sure you update your will every time you update your password... Read their white paper here: Generation Cloud [PDF] ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.