One of the most common cybersecurity measures we’ve all dealt with is security questions. You’ve probably been asked to give your first pet’s name or the city you were born in to reset a long-forgotten password, but is this actually a secure way of verifying your identity? Much of this information is easy for you to forget but easy for others to find, making it a poor defense for your most valuable online accounts, personal data, and sensitive information.
Security questions are meant to help reset passwords, reopen locked accounts, and ultimately protect your digital spaces from attacks or breaches, but such safeguarding is widely considered flawed and unreliable(new window).
A massive Yahoo data breach(new window) highlighted the perils of relying on security questions to protect your accounts. The breach exposed the personal data of half a billion users, including their names, email addresses, phone numbers, and the security questions and answers they used for account recovery.
This article will explore why security questions are actually terrible for your security and what measures you can take to better protect your most sensitive private data.
What are security questions?
When you’re locked out of an account, it’s common to face security questions to regain access or reset passwords. This gatekeeper layer of security is used across many platforms, from email and social media to banking and shopping websites.
Answers to security questions are supposed to be information only you and a select few people know — in theory, the more obscure the answer, the better the security. However, the recommended security questions on the website you’re using might not be ideal.
Some common security question examples include:
- What is your mother’s maiden name?
- What was the name of your first childhood pet?
- What is the name of your high school?
- What is the name of the street you lived on as a child?
While all of the security answers are personal to you, they’re also not impossible for bad actors to find out. For years, experts have been questioning the effectiveness(new window) of this security layer. Too many vulnerabilities are created by requiring people to remember information that can be forgotten, changed, or discovered by potential attackers digging around on the internet.
Why security questions are a terrible idea
There are several reasons why leaning on security questions to protect you is a bad idea. It comes down to a pair of unfortunate realities: Potential attackers are more clever than you might think, and there’s more personal information online than you realize.
Here’s why security questions are the weakest link of security measures:
- Predictable: Popular security questions like “What is your favorite color?” can be too generic and easily predictable. When the pool of possible answers is small, it’s much easier for a potential attacker to guess.
- Discoverable: In an age where people manage multiple social media accounts across several platforms, attackers can often find answers to security questions with a little digging into your public-facing profiles. They can build a profile of you based on your posts, exploiting publicly available information to bypass security measures and gain access to your account.
- Forgettable: Favorites and life details change over time, often making it difficult for you to recall information at the moment you need to. This greatly diminishes the reliability of security questions as a security tool.
If a website requires you to create a security question, it’s still possible to create good security questions for yourself. Instead of focusing on traditional questions like those mentioned above, choose more obscure questions to which the answers can’t be found online. Some good security questions could include:
- What is your eldest cousin’s middle name?
- What was the make and model of your first car?
- What was the name of your favorite teacher in high school?
As long as you’re not oversharing online, this information should be nearly impossible for a hacker to find. But that’s not to say that they can’t still crack the answers, because this mechanism simply isn’t secure: Even Google released a study(new window) contending that security questions are one of the worst ways to protect your online privacy(new window).
“40% of English-speaking US users have failed to recall their answers to security questions, according to Google,” reported Time(new window). “When the questions are very difficult, such as asking for a person’s frequent flier number, the recall rate drops to 9%.”
Beware of oversharing on social media
By exploring your social media accounts, hackers can often obtain the information you use to reset passwords, particularly the answers to security questions. Data brokers can also collect this information to create an online profile of you to sell to advertisers. Make sure to limit or avoid sharing the following information:
- Family names
- Date of birth
- Location of birth
- What school you attended
- Pet names
- Any address, current or former
- Details of your routine or locations you regularly visit
What’s at stake? Your data and privacy
If the answers to your security questions are ever compromised, it can lead to widespread privacy violations.
- Identity theft: With access to something like your bank account, it wouldn’t take much work for an attacker to impersonate you, open new accounts, or commit fraud with your stolen identity.
- Compromised accounts: If the answers to your security questions are exposed in a data breach, any account tied to the answers of those questions can be in danger, as it’s common for people to recycle the same ones over multiple accounts.
What are better alternative security measures?
f you have to create a security question and there’s no alternative, we’d recommend generating a secure password and saving it as a note in your password manager instead. This means you don’t have to remember the answer and can instead store it safely until you need it.
If you’re able to, consider using more effective — and reliable — authentication methods.
Two-factor authentication (2FA), also known as two-step verification, requires two forms of identification when you log in to an account. After you input a username and password, 2FA may have you enter a unique code generated by a mobile authenticator app, plug in a security key, or type in a code sent to your phone.
Here are three forms of 2FA:
- Security key: Security keys, also known as hardware keys, help prove your identity when you’re logging in to an account, app, or device. This allows you to sign in to your account using a physical key, such as a YubiKey(new window), which resembles a thumb drive. If you choose to use a 2FA key with your Proton Account, for example, you must plug in your key every time you sign in.

- Time-based one-time passwords (TOTP): You can use an authenticator app on your smartphone to generate six-digit passwords that regenerate periodically to keep codes fresh and make unauthorized access to your accounts difficult for potential attackers. Some password managers, including Proton Pass, have built-in 2FA code generators.
- SMS messages: While convenient and user-friendly, text messages are considered the least secure of 2FA options. They’re vulnerable to SIM-swapping attacks, and SMS is unencrypted and not very secure, making it easier for hackers to intercept 2FA codes. If your account offers an alternative 2FA method, you should avoid SMS.
Best practices for online security
As cybersecurity threats become more sophisticated and common, it’s important to reassess security practices and the role security questions play in our defense against such attacks. Here are three ways you can enhance your online security right now:
- Use an end-to-end encrypted password manager: Password managers help you create, store, and autofill passwords without compromising on your safety. Proton Pass offers full end-to-end encryption for your personal data, as well as a secure password generator, passkey support, secure sharing, and dark web monitoring.
- Use a private and secure email service: Signing up with an encrypted email provider, such as Proton Mail, ensures all of your emails can be read only by you and your intended recipient. Proton Mail uses end-to-end encryption (E2EE), zero-access encryption, and other advanced security features to protect your messages.
- Use email aliases: These let you hide your personal email addresses from recipients and websites while receiving emails to your personal inbox. You can use a service, such as Proton Pass and Proton Mail, to generate distinct email addresses for each of your various online accounts. That way you can easily revoke an alias tied to a specific account should that account become compromised. Email aliases should be one of the main tools in your cybersecurity arsenal because your email address is your digital passport.
Put your privacy first
There’s no time like the present for taking control of your online security. You can start by using alternative tools, such as secure password manager and email services like Proton Pass and Proton Mail to strengthen your defenses.
It’s important to use the best tools available to build a future where privacy is the default.