top of page

Securing Organizations through password management

Updated: May 23, 2024

Effective password practices help protect sensitive information, prevent unauthorized access, and safeguard against various cyber threats.

Passwords are the first line of defense against unauthorized access to your accounts and systems. Poor password management can lead to data breaches, financial loss, and compromised personal and organizational information. Understanding the risks and adopting best practices in password management is essential for maintaining a secure digital environment.

Common Password Threats

1.Brute Force Attacks: Attackers use automated tools to guess passwords by trying numerous combinations until the correct one is found.

2.Phishing: Cybercriminals trick users into revealing their passwords through deceptive emails or websites.

3.Keyloggers: Malicious software records keystrokes to capture passwords and other sensitive information.

4.Credential Stuffing: Attackers use stolen username-password pairs from one breach to attempt logins on other sites.


The five most common weak passwords

Password

How Many People Use It?

How Much Time Did It Take To Crack?

How Many Times Has It Been Exposed?

123456

25,43,285

Less than 1 second

2,35,97,311

123456789

9,61,435

Less than 1 second

78,70,694

picture1

3,71,612

3 hours

11,190

password

3,60,467

Less than 1 second

37,59,315

According to online surveys and pools


Weak passwords are short, easy to guess, or can be cracked in minutes using methods like brute force with rainbow tables, credential stuffing. GoodFirms’ survey found that 30% of respondents — all IT professionals — experienced a data breach because of a weak password. An additional 23% were unsure whether they were involved in a data breach


Best Practices

  • Implement password policy inline to compliance framework like ISO 27001

  1.  Policy Guidelines shall include requirements for Complexity Requirements, Age and Expiration, Temporary and Initial Passwords

  2. Also implement controls on Account Lockout, Multi-Factor Authentication (MFA),Storage and Transmission,Monitoring and Alerts and Education and Training


Create Strong Passwords:

  1. Use at least 12 characters, including uppercase letters, lowercase letters, numbers, and special symbols. Best practice suggest 16 to 20 characters Use password testers like zxcvbn

  2. Avoid common words, phrases, or easily guessable information like birthdays or names.

  3. Consider using a passphrase—a random combination of words that is easy to remember but hard to guess.

An example of a secure password is bL8%4TO&t9b%, generated by the password manager LastPass, which would take a computer 46 million years to crack!


Some more Example of Strong Passwords

D$9l&4z!PqR@3xY

T1mB#uR$9fL^jK!7

R4iNbowC@k3!77&N


Use Unique Passwords for Each Account:

  1. Never reuse passwords across multiple accounts. If one account is compromised, others will remain secure.

  2. Create unique passwords for each service or platform to minimize the impact of a single breach.


Enable Multi-Factor Authentication (MFA):

  1. MFA adds an extra layer of security by requiring an additional verification step, such as a text message code or authentication app, beyond just the password.

  2. Enable MFA on all accounts that support it, especially those containing sensitive information.

Use OTP generated by online authenticators such as google authenticator, micosoft authenticator etc.


Change Passwords Regularly:

  1. Update passwords periodically to reduce the risk of long-term exposure from undetected breaches.

  2. Immediately change passwords if you suspect they have been compromised.



Conclusion

By adhering to these guidelines for password complexity and age, you can significantly enhance the security of your systems and protect against unauthorized access. Regularly updating passwords and using strong, unique combinations for each account are vital steps in maintaining robust cybersecurity. Encourage all users to follow these guidelines diligently to ensure the safety and integrity of your organization's digital assets.

 
 
 

Comments


bottom of page