Securing Organizations through password management
- Mohnish Singh
- May 22, 2024
- 2 min read
Updated: May 23, 2024
Effective password practices help protect sensitive information, prevent unauthorized access, and safeguard against various cyber threats.
Passwords are the first line of defense against unauthorized access to your accounts and systems. Poor password management can lead to data breaches, financial loss, and compromised personal and organizational information. Understanding the risks and adopting best practices in password management is essential for maintaining a secure digital environment.
Common Password Threats
1.Brute Force Attacks: Attackers use automated tools to guess passwords by trying numerous combinations until the correct one is found.
2.Phishing: Cybercriminals trick users into revealing their passwords through deceptive emails or websites.
3.Keyloggers: Malicious software records keystrokes to capture passwords and other sensitive information.
4.Credential Stuffing: Attackers use stolen username-password pairs from one breach to attempt logins on other sites.
The five most common weak passwords
Password | How Many People Use It? | How Much Time Did It Take To Crack? | How Many Times Has It Been Exposed? |
123456 | 25,43,285 | Less than 1 second | 2,35,97,311 |
123456789 | 9,61,435 | Less than 1 second | 78,70,694 |
picture1 | 3,71,612 | 3 hours | 11,190 |
password | 3,60,467 | Less than 1 second | 37,59,315 |
According to online surveys and pools
Weak passwords are short, easy to guess, or can be cracked in minutes using methods like brute force with rainbow tables, credential stuffing. GoodFirms’ survey found that 30% of respondents — all IT professionals — experienced a data breach because of a weak password. An additional 23% were unsure whether they were involved in a data breach
Best Practices
Implement password policy inline to compliance framework like ISO 27001
Policy Guidelines shall include requirements for Complexity Requirements, Age and Expiration, Temporary and Initial Passwords
Also implement controls on Account Lockout, Multi-Factor Authentication (MFA),Storage and Transmission,Monitoring and Alerts and Education and Training
Create Strong Passwords:
Use at least 12 characters, including uppercase letters, lowercase letters, numbers, and special symbols. Best practice suggest 16 to 20 characters Use password testers like zxcvbn
Avoid common words, phrases, or easily guessable information like birthdays or names.
Consider using a passphrase—a random combination of words that is easy to remember but hard to guess.
An example of a secure password is bL8%4TO&t9b%, generated by the password manager LastPass, which would take a computer 46 million years to crack!
Some more Example of Strong Passwords
D$9l&4z!PqR@3xY
T1mB#uR$9fL^jK!7
R4iNbowC@k3!77&N
Use Unique Passwords for Each Account:
Never reuse passwords across multiple accounts. If one account is compromised, others will remain secure.
Create unique passwords for each service or platform to minimize the impact of a single breach.
Enable Multi-Factor Authentication (MFA):
MFA adds an extra layer of security by requiring an additional verification step, such as a text message code or authentication app, beyond just the password.
Enable MFA on all accounts that support it, especially those containing sensitive information.
Use OTP generated by online authenticators such as google authenticator, micosoft authenticator etc.
Change Passwords Regularly:
Update passwords periodically to reduce the risk of long-term exposure from undetected breaches.
Immediately change passwords if you suspect they have been compromised.
Conclusion
By adhering to these guidelines for password complexity and age, you can significantly enhance the security of your systems and protect against unauthorized access. Regularly updating passwords and using strong, unique combinations for each account are vital steps in maintaining robust cybersecurity. Encourage all users to follow these guidelines diligently to ensure the safety and integrity of your organization's digital assets.
Comments