Categories: Network Security

Re-secure your passwords!

In 2003, a manager at the National Institute of Standards and Technology (NIST) authored a document on password best practices for businesses, federal agencies, and academic institutions. Now retired, the author admits that his document was misguided. Find out why and what great passwords are made of.

The problem

The issue isn’t necessarily that NIST advised people to create passwords that are easy to crack, but it did steer people into creating lazy passwords, using capitalization, special characters, and numbers that are easy to predict, like “P@ssW0rd1.”

This may seem secure, but in reality, these strings of characters and numbers could easily be compromised by hackers using common algorithms.

To make matters worse, NIST also recommended that people change their passwords regularly, but did not define what it actually means to “change” them. Since people thought their passwords were already secure with special characters, most only added one number or symbol.

NIST essentially forced everyone, including you and your colleagues, to use passwords that are hard for humans to remember but easy for computers to guess.

The solution

One cartoonist pointed out just how ridiculous NIST’s best practices were when he revealed that a password like “Tr0ub4dor&3” could be cracked in only three days while a password like “correcthorsebatterystaple” would take about 550 years.

Simply put, passwords should be longer and include nonsensical phrases and English words that make it almost impossible for an automated system to make sense of.

Even better, you should enforce the following security solutions within your company:

  • Multi-factor Authentication – which only grants access after you have successfully presented several pieces of evidence
  • Single Sign-On – which allows users to securely access multiple accounts with one set of credentials
  • Account Monitoring Tools – which recognize suspicious activity and lock out hackers

When it comes to security, ignorance is the biggest threat. If you’d like to learn about what else you can do to fortify security, just give us a call.

Ron Pierce

Recent Posts

Unleash the Power of the Cloud: How Cloud-Hosted Solutions Propel SMB Agility and Growth

Cloud-hosted solutions empower SMBs with cost-effective, scalable, and secure IT infrastructure, enhancing agility, productivity, and…

6 hours ago

Boost Your Business Security Without Pumping the Brakes

Trinity Solutions Inc. offers managed IT services that enhance small business cybersecurity with minimal disruption,…

1 day ago

Understanding HIPAA Compliance Challenges for North Carolina Practices

Small medical and dental practices in North Carolina already have full days. Between treating patients,…

1 day ago

AI Tools Your Small Business Can Start Using Today—No Advanced Tech Skills Required!

AI tools like Grammarly, Canva, Zapier, and ManyChat help small businesses automate tasks, boost productivity,…

2 days ago

Unleashing the Power of Cloud-Hosted Solutions: Revolutionize Remote Work and Skyrocket Team Productivity

Cloud-hosted solutions enhance remote work by enabling flexible access, boosting team productivity by 40%, ensuring…

3 days ago

Practical AI Adoption Tips for Small Businesses: Start Small, Scale Smart, Benefit Big!

Small businesses can adopt AI affordably by starting with simple tools for routine tasks, then…

4 days ago

This website uses cookies.