Complex passwords aren't good enough

There was a wonderful "2024 State of Passwordless Identity Assurance Report" published by HYPR | The Identity Assurance Company recently. Call-outs:

  • Almost four in ten (39%) experienced phishing attacks; identity impersonation struck 28% of organizations, while push notification exploits were the fifth most common vector at 26%.
  • More than two-thirds (69%) were breached via authentication processes, unsurprising considering most employees use four different types of authentication methods.
  • 78% experienced identity fraud, with over half falling victim multiple times, costing an average of $2.78 million.

From the official Certified Information Systems Security Professional (CISSP) Study Guide, 9th Ed, page 703, "Passwords are the weakest form of authentication, and there are many types of password attacks."


NIST SP 800-63B designates that secure passwords:

  • should not expire (because we're terrible at selecting new passwords)
  • should not contain special characters (because special characters rarely confuse scripts anymore these days, and provides a hint about the password content)
  • are at least 8 characters long (but preferably longer, since shorter ones are often easier to crack)
  • are not "password" "123456" "11111111" (thank heavens for that)


Unfortunately, most systems still use outdated password policies that are now considered insecure:

  • Passwords expire after 60/90 days (and catch us off guard, which is why we hastily select a worse password than the initial one)
  • Must be at least 15 characters (which at least helps with complexity, but we should be using multiple word passphrases to achieve this, not passwords)
  • Must have one uppercase letter, one lowercase letter, one number, (which make the password more predictable) and one special character of a select list of - _ + ! * ? . , (so as not to upset the scripts that actually handle passwords behind the scenes, which are more fragile than the attackers')

The newer guidelines are an improvement, but provide a false sense of security when using a method of authentication that is still incredibly insecure.

The best solution should be to get rid of the password entirely and use something more secure. There are many better solutions than passwords available from HYPR | The Identity Assurance Company , Yubico , 1Password , and many others that are easier to use and yet harder to crack. "More than two-thirds (69%) were breached via authentication processes" - surely there should be motivation to fix this?

Andrew Thalheimer

Director of Software Engineering

7 个月

An interesting thought about passwords vs passphrases: if you allow the passwords to contain spaces and allow them to be very long, there is no difference. You can put whatever you like. As you indicated, restrictions (such as a capital letter, a number, etc.) only make the passwords easier to guess. The other thing you mentioned that people often forget is the behavior and psychology. For a machine, frequent changing of passwords might be great, but as you mentioned, it's very inconvenient to people, who are likely to just add an extra character to their old password rather than have to think up a brand new one every month. Finally, as you also intimated, MFA is more common these days, and there are some sites that don't even use passwords. Yahoo! for example sends a ping to my app when I want to log in and doesn't even bother asking my password anymore.

回复
Mark Lauterbach, CPC

Expert Job Search Coach | Guiding You to Get Your Next Job Quickly | Resume Revamps | LinkedIn Mastery | Interview Prep | Offer Negotiation | Providing You with Proven Strategies to Stand Out & Quickly Get Hired

7 个月

Marc J. Miller nice job and I appreciate you sharing this on LinkedIn. I am going to repost to my network as you've included such great information.

Shoieb Yunus

Product Strategy and GTM || F5 || Ex-NTT || Ex-Equinix

7 个月

Excellent write-up, Marc! Very insightful, as always. I agree, would love to see the traditional passwords go away. But, would get replaced with what? In early to mid 2000’s, fingerprint authentication sensors and matching software were introduced. They never got fully adopted, including other forms of biometric identification systems.

回复

要查看或添加评论,请登录

Marc J. Miller的更多文章

  • Thinking about passkeys? Read this first.

    Thinking about passkeys? Read this first.

    I believe in passkeys completely. Imagine the difference between walking into a gym and confirming membership by giving…

  • TikTok Ban: Why Your Privacy Matters More Than You Think

    TikTok Ban: Why Your Privacy Matters More Than You Think

    Amidst the ongoing debate about a potential TikTok ban, many users are asking: why should I care about my data privacy?…

    5 条评论
  • What You Should Know:

    What You Should Know:

    Multi-Factor Authentication 2025 This article includes many helpful links. None of these are referral links.

    3 条评论
  • We will text you a code...

    We will text you a code...

    The worst thing you can do is to secure your user logins with passwords. The second-worst thing you can do is to secure…

    7 条评论
  • Leadership Lessons Learned at Disneyland

    Leadership Lessons Learned at Disneyland

    Leaders Have Followers No, I'm not going to talk about what we've learned from watching Disney, though I did write…

    3 条评论
  • Access Control: RBAC or ABAC

    Access Control: RBAC or ABAC

    When considering permissions, there are several ways to think about how access to data and tools gets managed. The most…

    7 条评论
  • What the AT&T breach means

    What the AT&T breach means

    You might have heard already, but if you haven't, it was recently announced that potentially all text message and phone…

    5 条评论
  • The Product Manager Job Description

    The Product Manager Job Description

    I’ve seen some interesting articles recently claiming that jobs like Product Manager, Product Owner, and Scrum Master…

    2 条评论

社区洞察

其他会员也浏览了