
Any time a human is involved, the potential for weakened security increases. Password policies are necessary for cybersecurity compliance; however, burdensome password policies can result in bad user behavior like password transformation.
REMEMBER WHEN – IBM published the startling statistic that human error was found to be involved in 95% of all security incidents in “2014 Cyber Security Intelligence Index”?
A transformation happens when a user increments a number, changes a letter to similar-looking symbol, adds or deletes a special character or switches the order of characters.
Organizations can better secure their data, systems and environment by following these simple recommendations below.
THE DO’S:
SIZE MATTERS
USE OF A BAN DICTIONARY
ALLOW PASTING
USER ABILITY TO RESET PASSWORD
THE DONT’S:
NO COMPOSITION RULES
NO PASSWORD HINTS
NO KNOWLEDGE-BASED AUTHENTICATION (KBA):
NO MORE EXPIRATION WITHOUT REASON:
Sayers suggests leveraging a policy that follows most if not all of these recommendations. Two Factor Authentication is strongly encouraged because it increases the requirements to accomplish a successful attack. Let us help you in the creation of and/or modification of a password policy that is flexible, provides additional protection and fosters acceptance from your user community.
Additional Resources: