Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Why You Don’t Need to Change Passwords So Often

    Written by

    Wayne Rash
    Published October 15, 2019
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The audience at the recent NetEvents conference in San Jose snapped to alertness when Ted Ross, CEO of Spycloud, told them to stop changing their passwords so often. In fact, Ross said, passwords should be left alone unless you know that they’ve been breached. The reason, he explained, is because people tend to pick passwords that are easy to remember, which means that they are easy to guess.

      In a subsequent interview, Ross said that people tend to use variants of the same old password when asked to think up a new one. “What we’ve found is that there are so many passwords out there that all the criminals need is to find an old password,” Ross said. “People change their passwords to something that’s already been exposed.”

      Go here to see a listing of eWEEK’s Top SIEM Companies.

      What this means is that your old password is likely already available on the dark web and can be used as a starting point for testing variants. If there are multiple passwords on the dark web, then hackers can see patterns in how you change passwords, which simplifies their work considerably. The more times you change a password, he explained, the greater the chance that one or more of those old passwords will be found out.

      This is exacerbated by the number of sites for which you need to have passwords. “The average user has over 200 sites to log into,” Ross said. “Nobody can remember 200 passwords.”

      Hard to Remember 200 Passwords

      When faced with the task of remembering those 200 passwords, what most people do is either simply use the same password for sites they consider non-critical, or they use variations of the same password for some of them so they can remember what they are. Thus you might find a sequence like this: Password, Pa55word, Passw0rd, then Password!

      This is also what happened when people are asked to change their passwords on a regular basis, such as every 90 days. “Decades ago we were concerned about a criminal trying to log in to your account,” Ross explained. “If they were smart enough to stay under your brute force level, they could keep trying.”

      The brute force level refers to the number of tries you can get before your access to a site is blocked. Most sites have a number of at least three to allow for ham-handed typists. Some allow more tries, and some don’t have limits on failed password tries.

      Depending on the complexity of a given password, the ease in cracking it varies significantly. A good attacker with the right software can crack a password that’s short and uses existing words in a few minutes. A password that’s 99 characters long and consists entirely of random characters can require more time than the expected age of the universe. But if you’re reusing the same password with minor variations, then cracking it can be much faster and easier. Once the attacker knows specific strings of characters that are usually in your passwords, he can tell his software where to start.

      Why Consider a Password Manager?

      The obvious answer to dealing with this many complex passwords is to use a password manager. A good manager will work with every platform in use in your organization, including Windows and Macintosh computers and Apple and Android phones and tablets. It should be able to share passwords among your devices, and it should be able to generate complex passwords and save them to the sites where you need them.

      And, of course, there’s more. The password manager should be able to check your password against the list of millions of exposed passwords on the dark web, and it should accommodate limits to passwords on some sites that only allow a specific number of characters, or that restrict the complexity of passwords by banning special characters or numbers.

      Ross noted that SpyCloud maintains a database of exposed passwords that are updated in near real time, so passwords can be checked there before they’re changed. He also noted that two password managers, Dashlane and Keeper automatically check passwords against the SpyCloud database.

      It’s important to note that there are steps beyond passwords that will help secure your access to a site. The most common is to use two-factor authentication so that even if someone trying to access a site has your password, they must also pass another authentication test that goes outside of the internet connection.

      Even Two-Factor Authentication Can Be Breached

      By now you’ve seen the type of two-factor authentication that uses a text message sent to your mobile device. While this is better than nothing, this type of 2FA can be breached. A better type uses an authentication app on your phone, or a physical device such as a smartcard or USB security key.

      Biometrics are also an important means of security access, but these depend on a hardware device that may be difficult to deploy in the enterprise, with the exception of devices with the capability built in, such as Apple’s Face ID or one of the several fingerprint readers on Android devices. While it’s possible to fool facial or fingerprint readers, it takes significant resources to pull it off, which means that the attacker probably has nation-state backing, which is outside the realm of most security access issues.

      “It’s a probability exercise,” Ross explains. The goal is to reduce the probability that an attacker can figure out your password and access your account.

      Wayne Rash
      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×