Every IT Department worth their salt has a password policy that their employees are required to adhere to. In reality though, your password policy is broken and it won't keep your company secure...
Why is your password policy broken? Because employees are only human; and will find the most-convenient way to adhere to the policy. They do this by creating passwords that meet the policy requirements, but that are weak and easy to guess.
Password requirements for internal applications and directories, where users are accessing corporate-owned systems, can be set by the organisation. However, employees also typically use a multitude of externally-hosted applications. For these apps, organisations are at the mercy of the password requirements set by those service providers, and can only offer guidance for their users as to how they should create passwords.
Password requirements typically comprise; a minimum length, a maximum length, passwords requiring specific characters (such as uppercase, lowercase, numbers or special characters), etc.
There can also be requirements as to the type of passwords employees can use, for example; old passwords cannot be re-used, lockout threshold (3 failed login attempts blocks the system), reset time after lockout (can’t reset password for 20 minutes after lockout), etc.
External target applications may ask for something like this (this is Salesforce).
While the organisation has more control over password requirements for internal applications than external applications, in both instances, it is still down to the user to create and manage the passwords.
So, why don’t password policies and minimum password requirements work?
The measures in place to determine password strength are outdated; these do not take into account the increased sophistication of the tools available to hackers or the fact that a password that meets the requirements doesn’t necessarily make it strong. For example, if you were to use ‘Password1’ for your work PC, while this may meet the requirements of one uppercase letter and one digit, it’s an extremely weak password as it is easy to guess, commonly used and will appear in password dictionaries.
Furthermore, it is human nature to focus on convenience over security. Staff will unconsciously choose passwords that are easily socially engineered, such as using family, pet or sports team names, and if they are required to regularly change an application password, they are likely to introduce patterns, such as incrementing a digit.
These might seem incredibly easy to guess or hack, but you’d be surprised how many people globally, use passwords just like these in their every day work lives. A sizeable number of your staff will be using passwords like these to protect your company accounts:
1. 123456 | 10. baseball | 19. letmein |
2. password | 11. welcome | 20. login |
3. 12345678 | 12. 1234567890 | 21. princess |
4. qwerty | 13. abc123 | 22. qwertyuiop |
5. 12345 | 14. 111111 | 23. solo |
6. 123456789 | 15. 1qaz2wsx | 24. passw0rd |
7. football | 16. dragon | 25. starwars |
8. 1234 | 17. master | |
9. 1234567 | 18. monkey |
If you suspect your employees are using any of these passwords, now might be a good time to run a password audit to find out, and then look to change these passwords to something more secure. If you’d like to test your password strength, try our Password Strength Calculator.
So, what can you do to better-secure your organisation from a data breach due to weak passwords? Be smarter about access and authentication policies; accept that employees are your weakest link and that changing their behaviour is next to impossible. You can effectively save employees from themselves by making some changes that don’t require them to change the way they work. This can come in a number of forms:
If there’s one thing you should take away from this article, it’s that having a password policy in place does not solve the problem of weak passwords. Weak passwords are still in use throughout your organisation, from top to bottom.
Nobody can predict that your organisation will definitely suffer a data breach due to inneffective password policies, but let's look at the stats:
The question to ask yourself is, what odds would the bookmakers give you on avoiding a data breach?
If you think your organisation could benefit from an Single Sign-On solution, why not read our White Paper; TEN Signs You Need SSO.
* Source: HM Government Information Security Breaches Survey 2015
** Source: Verizon Data Breach Report