Navigation on Security Ligue

Content navigation

A term explained – «Password»

Jan 12, 2018 01:42 PM

Issued by | Stefan Huber | International Security Ligue | ComGroup

Image caption:

How to create a secure PW is a hot evergreen topic and user awareness is the key to betterment. There are many sources from which to learn. Verizon is just one. Have a look at their video clip. 

ULSD (Upper characters, Lower characters, Special characters and Digits) recommendations and password complexity mean less, as PW cracking methods are evolving.

One in five (!) enterprise PWs compromises easily according to a news report from Preempt . This PW is either weak or even shared. Also, employees are often reusing an older PW again. Reusing an older PW is a clear no-go nowadays. 

Also interesting to understand; the time required by specialized soft- and hardware tools to hack a PW with low complexity needs less than one day, a PW with medium complexity between one day to two weeks and a complex PW with a minimum of ten characters (ULSD format), needs up to a month to crack. Or let’s say; only up to a month.

The found that 1.4 billion plain-text PWs leaked and are circulating now online. Ideally, they promote that today a strong password should be at least 16 ULSD of length. The most secure PWs are those we don’t even know ourselves and are created by a PW-manager software.

Reliable PW-manager software enables us to adopt the best strategy by selecting a individual password for each login, choosing a secure PW to enter the manager and defining secure settings of this software.

Are you PW secure? Improve your employees’ behavior by providing a user security awareness training at least annually. Test the improvements and share them with the users.

Further informations