August 23, 2016 By Robert Lelewski 2 min read

Co-authored by Quinn North, Senior Incident Response Analyst, IBM Security.

In previous articles, we explored the concept of a feedback loop as it applies to user password selection and password audits. To further expand on these psychological tropes, consider a slightly radical idea in the field of end-user password security. That is, if a user chooses a good password, let them keep it.

Clean Up Terrible Password Hygiene

Good may be subjective here, so let’s clarify that upfront: For our purposes, a good password is one that is over 15 characters, contains nonrepeating alphanumeric and special characters, and does not contain a keyboard pattern (e.g., qwerty, qazwsx, qeadzc, etc). From a purely technical standpoint, this password should create a hash that becomes computationally infeasible to crack with today’s consumer computing power.

Users may complain that such a password is akin to memorizing pi to 35 digits. However, simple tricks, such as passphrases, high-entropy keywords or even modified song lyrics and movie quotes can thwart the dreaded “Pa$$w0rd1” choice that many end users make.

Dangling the Carrot

The idea here is that if users are informed and take the time to create a complex, secure password, they should be rewarded. The rewards enforce good behavior and the users are more likely to continue that behavior.

One reward could be that users who choose a secure password get to keep it slightly longer than others. This would create a successful feedback loop for the user and diminish terrible password hygiene.

Everyone loathes short password expiry periods. This is proven by the fact that the majority of passwords we audit are often simple variations on a theme — for example, a password like “NYGIANTS” might be changed to “G0NYG1ANTS!”

Surprisingly, it’s much more common for users to increment an existing password where a password such as “Summer!” becomes “Summer!1.” By leveraging a reward scenario and getting users to choose good passwords, we may actually encourage proper password selection throughout the enterprise and eliminate this terrible password hygiene.

Educating End Users

Extending the expiry period for users or acknowledging their strong password in a quarterly password audit via an internal company bulletin are just two examples that would reward strong password selection and would hopefully enforce that behavior in the future. Currently, for most users, there is absolutely no incentive to choose a strong password over a weak one that barely meets the company’s standards.

In today’s landscape of advanced persistent threats and flat legacy networks, security practitioners need to be in constant contact with end users to show them what is possible and what they are risking every time they click. So why not go a step further and reward them for actively taking a part in securing your network?

More from Identity & Access

Another category? Why we need ITDR

5 min read - Technologists are understandably suffering from category fatigue. This fatigue can be more pronounced within security than in any other sub-sector of IT. Do the use cases and risks of today warrant identity threat detection and response (ITDR)? To address this question, we work backwards from the vulnerabilities, threats, misconfigurations and attacks that IDTR specializes in providing visibility into. As identity threat detection and response (ITDR) technology evolves, one of the most common queries we get is: “Why do we need…

Access control is going mobile — Is this the way forward?

2 min read - Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use in an attack. Family members of privileged users are also sometimes victims.“These shifts suggest that threat actors have revalued credentials as a reliable and preferred…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today