August 23, 2016 By Robert Lelewski 2 min read

Co-authored by Quinn North, Senior Incident Response Analyst, IBM Security.

In previous articles, we explored the concept of a feedback loop as it applies to user password selection and password audits. To further expand on these psychological tropes, consider a slightly radical idea in the field of end-user password security. That is, if a user chooses a good password, let them keep it.

Clean Up Terrible Password Hygiene

Good may be subjective here, so let’s clarify that upfront: For our purposes, a good password is one that is over 15 characters, contains nonrepeating alphanumeric and special characters, and does not contain a keyboard pattern (e.g., qwerty, qazwsx, qeadzc, etc). From a purely technical standpoint, this password should create a hash that becomes computationally infeasible to crack with today’s consumer computing power.

Users may complain that such a password is akin to memorizing pi to 35 digits. However, simple tricks, such as passphrases, high-entropy keywords or even modified song lyrics and movie quotes can thwart the dreaded “Pa$$w0rd1” choice that many end users make.

Dangling the Carrot

The idea here is that if users are informed and take the time to create a complex, secure password, they should be rewarded. The rewards enforce good behavior and the users are more likely to continue that behavior.

One reward could be that users who choose a secure password get to keep it slightly longer than others. This would create a successful feedback loop for the user and diminish terrible password hygiene.

Everyone loathes short password expiry periods. This is proven by the fact that the majority of passwords we audit are often simple variations on a theme — for example, a password like “NYGIANTS” might be changed to “G0NYG1ANTS!”

Surprisingly, it’s much more common for users to increment an existing password where a password such as “Summer!” becomes “Summer!1.” By leveraging a reward scenario and getting users to choose good passwords, we may actually encourage proper password selection throughout the enterprise and eliminate this terrible password hygiene.

Educating End Users

Extending the expiry period for users or acknowledging their strong password in a quarterly password audit via an internal company bulletin are just two examples that would reward strong password selection and would hopefully enforce that behavior in the future. Currently, for most users, there is absolutely no incentive to choose a strong password over a weak one that barely meets the company’s standards.

In today’s landscape of advanced persistent threats and flat legacy networks, security practitioners need to be in constant contact with end users to show them what is possible and what they are risking every time they click. So why not go a step further and reward them for actively taking a part in securing your network?

More from Identity & Access

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today