Co-authored by Quinn North, Senior Incident Response Analyst, IBM Security.

In previous articles, we explored the concept of a feedback loop as it applies to user password selection and password audits. To further expand on these psychological tropes, consider a slightly radical idea in the field of end-user password security. That is, if a user chooses a good password, let them keep it.

Clean Up Terrible Password Hygiene

Good may be subjective here, so let’s clarify that upfront: For our purposes, a good password is one that is over 15 characters, contains nonrepeating alphanumeric and special characters, and does not contain a keyboard pattern (e.g., qwerty, qazwsx, qeadzc, etc). From a purely technical standpoint, this password should create a hash that becomes computationally infeasible to crack with today’s consumer computing power.

Users may complain that such a password is akin to memorizing pi to 35 digits. However, simple tricks, such as passphrases, high-entropy keywords or even modified song lyrics and movie quotes can thwart the dreaded “Pa$$w0rd1” choice that many end users make.

Dangling the Carrot

The idea here is that if users are informed and take the time to create a complex, secure password, they should be rewarded. The rewards enforce good behavior and the users are more likely to continue that behavior.

One reward could be that users who choose a secure password get to keep it slightly longer than others. This would create a successful feedback loop for the user and diminish terrible password hygiene.

Everyone loathes short password expiry periods. This is proven by the fact that the majority of passwords we audit are often simple variations on a theme — for example, a password like “NYGIANTS” might be changed to “G0NYG1ANTS!”

Surprisingly, it’s much more common for users to increment an existing password where a password such as “Summer!” becomes “Summer!1.” By leveraging a reward scenario and getting users to choose good passwords, we may actually encourage proper password selection throughout the enterprise and eliminate this terrible password hygiene.

Educating End Users

Extending the expiry period for users or acknowledging their strong password in a quarterly password audit via an internal company bulletin are just two examples that would reward strong password selection and would hopefully enforce that behavior in the future. Currently, for most users, there is absolutely no incentive to choose a strong password over a weak one that barely meets the company’s standards.

In today’s landscape of advanced persistent threats and flat legacy networks, security practitioners need to be in constant contact with end users to show them what is possible and what they are risking every time they click. So why not go a step further and reward them for actively taking a part in securing your network?

More from Identity & Access

Kronos Malware Reemerges with Increased Functionality

The Evolution of Kronos Malware The Kronos malware is believed to have originated from the leaked source code of the Zeus malware, which was sold on the Russian underground in 2011. Kronos continued to evolve and a new variant of Kronos emerged in 2014 and was reportedly sold on the darknet for approximately $7,000. Kronos is typically used to download other malware and has historically been used by threat actors to deliver different types of malware to victims. After remaining…

An IBM Hacker Breaks Down High-Profile Attacks

On September 19, 2022, an 18-year-old cyberattacker known as "teapotuberhacker" (aka TeaPot) allegedly breached the Slack messages of game developer Rockstar Games. Using this access, they pilfered over 90 videos of the upcoming Grand Theft Auto VI game. They then posted those videos on the fan website GTAForums.com. Gamers got an unsanctioned sneak peek of game footage, characters, plot points and other critical details. It was a game developer's worst nightmare. In addition, the malicious actor claimed responsibility for a…

What is the Future of Password Managers?

In November 2022, LastPass had its second security breach in four months. Although company CEO Karim Toubba assured customers they had nothing to worry about, the incident didn’t inspire confidence in the world’s leading password manager application. Password managers have one vital job: keep your sensitive login credentials secret, so your accounts remain secure. When hackers compromise these software applications, the entire industry of identity and access management (IAM) takes notice. As an alliance of tech giants leads a global push…

Beware of What Is Lurking in the Shadows of Your IT

This post was written with contributions from Joseph Lozowski. Comprehensive incident preparedness requires building out and testing response plans that consider the possibility that threats will bypass all security protections. An example of a threat vector that can bypass security protections is “shadow IT” and it is one that organizations must prepare for. Shadow IT is the use of any hardware or software operating within an enterprise without the knowledge or permission of IT or Security. IBM Security X-Force responds…