Are you still changing passwords every 60-90 days? WHY?

woman working on a laptop

Many companies use a password policy that requires their users to change passwords every 60-90 days or so. But does that really protect them from hackers and bad actors? The answer might surprise you.

We’ve come a long way since computer passwords first became a thing. Back in 2003, NIST published 800-63, and with it came what would become the standard password practices of most businesses:

  • 8 characters minimum
  • Using a mix of uppercase, lowercase, numbers and symbols would make it stronger
  • 60-90 day change frequency, based on how long they figured it would take to crack a password

These held true for over a decade, but now industry experts suggest otherwise.

So what went wrong?

…The users are all human!

Everyone followed similar behaviors. They:

  • Used a single, common word as base of password
  • Capitalized the first letter
  • Added a number to the end
  • Added ! to the end
  • Substituted @ for a, ! for I
  • Wrote passwords down
  • They made slight modifications when changing, such as Tarheel1 => Tarheel2 => Tarheel3
  • Used certain letters and numbers far more often than others, such as:  e, 1

Frequent password changes made the above even more prevalent. If users had to always change, they reverted to simpler passwords and simpler changes, which made them easy to crack and easy to guess. 

Predictable passwords and predictable changes made it easy for hackers. Imagine if your password was Dinosaur1, and a hacker got it.

Even if you changed your password after 60 days, the hacker has a pretty good idea what to try next – Dinosaur2, Dinosaur1!, etc.

It turns out that the NIST password policy did not produce strong passwords, as originally conceived.

We know this based on research studies on password histories, and analyses of passwords gleaned from data breaches. (see references below).

So in June 2017, NIST revised and updated Publication 800-63, suggesting longer and better passwords, and not changing passwords simply because 2 months had passed. In June 2019, Microsoft followed suit on their baseline password policy recommendations.

From Microsoft’s new policy:

If it’s a given that a password is likely to be stolen, how many days is an acceptable length of time to continue to allow the thief to use that stolen password? 

The Windows default is 42 days.

Doesn’t that seem like a ridiculously long time?

Well, it is, yet our current baseline says 60 days, and used to say 90 days,
because forcing frequent expiration introduces its own problems.

If it’s not a given that passwords will be stolen, you acquire those
problems for no benefit.

Further, if your users are the kind who are willing to answer surveys
in the parking lot that exchange a candy bar for their passwords,
no password expiration policy will help you.

The main takeaway is to stop forcing timed password changes. Instead, require users to make one really good, strong password. What makes a good password? We’re glad you asked…

 

Size Matters – Length vs Complexity

Password strength is measured in “Bits of Entropy”, which means:

How many guesses it would take to determine the characters correctly

For a single character this table show the Bits of Entropy:

Type Bits of Entropy
Numbers only 3.32
Lowercase letters 4.70
Upper and lowercase letters 5.70
All characters, including symbols 6.57

Multiply those bits times the number of characters. For example:

Upper and lowercase letters = 5.70

11 characters x 5.70 = 62.70

  11 Characters 12 Characters 16 Characters 20 Characters
Letters only 62.70 68.41 91.21 114.01
Require digits 65.26 71.26 95.18 119.04

1 character longer, even with letters only, is stronger than letters + numbers (68.41 > 65.26).

Every increase by 1 character translates to double the strength. This is important because as technology improves and computers get faster, it becomes easier for passwords to be cracked. 

In 2011, 8 character passwords could be cracked in 44 days. Now, they can be cracked in 2.5 hours. But a 14 character password would take 900,000 years.

Longer passwords = Stronger passwords

You could still add numbers and symbols, but they are less important.

 

What should you be doing for passwords?

  • Don’t change passwords on a timer. Change only if there’s a real need, such as a data breach.
  • Make a long password or passphrase – 12 or more characters.
  • Use Two-Factor Authentication, such as a code to your phone or an app

 

References and additional resources

https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63b.pdf

https://blogs.technet.microsoft.com/secguide/2019/05/23/security-
baseline-final-for-windows-10-v1903-and-windows-server-v1903/

https://www.ftc.gov/news-events/blogs/techftc/2016/03/time-rethink-
mandatory-password-changes

https://blog.lastpass.com/2018/08/often-change-password.html/

https://www.sans.org/security-awarenes-training/blog/time-password-
expiration-die

https://www.govtech.com/security/Widely-Used-Password-Advice-
Turns-Out-to-Be-Wrong-NIST-Says.html

IT business meeting

Contact Us Today

Contact us today for a free consultation to see how we can help save your business thousands of dollars each year!

Get a Free Quote