Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Tech

Complicated passwords may not be as effective as you think

Have we finally cracked the code on password security?

A recent update to password best practices from the National Institute of Standards and Technology revealed that longer login credentials indeed boost account security more than shorter, more complex ones — but it’s not all it’s cracked up to be.

Historically, sites have required complicated passwords with a mix of alphanumeric characters and symbols.

Still, the NIST found that “the benefit of such rules is less significant than initially thought” and places a “severe” burden on users’ memory.

The NIST recently released updated password guidelines emphasizing length over complexity. jamdesign – stock.adobe.com

“Humans have a limited ability to memorize complex, arbitrary secrets, so they often choose passwords that can be easily guessed,” the NIST wrote in the report, adding that, in return, “online services have introduced rules to increase the complexity of these passwords.”

Those rules can frustrate users and, as a result, they “often work around these restrictions counterproductively” by using easily guessed passwords that could make them vulnerable to hacks.

Current password requirements from online services often frustrate users, leading them to use non-secure passphrases. Montri – stock.adobe.com

Instead of making users remember a jumble of letters, numbers and symbols, length, the organization said, “is a primary factor in characterizing password strength.”

According to the agency, 64-character passwords provide maximum account security, with eight characters being the minimum.

Additionally, NIST advised against arbitrary password changes, saying that passwords can be left unchanged unless there is evidence of a security breach.

The organization also encouraged users to use a password manager and implement two-factor authentication when possible, as strong passwords are not enough to thwart malicious attackers.

However, the NIST warned that neither length nor complexity alone is enough to deter attackers, recommending other security methods in addition to strong passwords. Tanawit – stock.adobe.com

“Many attacks associated with password use are not affected by password complexity and length,” NIST wrote.

“Keystroke logging, phishing, and social engineering attacks are equally effective on lengthy and complex passwords as they are on simple ones.”

Source link

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button