![]() ![]() One 2022 study found that 62% of employees share passwords via text or email. Remote working compounds the issue of password misuse. Sharing passwords or writing them down in plain sight are other areas of password misuse borne of having multiple passwords. Reusing passwords is a hack that helps employees cope with the tsunami of passwords used at work and home employees use the same password for different accounts. The result is that many of us use workarounds or ‘hacks.’įinding hacks to make life and work easier is commonplace and understandable for busy people with multiple logins across devices, apps, and other network resources. In addition, as noted above, we must remember many passwords to interact with technology. But the issue is that passwords are more complex to use than they first appear, and inherent usability issues cause security gaps. Passwords are used because they are understandable. Our passwords must be held sacrosanct: the password is the gateway into corporate and personal data, and its compromise leads to various harmful cyber security incidents, including ransomware infection, data exposure, and malware infection of devices and networks. However, imagine creating 70 new passwords using that format, all unique, and then having to remember them all. For example, wE4!*tHokl94! would take 31 years to crack. The time to crack each password is in brackets: information from NordPass.Ī strong password should be unpredictable, composed of a mix of uppercase and lowercase, more than ten characters long, and contain numbers and special characters. Top three most common passwords according to the latest research from DashLane (September 2022): Here is an example of common passwords and how ‘strong’ they are, aka how long it takes to crack them: You can use an online password strength checker to see how long it would take to crack a common password. When cyber security professionals talk about a “strong password” or “password strength,” they are referring to how easy (or hard) it is for a cybercriminal to break the password. This is understandable, as creating strong passwords for sites with varying password policies and then remembering them can cause cognitive overload. Password reuse is a known workaround for multiple passwords. Even when biometrics are used for login, a password or PIN is the fallback recovery when the biometric system fails. The password is synonymous with internet use, so much so that according to Nord researchers, the average number of passwords each of us has to remember is 70-80. Using a password generator to create a secure password is part of a broad approach to securing access to corporate apps, devices, and data. ![]()
0 Comments
Leave a Reply. |