How to Improve Your Password Management

|
|
|
PUBLISHED on
27
July
2022
SUMMARY

One of the long-held beliefs underpinning many a password policy is that forcing a regular password change is a good thing.  After all, by changing our passwords on a regular basis we might be able to stop an attacker taking advantage of a password they may have discovered. However, by forcing users to change their passwords, organisations are unwittingly increasing the probability of poorly constructed, weak passwords being used.

Many organisations require their users to change their passwords on a regular basis e.g., every 30-60 days, meaning that users may need to create a new password 12 times per year.  When coupled with the advice that passwords should be different for each system accessed, this can quickly become impractical and overly burdensome.

Typically, users are asked to make their passwords more complex, made up of random strings of characters, including numbers and special characters such as $, £, &, % making them even more difficult to remember.

What’s the result of frequently changing, complex passwords?  You guessed it... users will either write their passwords down or, more likely, ignore some of the rules.  In order to remember passwords, users will make them as simple and short as possible or very similar to passwords previously used.  These weaknesses can be exploited by an attacker.  The National Cyber Security Centre (NCSC) offers comprehensive guidance relating to passwords, here is a selection of its suggestions:

Educate your staff:

  • Emphasise the risks associated with re-using passwords across home and work accounts
  • Help users to choose passwords that are difficult to guess
  • Provide guidance on the prioritisation of high-value accounts
  • Make your training applicable to users’ work and personal lives.

Reduce your reliance on passwords:

  • Consider alternative means such as single sign-on (SSO), hardware or biometric solutions
  • Use 2 factor authentication (2FA) or multi-factor authentication (MFA) for important accounts and Internet-facing systems.

Implement technical solutions:

  • Account lockout after successive (5-10) failed attempts to protect against brute force attacks
  • Introduce ‘password blacklisting’ to prevent the use of common passwords
  • Use application programming interface (API) throttling to defend against brute force attacks

If you must use a password:

  • In addition the special characters referenced above, consider the use of 3 random words (summerbreezelight (or £Summer#Breeze!Light)
  • Use built in password generators when using password managers
  • Avoid complexity requirements and passwords that are too short
  • Don’t include character ‘capping’ on password lengths.

So, what is URM’s advice?  Our first recommendation is to reduce the reliance on the use of passwords.  Secondly, consider the use of technological solutions wherever possible (SSO, 2FA, MFA).  Biometrics and hardware tokens also reduce reliance on passwords, as can the use of password managers.  

Regular education of your staff to ensure they understand the risks associated with easy to guess passwords, passwords that are too short or similar to ones previously used.  Finally, password blacklists that prohibit the use of commonly used words (Password1, QWERTYUIOP) etc.) will all help to mitigate the threat associated with password usage.  Finally, by limiting the number of incorrect entries before imposing a system lockout/timeout, system administrators may be alerted to repeated unsuccessful attempts to access IT systems.

Do you need any help with ISO 27001 certificate?

URM can help you achieve ISO 27001 certification
Thumbnail of the Blog Illustration
Information Security
Published on
9/5/2025
ISO 27001:2022 - A.5 Organisational Controls (Access Management)

URM’s blog explores why the access controls in ISO 27001 matter, and how to implement each control in full conformance with both the Standard and best practice.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
18/7/2025
ISO 27001:2022 - A.5 Organisational Controls (Business Continuity)

URM’s blog explores the ISO 27001 business continuity controls, why they matter, & how they can be effectively implemented to ensure conformance to the Standard

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
27/7/2022
How do you Identify and Then Manage Your ISMS Scope?

When managing the security of your organisation’s information assets, you will need to consider the scope of what you are doing.

Read more
We used URM as we had a large amount of information to redact for a Court of Protection case and neither had the time nor the knowledge to be able to complete this appropriately. URM were suggested to us and we made contact. They responded very quickly and were able to explain their role, estimated timescales & costings. During the initial consultation, they were very professional and approachable, and certainly had the skills we required. URM’s consultant provided us with details of the work they had completed before & we felt confident to pursue the work with them. We were on a tight deadline for court and URM were confident that they could provide the services we required in a timely manner. The logistics of sending a large amount of confidential documents were easy to navigate and straightforward. We were unable to very accurately gauge how much work was required, however URM’s Team supported us with this and maintained regular contact regarding their progress and addressed any concerns they had. When we needed to contact them, they were prompt with their responses. The work did take longer that envisaged, however that was due to the amount of work that we, as clients, were unable to accurately identify would be required. We did, however, meet the deadline for court. I would certainly use the services of URM again & if possible would work with same team. The services are not cheap, however redacting sensitive information is a skilled task and, therefore, having a professional complete this work is priceless.
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.