6 Password Policy Management Best Practices for a more secure IT environment

<span style=”font-weight: 400;”>Remote working has impacted the world of cybersecurity in multiple ways. Remote workers are often not protected by enterprise-level security and so are more prone to cyberattack. The FBI reported a 300% increase in cybercrimes since the pandemic began, and remote work has increased the average cost of a data breach substantially. </span>

<span style=”font-weight: 400;”>Employees working from home are also distracted – </span>

<span style=”font-weight: 400;”>“47% of remote workers cited distraction as the reason for falling for a cyberattack.”</span>

<span style=”font-weight: 400;”>In other words, </span><span style=”font-weight: 400;”>if you do not have a plan in place to mitigate these risks</span><span style=”font-weight: 400;”>, you are setting yourself up for a potentially devastating cybersecurity breach.</span>

<span style=”font-weight: 400;”>One simple way to protect your organization from breaches is to apply a strong password policy at all levels of the organization, and enforce it by implementing a secure password policy management solution (PPM).</span>

<span style=”font-weight: 400;”>Here are some password policy best practices you may find useful.</span>
<h3><span style=”font-weight: 400;”>1. Increase password length and strength</span></h3>
<span style=”font-weight: 400;”>Brute force attacks try all possible combinations of characters to arrive at the password. A 6 string password with only upper or lower case letters can be cracked in 8 seconds. An 18 character password with upper and lower case letters, numbers and symbols can take 1 quintillion years to crack! By adding a special character, combining both upper and lower case letters or adding numbers, encryption can be much more secure.</span>

<img class=”aligncenter size-full wp-image-1010″ src=”https://www.akku.work/blog/wp-content/uploads/2021/07/image16.png” alt=”” width=”1195″ height=”635″ />

<i><span style=”font-weight: 400;”>Image Credit: </span></i><a href=”https://www.ghacks.net/2012/04/07/how-secure-is-your-password/”><i><span style=”font-weight: 400;”>ghacks.net</span></i></a>

<span style=”font-weight: 400;”>The full strength of the Advanced Encryption Standard (AES) comes to bear when users create passwords of 32 characters for 128-bit encryption and 64 characters for 256-bit encryption. However, passwords of around 10 characters are strong enough for most applications.</span>
<h3><span style=”font-weight: 400;”>2. Simplify as much as possible</span></h3>
<span style=”font-weight: 400;”>A password made of only numbers has 10 options for each character in the string, one made of numbers and letters has 36 options, and if you include special characters that adds another 32 possible characters for each spot in the string. </span><span style=”font-weight: 400;”>This makes it more challenging for brute force attacks to be successful.</span><span style=”font-weight: 400;”> Complexity in terms of the kind of characters that can be used in the password is, therefore, an advantage.</span>

<span style=”font-weight: 400;”>However, do not mandate the usage of these different kinds of characters. This can lead to frustration and reuse of the same password with minor character substitutions (P@ssword or Passw0rd, for example). This is especially the case when the policy also demands frequent changes of password. If the old password is compromised, such minor variations will be relatively easy to guess, too.</span>

<span style=”font-weight: 400;”>To mitigate this risk, don’t mandate the use of special characters and reduce the frequency of mandatory password reset to approximately once a year. A long password using only lowercase letters is more secure than a short one which is a variant of an older password.</span>
<h3><span style=”font-weight: 400;”>3. Do not allow password reuse</span></h3>
<span style=”font-weight: 400;”>Do not allow reuse of earlier passwords during periodic password reset to increase security. Train your staff not to use minor variations of their earlier passwords, and instead look for completely different passwords.</span>

<span style=”font-weight: 400;”>Also train staff on the risks of reusing passwords across home and work accounts. Password reuse results in a huge surge in credential stuffing attacks. If any service is compromised and your password and username are stolen, hackers could use the same credentials to try and hack your other accounts. Each account must therefore use unique credentials to maintain security.</span>
<h3><span style=”font-weight: 400;”>4. Reinforce passwords using multi-factor authentication (MFA)</span></h3>
<span style=”font-weight: 400;”>Multi-factor authentication uses a combination of things you know, such as a password or PIN; things you have, such as a badge or smartphone; and things you are, such as biometric data, to authenticate your right to access a particular system, data or application.</span>

<span style=”font-weight: 400;”>Enabling MFA ensures that even if a password is stolen, the system is not compromised.</span>
<h3><span style=”font-weight: 400;”>5. Use a secure password manager</span></h3>
<span style=”font-weight: 400;”>Many users find it difficult to remember their passwords for multiple online services, and so either use a single password for all, or, worse, save all their passwords to an unreliable password manager. </span>

<span style=”font-weight: 400;”>If you do opt for a password manager, choose one that is highly secure, in order to mitigate the risk involved. Most IAM solutions will include a password manager or, with Single Sign-on, completely do away with the need for multiple passwords. A single secure password is enough to log on to your IAM and access your applications and data.</span>
<h3><span style=”font-weight: 400;”>6. Use an IAM application for Password Policy Management (PPM)</span></h3>
<span style=”font-weight: 400;”>It’s one thing to lay down rules for password policy across the organization. It’s quite another to enforce the policy. An Identity Access Management (IAM) application can help you ensure that all your users consistently comply with a high standard of security while setting their passwords, without the need for a separate password policy enforcement tool.</span>

<span style=”font-weight: 400;”>Administrators can customize and define password policy for all users in the organization. You can also specify upon whom the policy should be enforced, based on the users’ access level. Password policies can of course also be defined as blanket rules.</span>

<span style=”font-weight: 400;”>A common perception is that the risks associated with breached passwords do not apply to your organization as you have secure systems. But your organization’s data security is only as strong as the weakest password of your users. In 2020, 770 million credential stuffing attacks occurred. That means that if your employee’s personal passwords are compromised, and they have reused the same password at work, your data is compromised too. Worse, 17% of all sensitive files are accessible to all employees, and about 60% of companies have over 500 accounts with non-expiring passwords.</span>

<i><span style=”font-weight: 400;”>Implementing a robust Identity and Access Management (IAM) solution brings you several steps closer to protecting your user credentials and corporate data. Worldwide, cybercrime costs will hit $6 trillion annually this year. Don’t let your organization succumb to a Data breach! With these simple steps, you can stay safe with multiple layers of data protection. Allow our team at Akku to help you secure your systems.</span></i>

Aravindh Ramachandran

Aravindh is the Chief Operating Officer at Akku, where he drives customer success and ensures world-class service delivery. With a sharp focus on outcomes and a passion for maximizing business value, he plays a central role in scaling Akku’s growth and strengthening customer relationships. Before Akku, Aravindh served as COO of CloudNow Technologies and Hornbill FX, and has held leadership roles at KrissCo, Incite Firebrand Consulting, and D&Z. He began his career in brand strategy and corporate communications, later expanding his expertise to operations, technology services, and consulting. His entrepreneurial journey, which started while still in college, has shaped his ability to guide companies through periods of transformation and exponential growth.

Recent Posts

How Mobile Device Management is Powering the Future of Remote Work

When businesses move to remote operations, teams tend to prioritize fast internet and collaboration tools. However, problems arise when sensitive…

1 month ago

How to Implement Privileged Access Management (PAM) in Cloud and Hybrid Environments

Privileged accounts are an under-recognized center of risk in modern IT. The move to cloud and hybrid environments multiplies the…

2 months ago

Group Policy Object (GPO) Management, and How Akku GPO Manager Simplifies It

How do enterprises keep thousands of users and devices aligned with the same security and compliance standards? The answer often…

3 months ago

IAM Using SSO and Federated Identity Management

Have you ever wondered how large organizations let employees access multiple applications securely without juggling dozens of passwords? The answer…

3 months ago

How to Secure BYOD Devices in a Hybrid Workplace Using Akku Mobile Device Manager

Are your employees’ personal devices putting your organization’s data at risk? With hybrid work becoming the norm, people are accessing…

3 months ago

Group Policy Object (GPO) Management: What It Is and Why Modern Enterprises Need It

How do enterprises ensure that thousands of users and devices follow the same security rules and IT policies without manual…

3 months ago