visit
Even as alternative authentication methods become more available,
the password remains the most common authentication method at both the corporate and consumer levels. We enter passwords all day every day: clocking in to work, signing on to a Zoom call, or relaxing with a movie after work. Passwords are ubiquitous and likely to stick around.
Of course, it’s difficult to remember unique passwords for all of your accounts and all of your devices. To make things easier on ourselves,
people choose weak passwords, like ‘password’ or common dictionary words like ‘football’ or ‘summer’ followed by easily-guessed number combinations like ‘2020’. These passwords are extremely
easy for hackers to guess.
2. Password Sharing
In a small , 34% of respondents said they share passwords with coworkers. This is potentially indicative of a broader trend that folks--couples, families, etc.--share passwords. For coworkers, sharing passwords is most often done for convenience of collaboration. But there are many safer ways to do this that employees could be encouraged to use instead. Password sharing causes employers and employees to lose track of who has access to what document, network, and system. It also means people may retain access to sensitive information after leaving a job.3. Password Reuse
Another enduring bad habit is password reuse. It’s a natural experience to find it difficult to remember many unique passwords, but the unfortunate work-around that many people choose is a source of major security issues. This is the error of using the same password (or a near-exact variation) for multiple accounts, across multiple systems. It’s also common for people to use their favored password in both personal and corporate systems.We’re also not as clever as we think, and it’s likely that multiple individuals in a group will come up with the same password. So even if you haven’t personally used a password like ‘administrator123’ at work before, someone else might have done so. That person’s account can be breached and cracked, and then all related accounts are further endangered because passwords are generally ‘reused’ between many users. This wide-scale reusing can lead to major breaches because of the chain reaction. For example, let’s say you use the password ‘S0ccer2020’ for your personal LinkedIn account, your shared family Disney Plus account, and your employee login. Then, let’s say that there is a breach at LinkedIn, and you find out that your credentials have been compromised. No problem, because you can just change your LinkedIn password, right? As you may have surmised: wrong. If you’ve reused your password, it becomes clear that every other account is in danger as well; in fact, it only takes a single compromised password to lead to, in this example, what could be an entire corporate takeover. Hackers exploit the common issue of password reuse all the time by using both credential stuffing and password spraying. . This free and secure service will check against billions of previously compromised passwords to see if yours has already been leaked. Another free option for that works across the organization is a to can scan all of Active Directory.Checking user credentials against a blacklist is also part of the newest , making it an even more applicable step to take within a company’s security protocols.The TL;DR