Virtualization Technology News and Information
Article
RSS
VMblog Expert Interview: Specops Provides Expertise on Current Security and Password Challenges

interview-specops-james 

Recently, Specops Software released its first annual Weak Password Report, an analysis of over 800 million breached passwords.  The findings revealed a lot, including the fact that simply following password security best practices may not be enough in an increasingly volatile cybersecurity landscape.

To learn more, VMblog spoke to Darren James, Head of Internal IT at Specops. 

VMblog:  Are typical password construction best practices - like choosing passwords with a certain amount of characters, symbols, etc. - enough to remain safe in today's volatile cybersecurity landscape?

Darren James:  Absolutely not. Specops recently released our first annual Weak Password Report where we analyzed 800 million breached passwords in order to identify current password security trends, and the findings showed that traditional password construction best practices are no longer enough to protect accounts and keep data secure. For example, 41% of passwords used in attacks are 12 characters or longer and 68% include at least two character types. So, while not using your mother's maiden name or the name of your cat might be a no-brainer (though not for everyone!), you are still not protected even if you add two exclamation points with an underscore.

VMblog:  What can companies do NOW to remain secure?

James:  With some of the most high-profile cybersecurity incidents of the last two years involving passwords, such as last year's Colonial Pipeline breach, it's imperative that organizations implement password policies to block compromised passwords and utilize additional authentication methods to ensure the security of sensitive business data and accounts. I can't stress enough that NOW is the time to really take action. A few additional actions companies can take include continuing to enforce password length requirements - encouraging passphrases rather than simple passwords, implementing user verification at the service desk, and auditing the enterprise environment to highlight password-related vulnerabilities. Multi-factor authentication is also critical to ensure that accounts can't be accessed even if an employee's password is breached.

VMblog:  Despite recommendations, what password bad habits are you still seeing?

James:  Through our analysis of known compromised passwords, it's become obvious that hackers today don't have to go to great lengths to find someone's information - they can find your hometown, the name of your first pet, and where you went to school just from a quick glance at social media. Yet, we still see people using easily accessible information as part of their passwords, in addition to easily guessable passwords like "password123."

Additionally, we see people using the same password across multiple accounts, not just their work but their social media, banking, etc. These passwords are extremely vulnerable when they have been reused across various personal and professional platforms, and tend to follow typical patterns and themes at the point of creation. This makes it more likely that they end up in leaked password dumps which are then used in brute force attacks on corporate networks - because hackers know you're likely to reuse passwords.

VMblog:  It's no surprise that password-related attacks have been on the rise, but despite the publicity of this issue over the last year, why do you think people still fail to choose strong passwords and implement other measures to guard accounts?

James:  There are a multitude of reasons for this, but a primary reason is people tend to have too many passwords to remember across work and personal accounts. Our own research has shown that most users report having to remember at least 11 passwords for work as well as at least 11 passwords at home - a number that makes it impossible for those to all be unique if the person is relying on their memory. Second, I see a lot of IT departments relying on end-user education only rather than choosing tools that help enforce security best practices for them. While an engaging security training program is critical to helping employees recognize potential red flags, it is equally important to have tools in place that enforce cybersecurity protections in a user-friendly manner.

What tools should every business consider to help enforce good password practices? For Active Directory passwords, a 3rd party password filter that helps block weak and compromised passwords. Outside of Active Directory, implementing an enterprise password manager, which can make it easier to generate long, unique, random passwords and eliminate the need for employees to remember a multitude of passwords, is a good idea.  

VMblog:  Are passwords the weakest link in an organization's network or the employees?

James:  The answer is both. People create passwords, so they are only as secure as people make them, and often that means they aren't very secure at all. As far as choosing a "secure" password, we recommend choosing passphrases rather than single words since these are more difficult to guess. But since passphrases can still be reused and leaked, it's important that businesses implement additional safeguards, such as implementing multi-factor authentication and blocking employees from choosing passwords that are known to be compromised. In addition to making businesses more secure, this also lifts the burden off the user by making it easier to choose better passwords.

VMblog:  How have hackers adjusted their tactics to keep up with evolving password requirements?

James:  Password-related attacks have been on the rise for the last two years, with stolen user credentials at the root of several high-profile and disruptive attacks, such as those on Colonial Pipeline, and others. Yet, despite the rise, hackers are still relying largely on the same tactics they've used for years - social engineering and stolen credentials. The pandemic has certainly made some of the most common tactics easier, including social engineering at the help desk. We've seen this happen in the wild in last year's breach of EA Games, in which a group of hackers stole a large amount of data and broke into the company by tricking an employee over Slack to provide a login token.

VMblog:  What other security issues keep you up at night?

James:  Human nature - we are just too trusting! That's why it is so critical for companies to introduce new safeguards to protect all of us from ourselves - things like multi-factor authentication, blocking weak and compromised passwords, and implementing more identity and access controls.

VMblog:  Microsoft and others have recently introduced "passwordless" options to guard accounts. Are passwords going away?

James:  We've been hearing from several tech companies that the passwordless future is already here, and yet passwords are still the most popular form of authentication used for our devices and systems. With that said, could the death of passwords be something on the horizon? Sure, but not for a very, very long time! If we think about it, passwords fundamentally are the easiest way to implement security, the cheapest to develop, and the easiest to use. And, even as other forms of authentication have been introduced - such as facial recognition for phones - passwords are still the backup when those newer methods fail. Passwords may not be perfect, but they've been guarding our accounts and systems for over 60 years and I believe they will continue to do so for the foreseeable future.

##

Published Thursday, April 28, 2022 7:34 AM by David Marshall
Filed under: ,
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<April 2022>
SuMoTuWeThFrSa
272829303112
3456789
10111213141516
17181920212223
24252627282930
1234567