Heart of Texas Network Consultants Blog

Tip of the Week: New Password Recommendations by NIST

Tip of the Week: New Password Recommendations by NIST

Passwords are always a major pain point for businesses, but in some industries, their importance is emphasized more than others. In particular, government-based organizations need to be prepared to keep more secure passwords. While we understand that not all organizations are government-based, there’s something to be said about proper password practices that we can all learn something from.

The United States’ National Institute of Standards and Technology has issued new password recommendations and standards for government officials, and everyone can stand to benefit from at least considering the recommendations--even in the business sector. Some of these might seem a bit odd compared to what professionals typically say about passwords but bear with us. Keep in mind, these recommended practices are new and not supported on all sites and login accounts. Here are just a few of them:

  • Make the Passwords User-Friendly: Above all else, under the regulations of NIST, passwords should be user-friendly and place the burden on the verifier whenever possible. NakedSecurity explains this further by elaborating that forcing best practices upon users doesn’t always help: “Much research has gone into the efficacy of many of our so-called “best practices” and it turns out they don’t help enough to be worth the pain they cause.”
  • Use a Minimum of 8 Characters: NIST’s new guidelines suggest that all passwords have a bare minimum of eight characters. This can include spaces, ASCII characters, and even emojis. The maximum number of characters is also indicated at 64.
  • Cross-check poor password choices: NIST recommends that users stay away from well-known or common passwords, like “password,” “thisisapassword,” etc.

As for some of the things to avoid using, here are some to consider:

  • Composition rules aren’t great: Stop trying to tell your employees what to use in their passwords. Instead, encourage users to use passphrases that are long and alphanumeric in nature.
  • Ditch password hints: This is one you might not have heard of. NIST asks that password hints be removed, as anyone trying to break into an account can use their knowledge of the target to overcome this barrier and change a password (or find out the current one). The same can be said for knowledge-based authentication involving questions about the user’s personal life.
  • No more password expiration: This goes back to the “user-friendly” aspect of passwords mentioned earlier. The only time passwords should be reset is if they are forgotten, phished, or stolen.

Overall, NIST wants to try and help make passwords less of a pain for users while still maintaining a similar level of security. What are your thoughts on some of these new standards? Let us know in the comments.

7 Tips to Take Control of Your PII
3 Data Recovery Issues to Consider


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, April 23 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Artificial Intelligence Cost Management Health Information Technology Printer Malware Networking Hardware Lithium-ion battery Facebook Communication Application Information PowerPoint Managed IT Services User Tips Automation Mobile Devices Data Security Antivirus Search Cybersecurity Office Laptop IT Support Windows Users Software Hackers Business Tip of the Week BYOD Going Green Data Backup Apps User Error USB Hard Drives Encryption Update Word Efficiency Windows 10 Managed Service Provider Chrome Upgrade Best Practice Employer-Employee Relationship Windows 8 Computers Gadgets Data Recovery Shortcut Backup Google Drive Passwords Alert Quick Tips Education Government Privacy Social Media Mobile Office Windows 10 Law Enforcement Hacking Saving Money Operating System Small Business Outsourced IT Bandwidth Password Virtualization Gmail Big Data Ransomware Mobile Device Management Network Security Social Networking History Data Management Office Tips Remote Computing Browser Cybercrime Email Smartphones Save Money Hosted Solutions Cloud Mobile Computing Google Collaboration OneNote BDR Internet of Things Social Holiday Internet Computer Proactive IT Innovation Wireless Technology Miscellaneous Applications Unsupported Software Data Outlook IT Support iPhone App Unified Threat Management Business Management Wireless Risk Management IT Services Mobility Technology Productivity Vulnerability Analytics Money Office 365 Network Avoiding Downtime Best Practices Microsoft Office WiFi Two-factor Authentication Router Tech Support communications Business Computing Microsoft Tablet Disaster Recovery Productivity Smartphone Android Humor Tech Term Current Events Cloud Computing Bring Your Own Device Workplace Tips Wi-Fi Augmented Reality VoIP Spam Vendor Management Maintenance Marketing Server Security Phishing Telephone Systems Business Continuity The Internet of Things Customer Relationship Management Managed IT Services