Password Protection #netsec

We all hate it when our companies make us change our passwords every 60 days.  But they do it for a reason!  It’s more secure!

With all of the hoopla over the leaked celebrity scandalous pictures, I thought I’d revisit a topic that’s been covered to DEATH, but no one seems to really take the advice of the experts.

Password protection isn’t just in the hands of companies, it’s in the hands of users too.  It’s not just “use long passwords” either.  Hackers with access to fast compute resources can crack 16 character passwords in under an hour using a dictionary brute-force attack.

Stanford’s network admins have a password policy that could be a good idea for remembering easier passwords. (until processors can handle 20 character passwords)

Here are some things companies and employers can do to help secure passwords:

  1. HASH the passwords (with a salt preferably).  NEVER store anything plain text ever.
  2. Encrypt the channels between the password databases and the systems accessing them.
  3. Encrypt the databases themselves
  4. LOCK down access to the password database.
  5. Force the use of a password at LEAST 12 characters long.
  6. Force special character usage
  7. Force numerical character usage
  8. Force multiple uppercase usage
  9. Use a dictionary of your own to DISALLOW words in the dictionary
  10. Use 2 factor authentication for EVERYTHING
  11. Force a password change after 1-2 failures (mentioned in my East-to-West Security blog post)
  12. Force password changes every so often
  13. Remove “stale” users
  14. ENFORCE your password security policy.  (If you see passwords on post-it notes, discipline them!!)
  15. Monitor “unusual” login sources (i.e. Different Countries)
  16. Don’t allow password REUSE
  17. Restrict application access to lowest common setting.  Don’t give users too much power!
  18. Deploy brute-force and intrusion detection systems!
  19. Deploy centralized management servers (RADIUS, TACACS, LDAP)
  20. Deploy Secure Tokens
  21. Regularly change your WiFi access point passwords
  22. Don’t use plain-text applications (Use SCP, SSH, HTTPS, etc)

Here are some things end users can do to secure passwords:

  1. Don’t share your password with ANYONE!!! ANYONE… EVER!! Even if you know them and they’re “trying to help”
  2. Use a different password for every service/login
  3. Never “stay logged in”
  4. Do NOT use the “remember me” or “remember password” feature
  6. DON’T WRITE YOUR PASSWORDS DOWN! (Electronically, e-mail, text, whatever)
  7. Change passwords regularly
  8. If the service allows for 2 Factor Authentication… USE IT!
  9. Be aware of “social engineering”.  Good “social hackers” can guess your passwords after a couple of drinks at a bar.
  10. Don’t use ANY of these 500 passwords. (or ANY remotely similar)
  11. Use phrases that are easy for you to remember, but hard to brute-force (i_l!K3_t0_E/-\t_l@5aGn/-\)
  12. Use the longest password possible
  13. Never enter a password on a website that isn’t encrypted and trusted (that little lock screen)
  14. If you choose to use applications like 1password, ensure they are using 256bit encryption
  15. REPORT anyone asking for your password






Leave a Reply

There aren't any comments at the moment, be the first to start the discussion!