Complicated passwords may not be as effective as you think

Complicated passwords may not be as effective as you think

Complicated passwords may not be as effective as you think

Author: Brooke Kato
Published on: 2025-01-02 14:39:30
Source: Latest Technology News and Product Reviews | New York Post

Disclaimer:All rights are owned by the respective creators. No copyright infringement is intended.


Have we finally cracked the code on password security?

A recent update to password best practices from the National Institute of Standards and Technology revealed that longer login credentials indeed boost account security more than shorter, more complex ones — but it’s not all it’s cracked up to be.

Historically, sites have required complicated passwords with a mix of alphanumeric characters and symbols.

Still, the NIST found that “the benefit of such rules is less significant than initially thought” and places a “severe” burden on users’ memory.

The NIST recently released updated password guidelines emphasizing length over complexity. jamdesign – stock.adobe.com

“Humans have a limited ability to memorize complex, arbitrary secrets, so they often choose passwords that can be easily guessed,” the NIST wrote in the report, adding that, in return, “online services have introduced rules to increase the complexity of these passwords.”

Those rules can frustrate users and, as a result, they “often work around these restrictions counterproductively” by using easily guessed passwords that could make them vulnerable to hacks.

Current password requirements from online services often frustrate users, leading them to use non-secure passphrases. Montri – stock.adobe.com

Instead of making users remember a jumble of letters, numbers and symbols, length, the organization said, “is a primary factor in characterizing password strength.”

According to the agency, 64-character passwords provide maximum account security, with eight characters being the minimum.

Additionally, NIST advised against arbitrary password changes, saying that passwords can be left unchanged unless there is evidence of a security breach.

The organization also encouraged users to use a password manager and implement two-factor authentication when possible, as strong passwords are not enough to thwart malicious attackers.

However, the NIST warned that neither length nor complexity alone is enough to deter attackers, recommending other security methods in addition to strong passwords. Tanawit – stock.adobe.com

“Many attacks associated with password use are not affected by password complexity and length,” NIST wrote.

“Keystroke logging, phishing, and social engineering attacks are equally effective on lengthy and complex passwords as they are on simple ones.”


Disclaimer: All rights are owned by the respective creators. No copyright infringement is intended.

Leave a Reply

Your email address will not be published. Required fields are marked *

Secured By miniOrange