Five Password-Security Myths Dispelled

Contrary to popular belief among many admins, smart cards and Kerberos can't prevent all forms of password hacking. Organizations should certainly strive to embrace both types of improved authentication, as they defeat many attack classes. But you should know exactly what you are and aren't defeating as you expend resources and efforts in your new authentication projects.

The aforementioned myths are but a sampling of the misinformation out there. Fortunately, there are plenty of defenses you can add to your list of security policies to keep your systems and data safe. For example:

  • Increase the minimum length for end-user passwords to 12 characters -- and 15 characters for admins.
  • Don't enter your password on untrusted computers, and never use the same password for different systems.
  • Disable weak password hashes and authentication protocols, such as LAN Manager and NTLM Version 1.0.
  • Consider two-factor authentication.
  • Sniff out and remove plaintext passwords on your network.
  • Improve end-user education -- including a lesson on phishing -- to prevent password attacks.
  • Keep your software current and patched to ensure the programs contain the latest security fixes and defenses.

The myths I've dispelled here and tips I've offered are just the tip of the iceberg when it come to understanding and preventing password-oriented attacks. Still, they should help in the ongoing fight to keep the bad guys out of your systems.

This story, "Five password-security myths dispelled," was originally published at InfoWorld.com. Follow the latest developments in network security and read more of Roger Grimes' Security Adviser blog at InfoWorld.com.

Subscribe to the Security Watch Newsletter

Comments