World Password Day has historically served as a reminder for users to update weak or old passwords to ensure the security of personal and corporate information. But as cyber threats continue to evolve and bad actors develop new attack techniques, a good cybersecurity posture requires more than just a strong password to avoid compromise.

This is especially true as employees increasingly shift to remote work and no longer have the same level of onsite IT and security support to help them. 

How Do Cybercriminals Commonly Compromise Passwords?

One of the most important parts of avoiding compromise is understanding how cybercriminals may attempt to gain access to your critical data. Attack techniques continue to evolve and become more sophisticated, giving cybercriminals a vast toolkit to use to exploit users. Here are some techniques to look out for:

  • Social engineering attacks: Attacks such as phishing through emails and texts, where users are tricked into providing their credentials, clicking on malicious links or attachments, or going to malicious websites.
  • Dictionary attacks: Attacker uses a list of common words, called the dictionary to try to gain access to passwords in anticipation that people have used common words or short passwords. Their technique also includes adding numbers before and/or after the common words to account for people thinking that simply adding numbers before and/or after makes the password more complex to guess.
  • Brute force Attack: An approach in which adversaries randomly generate passwords and character sets to guess repeatedly at passwords and to check them against an available cryptographic hash of the password. 
  • Password Spraying: A form of brute force attack that targets multiple accounts. In a traditional brute force attack, adversaries try multiple guesses of the password on a single account that often leads to account lockout. With password spraying, the adversary only tries a few of the most common passwords against multiple user accounts, trying to identify that one person who is using a default or easy-to-guess password and thus avoiding the account lockout scenario.
  • Key logging attack: By installing key logging software on the victim’s machine through usually some form of email phishing attack, the adversary can capture the key strokes of the victim to capture their username and passwords for their various accounts.
  • Traffic Interception: Criminals use software like packet sniffers to monitor and capture the network traffic that contains password information. If the traffic is unencrypted or using weak encryption algorithms, then capturing the passwords becomes even easier.
  • Man-in-the-middle: In this scenario, the adversary inserts themselves in the middle of the user and the intended website or application, usually by impersonate that website or application. The adversary then captures the username and password that the user enters into the fake site. Often email phishing attacks lead the unsuspecting victims to these fake sites.

How Can Users Prevent Passwords from Being Compromised?

Users can adopt a number of tactics to ensure bad actors cannot compromise their personal information through the techniques above. These should include: strong passwords, multi-factor authentication, and single sign-on capabilities. In addition to these, a strong cybersecurity education is critical to protect yourself, your family, and your employer from compromise.

Creating a Strong Password

It is important to develop passwords that are impossible to forget and difficult to guess, even for a person that may know intimate details of your life like the name of the street you grew up on or the name of your first dog. 

Though it may seem compelling to add numbers and special characters to common words as a way to develop a strong password, cybercriminals can leverage a number of attack techniques to crack this. 

Avoid using the following in any password:

  • Birthdays
  • Phone numbers
  • Company information
  • Names including movies and sports teams
  • Simple obfuscation of a common word (“P@$$w0rd”)

Instead, use these password best practices to secure your information:

  • Leverage unlikely or seemingly random combinations of uppercase and lowercase letters, numbers and symbols, and make sure your passwords are at least ten characters long.
  • Do not use the same password for multiple accounts, this increases the amount of information a cybercriminal can access if they are able to compromise your password. 
  • Change your password every three months to decrease the likelihood that your account will be compromised.
  • Use a password manager to generate unique, long, complex, easily changed passwords for all online accounts and the secure encrypted storage of those passwords either through a local or cloud-based vault.  This will make it easier for you to ensure you are using the strongest passwords possible, as you will only need to memorize the password to your password locker.

Additional Authentication and Protection Measures Users Should Take

A single line of defense is no longer effective at keeping advanced cyberattacks at bay. To truly ensure a strong security posture, multiple tactics are required. Consider the following: 

  • Multi-factor authentication (MFA): Multi-factor authentication confirms the identity of users by adding an additional step to the authentication process, whether it is through physical or mobile application-based tokens. This ensures that even if a password is compromised, bad actors cannot access the information. 
  • Single Sign-On (SSO): Single sign-on allows users to leverage a single, secure username and password across several applications within an organization. 
  • Cybersecurity Training and Education: As cyber threats evolve and bad actors develop new techniques to target individuals, users must remain cyber aware and stay up to date on the state of the threat landscape. Free training courses like Fortinet’s Network Security Expert (NSE) 1 and NSE 2 can help educate individuals of any age about how to keep themselves, and their organization, safe. In addition, Fortinet introduced additional free cybersecurity courses further building on Fortinet’s existing efforts to address the cyber skills gap. 

As current events force individuals to increase the amount of time they spend online for work, e-learning and communicating with family and friends and cybercriminals ramp up attacks targeting these users, it is important to perform a security posture check across all accounts—updating weak and outdated passwords as needed.

Find out more about Fortinet’s NSE Institute programs, including the Network Security Expert programNetwork Security Academy program and FortiVet program, which provide critical cybersecurity training and education to help solve the cyber skills gap and prepare the cybersecurity workforce of tomorrow.

Find out how Fortinet’s Security Fabric delivers broad, integrated, and automated protection across an organization’s entire digital attack surface from IoT to the edge, network core and to multi-clouds.

Find out how Echoenergia and New Zealand Red Cross used Fortinet’s Security Fabric for protection from the network edge to core.

Sourced from Fortinet

Recommended Posts