Randomly generated long passwords, different for every account, should be the bare minimum these days.
Randomly generated phrases with separators, punctuation, and numbers, appear to be the strongest (and easier to type out if you are reading it off a password manager not on the same device). Just a random generated string is actually quite easy for a computer script to brute force, but so much of a pain in the ass for the user! LOL
Length is usually better than complexity!
For example, Bitwarden's password strength test tool says this password would only take 3 years to crack (using today's technology): s#y7s8a63@22
While this one would take centuries: this-is-way-stronger
Which one you would want to enter into your TV set when you have to log into a streaming video service? π
Sure you can blame the user for their failure, but your systems will be less secure because of all your users who are not doing what they are supposed to. So then you have to decide, do we punish these users for their bad password practices or do we implement different practices that are more likely to be followed.
Something you know isnβt the best method to verify identity anyways; as evidenced, it is easy for someone else to learn that information. Using something the user possesses is a much better choice as the user is more likely to be aware of a loss of the object and report the security incident.
That's a user problem, though.
Randomly generated phrases with separators, punctuation, and numbers, appear to be the strongest (and easier to type out if you are reading it off a password manager not on the same device). Just a random generated string is actually quite easy for a computer script to brute force, but so much of a pain in the ass for the user! LOL
Length is usually better than complexity!
For example, Bitwarden's password strength test tool says this password would only take 3 years to crack (using today's technology): s#y7s8a63@22
While this one would take centuries: this-is-way-stronger
Which one you would want to enter into your TV set when you have to log into a streaming video service? π
Sure you can blame the user for their failure, but your systems will be less secure because of all your users who are not doing what they are supposed to. So then you have to decide, do we punish these users for their bad password practices or do we implement different practices that are more likely to be followed.
Something you know isnβt the best method to verify identity anyways; as evidenced, it is easy for someone else to learn that information. Using something the user possesses is a much better choice as the user is more likely to be aware of a loss of the object and report the security incident.