Password complexity, does it really matter?

  SplashData recently has released their annual list of the 25 most widely used bad passwords. The blog noted, quote:

    “In SplashData’s fifth annual report, compiled from more than 2 million leaked passwords during the year, some new and longer passwords made their debut – perhaps showing an effort by both websites and web users to be more secure. However, the longer passwords are so simple as to make their extra length virtually worthless as a security measure.”

  The number of leaked passwords in 2015 had been much more than two million. Chances are that the actual number is a lot larger. Just the Ashley Madison security breach in 2015 netted the hacker(s) 34 million passwords. While I don’t doubt the authenticity of SplashData and the top 25 list based on their number, the chances are that the analysis is somewhat skewed.

SplashData does provide some advice on password protection via simple tips like this one, quote:

    “Use passwords or passphrases of twelve characters or more with mixed types of characters”

   Wait… Weren’t most, if not all, leaked passwords related to websites’ security breaches? If they were, what is the difference between the “123456” and the “3pHj1P38JVF4” password? In reality, the difference is nothing. Other than the obvious that the end user will have a hard time remembering the twelve character randomly generated password. Let’s face it, as long as the hacker(s) can download the password database, it does not matter if password complexity is in place or not.

  Information Technology (IT) people can go ahead and ridicule the end users for their choice of passwords. Doing so will result in couple of funny stories, but the jokes are on them. Here’s 2016 and IT people still cannot secure the password databases.

  Despite all of this, it will not stop IT people from requiring the end users to use long and complex passwords, use special characters, include upper and lower case letters, have numerals, different passwords for each account, to not write them down, and to change them frequently. Doing any combination of the aforementioned will not likely matter. No wonder the end users cringe when the IT guys/gals shows up…

  None of the top lists would be possible by simply guessing the password or via social engineering. The number of passwords obtained by these means would not be sufficient for statistical purposes. Let’s not throw the end users under the bus and do what needs to be done. Secure the password databases IT people…