How Often Do I Need to Change My Password?

How Often Do I Need to Change My Password?

Cybersecurity
For decades, the conventional wisdom of “periodically changing” your login password stood firm.  Concerns about passwords being stolen or discovered and threat actors gaining access to your valuable information caused this to be true and necessary.  However, more recently, the conversation has been expanded and the “rules” have changed. You may have read information from the National Institute of Standards and Technology (NIST) that says changing passwords is not only no longer necessary, but could be harmful leading to the use of simple or slightly varied passwords.  That comes with some caveats about how you are creating  your passwords and how you are securing them.

Let’s start by looking at best practice password hygiene.

  • Passwords should be at least 16 characters in length. This will not only make them near impossible to crack with a password cracking tool, but will also prevent them from being stored in a browser (which you should never do).
  • Passwords should be complex in nature. This means that they should include numbers, lower case letters, upper case letter, and special characters.  The easiest way to achieve this is by using a password manager that will generate the passwords for you and store them for future use so you never need to type them.
  • Multi Factor Authentication should be used for all systems that you log in to. This means that even if someone did get your password, they would not be able to login to the system without the second factor.
  • Password should be used for one and only one application. Reusing passwords increases the possibility of multiple systems being compromised if a single password is stolen.
If you are following all these practices, then it is not necessary to have an arbitrary periodic change of your passwords unless you are subject to a compliance which requires you to do so or using a system which requires it.

You should be sure to change your password in the following cases:

  • After a breach of your password
  • After using a public Wi-Fi system
  • After logging into your accounts from someone else’s computer
  • If it has been a while since you have logged into an account
Password hygiene is critical for the security of your data and systems.  Following these guidelines can help you protect your systems and not require you to change your passwords every 30-90 days as used to be the standard.

Recent Posts

a sleek, modern office conference room is illuminated by soft overhead lights, showcasing a large digital screen displaying complex cybersecurity data and regulations, while professionals engage in an animated discussion around a polished glass table.

Cybersecurity Regulations Impacting Businesses Across Industries

Cybersecurity Regulations Every Business Must Know In today’s digital landscape, businesses must navigate a complex web of cybersecurity regulations. A staggering 60% of small companies go out of business within six months of a cyberattack, highlighting the urgent need to understand compliance requirements. This article will explore foundational data protection

a focused business professional analyzes cybersecurity data on a sleek monitor in a modern office, surrounded by digital security charts and glowing screens, emphasizing the critical importance of risk assessment for safeguarding the enterprise.

Understanding Why Cybersecurity Risk Assessment Matters Today

Why Cybersecurity Risk Assessment Matters for Your Business In today’s digital landscape, many businesses underestimate the importance of cybersecurity risk assessments. With cyber threats becoming more sophisticated, understanding your specific vulnerabilities is essential. This article will discuss how effective risk assessments can safeguard sensitive information, ensure compliance with regulations, and

a polished conference room with a large, sleek table, surrounded by engaged professionals discussing the implications of cmmc changes, illuminated by dynamic overhead lights and showcasing a digital presentation displaying key points on a modern screen.

How CMMC Changes Affect Your Business Protocols

CMMC Changes: What Do They Mean for Your Business? Understanding the changes in the Cybersecurity Maturity Model Certification (CMMC) is crucial for businesses aiming to secure government contracts. The latest updates may seem daunting, but they provide clear guidelines to enhance cybersecurity protocols. This article will explore key modifications, assess

a tense corporate boardroom meeting, featuring a looming digital compliance checklist projected on the screen, as executives attentively discuss the critical consequences of neglecting cmmc consultancy.

The Risks Your Business Faces When Skipping CMMC Compliance Help

Top Risks Your Business Faces by Skipping a CMMC Consultant for Compliance Navigating the CMMC compliance landscape can be challenging for many businesses. Skipping the expertise of a CMMC consultant poses significant risks, such as failing assessments, losing eligibility for Department of Defense contracts, and increasing vulnerability to cybersecurity threats.