This practice is not recommended anymore, yet still found in many enterprises.

  • NastyNative@mander.xyz
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 months ago

    This 90 days password change BS, is the worst security risk there is. Do you know how many people have Summer2024 as their work computer password because of this system? too damn many! Not to mention the problem it creates for older folks who have a hard time with the change and most times end up locking them selves out. It creates far more chaos than anything secure, which I have been explaining to my company and they still enforce it for their clients.

    • ByteOnBikes@slrpnk.net
      link
      fedilink
      arrow-up
      0
      ·
      3 months ago

      Summer2024 is their password? Jeez. What a idiot.

      Mine is a proper set of lowercase and uppercase characters, numbers, and symbols, written in a post-it note and taped to my laptop.

    • DefederateLemmyMl@feddit.nl
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      3 months ago

      It’s often due to the security department following outdated standards. Nowadays NIST recommends the following:

      Verifiers SHOULD NOT impose other composition rules (e.g., requiring mixtures of different character types or prohibiting consecutively repeated characters) for memorized secrets. Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically). However, verifiers SHALL force a change if there is evidence of compromise of the authenticator.

      Source: https://pages.nist.gov/800-63-3/sp800-63b.html

      That said, the company I work for violates all of the above rules …