Blog | G5 Cyber Security

Password Re-use Security: What the Studies Say

TL;DR

Yes, there are numerous studies showing password re-use significantly increases risk. Preventing it within a single system is effective, but requires careful implementation. This guide outlines how to do that, covering technical options and practical considerations.

Preventing Password Re-use: A Step-by-Step Guide

  1. Understand the Risk
  • Implement Password History
  • This is the most common and effective method within a single system.

    password sufficient pam_unix.so remember=12 obscure
  • This example remembers the last 12 passwords and obscures them in logs. Adjust ‘remember’ as needed.
  • Password Complexity Rules
  • While not directly preventing re-use, strong complexity rules make it harder to use the same password everywhere.

    minlen = 12
    reject_dictionary = on
  • Password Blacklisting
  • Prevent known compromised passwords from being used.

  • User Education
  • Teach users about the dangers of password re-use.

  • Monitor for Password Spraying Attacks
  • Password spraying attempts to use a few common passwords against many accounts.

  • Consider Multi-Factor Authentication (MFA)
  • Adds an extra layer of security, mitigating the risk even if a password is compromised.

    Further Research

    Search for studies on ‘password re-use statistics’ and ‘credential stuffing attack prevention’. The National Institute of Standards and Technology (NIST) provides guidance on password management.

    Exit mobile version