Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

OpenAI’s Atlas is more focused on ChatGPT than the web

Amazon plans to buy thousands of pedal-assist cargo vehicles from Rivian spinoff

Rivian spinoff also reveals $4,500 high-end modular electric bike

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Why you need to exchange passwords and passphrases
Identity

Why you need to exchange passwords and passphrases

userBy userOctober 22, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 22, 2025hacker newsData Breach/Enterprise Security

This advice hasn’t changed for decades. Use a complex password that includes uppercase and lowercase letters, numbers, and symbols. The idea is to make it difficult for hackers to crack passwords using brute force techniques. However, more recent guidance indicates that the focus should be on password length rather than password complexity. Length is a more important security factor, and passphrases are the easiest way to force users to create (and remember) long passwords.

important mathematics

When an attacker steals a password hash from a breach, they perform a brute force attack by hashing millions of guesses per second until something matches. The time this takes depends on how many possible combinations there are.

A traditional 8-character “complex” password (P@ssw0rd!) has approximately 218 trillion combinations. Sounds impressive until you realize that modern GPU setups allow you to test these combinations in months instead of years. If you increase this to 16 characters using only lowercase letters, you’ll see 26^16 combinations, billions of times more difficult to decipher.

This is the effective entropy, or the actual randomness that the attacker has to deal with. Stringing three or four random common words together (“carpet-static-pretzel-invoke”) yields far more entropy than cramming symbols into a short string. And users can actually recall them.

Why passphrases are a win all around

The case of passphrases is not theoretical, but operational.

Fewer resets. When passwords are memorable, users stop writing them on post-it notes or reusing similar variations across accounts. The reduction in help desk tickets alone should justify the change.

Increases attack resistance. Attackers optimize for patterns. Test words in the dictionary using common substitutions (@ for a, 0 for o). Because that’s what people do. A four-word passphrase completely avoids these patterns, but only if the words are truly random and unrelated.

Compliant with current guidance. NIST has made it clear that it favors length over forced complexity. The traditional 8 character minimum should really be a thing of the past.

There’s one rule worth following

Stop managing 47 password requirements. Give your users one clear instruction.

Choose 3-4 unrelated common words and mark them with punctuation marks. Avoid song lyrics, proper names, and famous phrases. Do not reuse between accounts.

Example: mango-glacier-laptop-furnace or cricket.highway.mustard.piano

that’s it. There are no required capital letters, no required symbols, and no complex theater. Just length and randomness.

Deploy without confusion

Authentication changes can cause resistance. Here’s how to minimize friction:

Start with a pilot group of 50 to 100 users from different departments. Give them new guidance and monitor (but don’t force) them for two weeks. Be aware of patterns: Are people using pop culture phrases as defaults? Do they consistently meet minimum length requirements?

Then move your entire organization to alert-only mode. If the new passphrase is weak or compromised, the user is alerted but not blocked. This allows you to increase awareness without creating support bottlenecks.

Apply only after measuring:

Passphrase adoption rates Reduced help desk resets Blocked password hits from blocklist User-reported issues

Track these as KPIs. It will tell you if this is working better than the old policy.

Continue to use appropriate policy tools

Three updates to Active Directory password policies are required to properly support passphrases.

Increase the minimum length. Change from 8 characters to 14 or more characters. This accommodates passphrases without causing problems for users who still prefer traditional passwords. Removes forced complexity checking. Stop asking for capital letters, numbers, and symbols. The length reduces user effort and improves security. Block compromised credentials. This is non-negotiable. Even the strongest passphrase is useless if it has already been compromised. Policies require checking submissions against a list of known infringers in real time.

Self-service password reset (SSPR) can help you during migration. Users can securely update their credentials whenever they want, so your help desk isn’t a bottleneck.

Password auditing provides visibility into adoption rates. You can identify accounts that still use short passwords or common patterns and target those users with additional guidance.

Tools like Specops Password Policy handle all three functions: extending policy minimums, blocking over 4 billion compromised passwords, and integrating with SSPR workflows. Policy updates are synced to Active Directory and Azure AD without additional infrastructure, and blocklists are updated daily as new breaches occur.

what actually happens

Imagine that the policy requires 15 characters, but all complexity rules are removed. The user creates an unsall-coaster-fountain-sketch the next time they change their password. Tools like Specops Password Policy check it against compromised password databases. This is clean. It has four concrete images linked together so users remember it without using a password manager. We don’t reuse it because we know it’s unique to this account.

After 6 months, there are no reset requests. No more post-it notes, no more calling the help desk because you accidentally found a symbol. Nothing innovative. Just simple and effective.

The security you really need

Passphrases are not a silver bullet. MFA remains important. Monitoring for compromised credentials remains important. But if you’re spending resources changing password policies, you should be spending those resources on increasing minimum values, simplifying rules, and actually protecting against credential compromise.

Attackers still steal hashes and perform offline brute force attacks. What has changed is our understanding of what actually slows us down. So your next password policy should reflect that. Interested in trying it out? Schedule a live demo of Specops Password Policies.

Was this article interesting? This article is a contribution from one of our valued partners. Follow us on Google News, Twitter, and LinkedIn to read more exclusive content from us.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleResearchers use Neursite and NeuralExecutor malware to identify PassiveNeuron APT
Next Article Plants self-organize in a ‘hidden order’ that mirrors patterns found in nature
user
  • Website

Related Posts

Iran-linked Muddy Water targets over 100 organizations in global espionage campaign

October 22, 2025

Ukraine aid group targeted through fake Zoom meetings and weaponized PDF files

October 22, 2025

Weeks after Microsoft’s July patch, Chinese attackers exploit ToolShell SharePoint flaw

October 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

OpenAI’s Atlas is more focused on ChatGPT than the web

Amazon plans to buy thousands of pedal-assist cargo vehicles from Rivian spinoff

Rivian spinoff also reveals $4,500 high-end modular electric bike

Apple admits it has removed controversial dating apps Tea and TeaOnHer from the App Store

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.