Thursday, May 2, 2024, is World Password Day. Established in 2013, the event is observed on the first Thursday of May with the goal of improving awareness of the importance of creating complex and unique passwords and adopting password best practices to keep sensitive information private and confidential.
Passwords were first used to protect accounts against unauthorized access in computing environments in the 1960s. In 1961, researchers at the Massachusetts Institute of Technology (MIT) started using the Compatible Time-Sharing System (CTSS). The system ran on an IBM 709 and users could access the system through a dumb terminal, with passwords used to prevent unauthorized access to users’ personal files.
The system is widely believed to be the first to use passwords and was also one of the first to experience a password breach. In the mid-1960s, MIT Ph.D. researcher Allan Scherr needed more than his allotted 4-hour CTSS time to run performance simulations he had designed for the computer system. He discovered a way to print out all passwords stored in the system and used the passwords to gain extra time.
Passwords are now the most common way to secure accounts and while passwordless authentication, such as biometric identifiers and single sign-on, are becoming more popular, in the short to medium term passwords are likely to remain the most widely used way of authenticating users and preventing unauthorized account access.
The Importance of Creating Strong Passwords
The use of passwords carries security risks, which World Password Day aims to address. One of the most common ways for hackers to gain access to accounts is to use stolen passwords. Phishing is used to target employees and trick them into disclosing their passwords, either via email, phone (vishing), or text message (SMiShing). Adopting 2-factor authentication will help to stop these attacks from succeeding. According to Microsoft, 2-factor authentication blocks more than 99% of automated attacks on accounts.
Hackers also use brute force tactics to guess weak passwords and take advantage of default credentials that have not been changed. If rate limiting is not implemented to lock accounts after a set number of failed login attempts, weak passwords can be guessed in a fraction of a second. Even strong passwords can be guessed in seconds or minutes if they are not sufficiently long.
In 2020, Hive Systems started publishing charts showing the time it takes for a hacker to brute force a password using a powerful, commercially available computer, and each year the table is updated to account for advances in computing technology. The chart clearly demonstrates the importance of creating strong passwords that include a combination of numbers, symbols, and upper- and lower-case letters and ensuring passwords contain enough characters. We recommend a minimum password length of 14 characters.

How long does it take to hack a password in 2024 – Source Hive Systems
Password Management Shortcuts Weaken Security
Creating and remembering long, complex passwords is difficult for most people, and it is made even harder due to the need to create passwords to protect multiple accounts – A study by NordPass suggests the average person has around 100 passwords. Many people struggle to create and remember more than one strong and unique password, so with so many accounts to secure it is unsurprising that people take shortcuts, but those password management shortcuts significantly weaken password security.
It is common for users to avoid creating unique passwords and they end up reusing the same password for multiple accounts. The problem with this is that if the password is compromised on one platform, either through brute force tactics, a phishing scam, or another method, all other accounts that use that password are at risk. Hackers take advantage of this common bad practice using a technique called credential stuffing. If they obtain a list of usernames and passwords from a data breach, they will attempt to access accounts on other unrelated platforms using those username and password combinations. This method only succeeds if there has been password reuse.
Changing passwords slightly by adding a number or substituting characters when creating new accounts isn’t much more secure, and will leave accounts susceptible to brute force attacks. If a hacker obtains a username and password combination, various permutations of that password will be attempted with that username. Writing down passwords is also a very bad idea.
Many businesses have implemented minimum complexity requirements for passwords, stipulating a minimum password length and composition requirements, yet it is common for employees to take shortcuts to make passwords easier to remember. It is possible to create a password that meets minimum complexity requirements yet is still incredibly weak. ‘Password’ is still one of the most commonly used passwords and it is usually the first one that is attempted when trying to hack an account. ‘P4ssw0rd!’ would meet the password complexity requirements imposed on many platforms, but it is still incredibly weak and offers next to no protection.
Global Password Management Survey Reveals Poor Password Management Practices
The 2024 Global Password Management Survey conducted by password management solution provider Bitwarden ahead of World Password Day confirms that extremely risky password practices are still incredibly common. The survey was conducted on more than 2,400 Internet users in the United States, United Kingdom, Australia, Germany, France, and Japan and asked questions about personal passwords, password habits at work, and the strategies that are adopted for managing passwords.
Despite the risks, 84% of respondents admitted to reusing passwords for multiple accounts, down from 90% in 2022. In 2024, 33% of respondents said they reuse passwords on 1-5 sites, 26% reuse passwords on 6-10 sites, 15% reuse passwords on 11-15 sites, and 11% use the same password to secure more than 15 sites. Password reuse is most common on personal accounts; however, 47% of respondents said they reuse passwords at work very (14%) or somewhat (33%) frequently.
Password manager use is increasing. 32% of respondents said they use a password manager at home, up from 30% last year, but only 30% of respondents said they use a password manager at work. 54% of respondents said they rely on memory to manage passwords at home, which suggests that the passwords they set are easy to remember and therefore not particularly complex. 36% of respondents said they use personal information in their passwords, and 60% said that the personal information they use in their passwords can be found in their social media accounts.
Workplace security habits were rated as generally secure by 53% of respondents; with 37% of respondents admitting to somewhat (31%) or very (6%) risky workplace security habits. Risky security habits were the use of weak or personal information-based passwords (39%), storing work passwords insecurely (35%), not using 2-factor authentication (2FA) or multifactor authentication (MFA) (33%), and sharing passwords insecurely (32%).
Account security can be greatly improved with 2FA/MFA, and while there are strong feelings that the additional authentication makes accessing accounts cumbersome, 2FA/MFA is now being widely adopted. 80% of respondents said they use 2FA for personal accounts, up from 66% in 2023, and only 28% of respondents said they do not use 2FA or MFA at work. Awareness of 2FA and MFA is improving, with only 7% of users saying they are not sure what those terms mean, down from 22% last year. While any form of MFA is better than none, SMS-based MFA is still the most common despite this method being the least secure. 65% of respondents said they used SMS-based MFA at home and 50% said SMS-based MFA was used at work.
2FA/MFA is vital for protecting accounts. In the event of a phishing attack where an employee discloses their password, 2FA/MFA can prevent that password from granting access to the account, thus preventing a costly data breach. However, while any form of 2FA/MFA is better than single-factor authentication, phishing-resistant MFA provides the best protection. Threat actors are now using phishing kits capable of stealing session cookies and MFA codes, thus bypassing MFA.
Password Security and Management Tips
World Password Day 2024 is the perfect time to assess password security and take steps to ensure that all accounts are properly secured with strong and unique passwords, and start following password best practices:
- Ensure a strong, unique password is set for all accounts
- Use a combination of upper- and lower-case letters, numbers, and symbols in passwords
- Use easy-to-remember passphrases rather than passwords, that have a minimum of 14 characters
- Never reuse passwords on multiple accounts
- Don’t use information in passwords that can be found in social media profiles (DOB, spouse or pet name, etc.) or is known to others
- Ensure 2-factor authentication is set up, especially for accounts containing sensitive data
- Use a secure password generator to generate random strings of characters
- Avoid using dictionary words and commonly used passwords
- Use a password manager for creating strong passwords and secure storage, and set a long and complex passphrase for your password vault.
The post World Password Day 2024 – Password Tips and Best Practices appeared first on HIPAA Journal.