this post was submitted on 27 Jul 2023
1479 points (98.2% liked)

Memes

45585 readers
1306 users here now

Rules:

  1. Be civil and nice.
  2. Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.

founded 5 years ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] meldroc@lemmy.world 101 points 1 year ago (11 children)

And despite security recommendations, too many IT depts still force password resets every 90 days...

And people confronted with this change their password from "p@55w0rd!1" to "p@55w0rd@2". Yep extra-secure!

[–] TheGoldenGod@lemmy.world 27 points 1 year ago

At some point most security recommendations are self-defeating.

[–] chrischryse@lemmy.world 17 points 1 year ago (1 children)

I work in the IT section of a bank and they force a change every 30 days and can only have an 8 character password no more no less 🙃

[–] HurlingDurling@lemm.ee 14 points 1 year ago

Seems like a job for Bobby tables

[–] nomadjoanne@lemmy.world 17 points 1 year ago (2 children)

Ideally we'd all use password managers, but I'm aware 99% of peoole don't. Even with one, it's frankly a pain in the butt to be nagged about changing it. "Man, my passwords are 20 random characters. I don't need yo reset ot unless you've had a breach."

load more comments (2 replies)
[–] AlecSadler@lemmy.world 15 points 1 year ago (2 children)

A job I quit about 6mos ago required monthly changes. It was awful. And, yes, it absolutely led to me just incrementing a number at the end. I knew it was time to quit when I was about to hit double digit numbers.

load more comments (2 replies)
[–] jbloggs777@discuss.tchncs.de 11 points 1 year ago

@278 and going strong, across 7 companies. One time, just to mix things up, I used an exclamation mark instead. It was exhilerating. /s

[–] The_v@lemmy.world 10 points 1 year ago (1 children)

Some IT guys have caught on to this and require 2 digits difference.

So "ThisJobSucks#11" becomes "ThisJobSucks#22"

[–] psilocybin@discuss.tchncs.de 13 points 1 year ago (14 children)

How would they know how many digits changed? They don't store the password in cleartext.

Right?

...

load more comments (14 replies)
[–] Agent641@lemmy.world 8 points 1 year ago (2 children)

{Sitename}+{SaLt}+{yymmdd of password change} easy peasy

[–] Narjah@lemmy.world 9 points 1 year ago

I college we had to change our password every semester. Guess who added the semester number onto the end of their password. Hint: everyone.

Same as a government job that required monthly password changes. Well, at least those people had more security than the post-it note on the monitor people

load more comments (1 replies)
[–] Rusty@lemmy.ca 7 points 1 year ago

Hey, how do you know my password?

[–] Stuka@lemmy.ml 5 points 1 year ago

The worst is when you have a bunch of independent systems that all have their own login info, all configured by the dame IT department, all with different forced reset timers.

[–] tool@r.rosettast0ned.com 5 points 1 year ago (1 children)

And despite security recommendations, too many IT depts still force password resets every 90 days...

It could be for contractual or for insurance reasons. We have some contracts with government agencies that require it, and our cyberinsurance also does. Even though NIST has been recommending for years to do long passphrase + MFA and no reset unless you suspect compromise.

So yeah, the reason behind this might not be just plain incompetence.

load more comments (1 replies)
[–] abraxas@lemmy.ml 4 points 1 year ago

I've had arguments with clients' IT security about this in the past where they demanded forced password resets. Citing NIST controls that insist you should avoid them was apparently insufficient.

[–] FlexibleToast@lemmy.world 47 points 1 year ago (12 children)

Who still isn't using a password manager?

[–] jetsetdorito@lemmy.world 57 points 1 year ago (1 children)

The most infuriating part is when this happens while using a password from a password manager

[–] TheGoldenGod@lemmy.world 15 points 1 year ago (1 children)

The fact this happens is infuriating. 😣

[–] pulverizedcoccyx@lemmy.ca 5 points 1 year ago (2 children)

Then you finally do the password change, go to login and now the new password doesn't work because you copied it to clipboard and overwrote it somehow in that small time frame goddamn shit! I always win+r and put it there until I know everything is all good.

load more comments (2 replies)
[–] Thassodar@lemm.ee 21 points 1 year ago (3 children)

What if I were to tell you my password manager password is the most vulnerable of all?

Nobody would guess it's hunter2.

[–] criticon@lemmy.ca 15 points 1 year ago (1 children)

I only see ******* when you type hunter2

[–] Thassodar@lemm.ee 5 points 1 year ago
[–] jetsetdorito@lemmy.world 12 points 1 year ago (1 children)

You should really upgrade to hunter3

[–] Thassodar@lemm.ee 8 points 1 year ago

But how did you see it? I used the spoiler tag

/s

[–] circuitfarmer@lemmy.sdf.org 5 points 1 year ago (2 children)

Mine is bigboipassword123. Can't dictionary attack it cuz boi isn't in the dictionary.

load more comments (1 replies)
[–] totallynotarobot@lemmy.world 7 points 1 year ago (3 children)

I promise you that does not help.

I suspect a large number of these incidents are due to the password field in the login page allowing fewer characters than the field in the sign up page, so the password gets truncated. A couple of help desk meat shields have confirmed that for me, but mostly I think this because it seems to fix itself if I use a shorter password.

How short, you ask? Who tf knows! They sure as shit won't tell you! Just spend the next 20 minutes trying shit til it works, because you have nothing better to do with your time!

[–] codapine@lemm.ee 6 points 1 year ago (3 children)

My company doesn't tell you what the AD policy is for changing your domain logon password but windows will just tell you that it doesn't meet the policy. What IS the password policy you ask?

Well it's uh... 🤷‍♂️

Try again!

load more comments (3 replies)
load more comments (2 replies)
[–] pulverizedcoccyx@lemmy.ca 5 points 1 year ago (3 children)

My parents. All written down on paper in handy notebooks for anyone that breaks in. Two entire lives and everything in them just there for the taking.

[–] abraxas@lemmy.ml 4 points 1 year ago* (last edited 1 year ago)

If I recall, a few (most) security experts now support written-on-paper passwords. Why? Because it is the solution for users who would otherwise commit far a more egregious security faux pas otherwise.

In most circumstances, it is easier to keep the notebook secure than your wallet, your car, etc. And let's be honest, the list of suspects are REALLY short if someone breaks into your house, opens the third drawer, grabs the notebook and runs. And if it's more than that and somebody ransacks your entire house, I guarantee having to change your passwords is the least of your headaches.

Ultimately, physical compromise is the lowest possible security risk for most people throughout their lives. Yes, it happens. Yes, it sucks. But having your bank password out in the wild with nobody realizing it is possibly far more dangerous.

load more comments (2 replies)
load more comments (8 replies)
[–] 001100010010@lemmy.dbzer0.com 33 points 1 year ago (1 children)
[–] TheGoldenGod@lemmy.world 11 points 1 year ago

If it helps, I think we’re all in this picture at some point lol.

[–] KalloFox34@lemm.ee 11 points 1 year ago (1 children)

And that’s why I generate my passwords randomly.

Thank you Bitwarden.

[–] totallynotarobot@lemmy.world 5 points 1 year ago

So do I. This still happens.

[–] Lucidlethargy@sh.itjust.works 10 points 1 year ago (1 children)

Ahh, so you all also shop at target online, eh?

[–] x4740N@lemmy.world 4 points 1 year ago

I'm guessing this is american target and not Australian target

[–] DaveNa@lemmy.ml 4 points 1 year ago

Why is that? Couldn't find anything on Google.

load more comments
view more: next ›