<img src="https://ws.zoominfo.com/pixel/4CagHYMZMRWAjWFEK36G" width="1" height="1" style="display: none;">
Request Demo

Businesses depend on protecting confidential information to establish a reputation of dependability in the market and build trusting relationships with their customers and clients. However, the lack of training and insight about password protection can prevent firms from optimizing their cybersecurity. 

The Verizon Data Breach Investigations Report revealed that compromised passwords cause 81% of breaches via hacking. Most employees and individuals curate their credentials by choosing familiar passwords, such as birthdays, pet names, phone numbers, etc. Guessable passwords enable hackers to access confidential files easily. 

However, technical issues are not the only factors that lead to a compromised password. Research shows that 98% of cyberattacks in 2021 were courtesy of social engineering, the psychological manipulation carried out to extract confidential information. Moreover, new employees at a firm are more at-risk for socially engineered cyberattacks, as 60% of IT experts deem recruits to be a vulnerability in data protection. 

Cyberattacks and data breaches can significantly affect a company’s operations. Often, businesses have to spend a large sum of money to recover confidential data following a breach. Other financial damages include the loss of potential income, delayed operations, and penalty charges for compromising customer data. 

In addition to financial loss, firms also suffer reputational damage, resulting in the loss of sales by driving existing and new customers away. Moreover, companies with negative reputations can also become unattractive for new candidates, making it more difficult for businesses to recruit new talent. 

In order to avoid reputational and financial loss, businesses must set advanced security measures, such as setting strong password guidelines to ensure data protection. The National Institute of Standards and Technology (NIST) has developed several password guidelines to increase cybersecurity drastically. Although NIST developed these guidelines for federal agencies, private businesses and enterprises can also use these strategies to maximize their online security.

This guide will provide you with a general overview of the NIST password guidelines so that you can take your business’s security to the next level. 

NIST Password Guidelines 

The National Institute of Standards and Technology (NIST) created a set of guidelines to set robust passwords that are easy to use and difficult to guess. The institution carries out regular research and makes subsequent updates to ensure the password-setting criteria holds the ability to combat the new and sophisticated hacking and data breaching techniques. NIST initially published the guidelines in 2017 but later updated the document in 2020. 

The NIST guidelines emphasize several factors, including password quality, social behavior, authentication, implementation, storage, and updating of passwords. Let’s look at a few password security standards laid down by NIST:

Turn On the ‘Show Password’ Settings

Contrary to popular belief, NIST encourages employees to turn on the ‘show password’ setting when typing in their password. As the password is entered, the likelihood of another individual copying the password is very low. However, making an error in typing the password and assuming the password is incorrect can compel the employee to move forward with the password reset process. In doing so, the individual can trigger the likelihood of potential data exposure. 

Make Use Of Password Managers 

The NIST password guidelines 2020 encourage companies to leverage password managers to assist employees and stakeholders in generating robust passwords using encryption technologies. By taking this initiative, businesses can eliminate the chances of human error. Additionally, organizations that provide their teams with access to a password manager can permit the automated generation of long, strong passwords and passphrases that are difficult to crack. 

Integrate Security in Password Storage Methods

The NIST standards also recommend that organizations immediately remove outdated user-generated passwords from the server. This initiative uses zero-knowledge password protocol or zeroization. The NIST guidelines further urge organizations to use hashing or salting strategies for stored passwords. Hashing refers to how the command maps the arbitrary-length bit string to a fixed-length bit string. 

Organizations implementing the hashing strategy can store password data while ensuring the protection of the passwords database from potential hackers. Instead, the hacking attempt would provide the hackers with a list of hashes that take longer to crack and grant organizations more time to recover or take preventative measures. 

On the other hand, salting refers to the technique in which a unique marker is assigned to each password. Therefore, even if two employees use the same common password, different hashes are appointed to each password. 

Assign Two-Factor or Multiple-Factor Authentication

It’s possible to amplify password protection with a two-factor or multi-factor authentication (MFA) system. This approach requires the employees to enter their password and pass a security test to log into their account. The security test can include multiple identification approaches, biometrics, facial recognition, or email confirmation. This authentication tactic is supported by the NIST guidelines, as it can significantly increase password security. Unfortunately, the guidelines do not specify approved MFA sources. 

However, NIST has debarred the use of SMS messages for two-factor authentication. The updated guidelines state that sending SMS messages is risky since the message content could be intercepted or redirected, thereby paving the way for unauthorized access. Although, if a business is using SMS messages for their two-factor authentication procedures, they must certify that the user connects their phone number to a mobile network instead of a VoIP service. 

Avoid Frequent Password Changes 

The 2020 NIST guidelines further urge users to avoid changing their passwords periodically. The guidelines encourage users only to change their password frequently if the credentials are compromised or for a user request. Moreover, the guidelines also highlight some password creation practices. 

According to NIST, users must create passwords that they can easily remember. The password length can vary, featuring at least 64 characters. Additionally, the passwords can use any characters that facilitate memorization, such as spaces. The guidelines discourage using special characters as they can halter the commitment to memory. 

How Passwords Affect Risk Management

Password complexity can directly affect the digital security of the organization. Organizations that use simplified passwords or use the same password for multiple accounts are at a high risk of data breaches, identity theft, or financial theft. 

Growing businesses must set cogent passwords that protect the organization. Essentially, companies that rely on interconnected applications and software programs, like emails, cloud storage, and SaaS facilities, must take password protection seriously. Every application your employees use can risk your business’s cybersecurity, especially if the employees set common or weak passwords. 

Password breaches have become relatively common in recent years. Research shows that human error causes most password breaches, including setting a weak password, frequently changing passwords, sharing credentials, and using inadequate methods for storing passwords. 

Businesses must take comprehensive measures to follow the NIST password guidelines. It is vital to stay informed about the updated password recommendations and create a system to abide by these procedures. Companies can also carry out comprehensive training sessions to ensure their teams know the steps they need to take to optimize security in their operations. Moreover, companies can leverage password managers and integrate encryption techniques to certify increased security. 

In addition, businesses must also take a proactive approach to identify compromised passwords and upgrade their servers to make sure their system remains guarded in case of an attack. Large-scale organizations should use an automated system. 

Final Thoughts 

A large majority of data breaches take place due to compromised passwords. Most individuals create weak and predictable passwords that are easy to remember. Sophisticated tools enable unauthorized individuals to access employee accounts and leak, damage, or sell confidential information. 

Data breaches can cost the company financial and reputational damage. Therefore, it is pertinent for businesses to create reliable, robust passwords that are safe and difficult to crack. The NIST guidelines can assist companies in meeting this objective. Companies can stay informed on the updated recommendations and train their teams to create and protect their passwords securely. To learn more about digital identity guidelines, read the NIST password guidelines for 2022. In addition, businesses can also leverage the CyberStrong Platform to optimize their cybersecurity. 

CyberStrong is a real-time risk management system that carries out comprehensive risk quantification, provides intuitive workflows, and creates reports to construct cyber-attack resilience using a methodological and systematic approach. For more information on how to safeguard your large or small business, contact us

You may also like

April Product Update
on May 3, 2022

Teamwork makes the dream work! Teamwork makes the dream work - an annoyingly accurate cliche we’ve repeatedly heard over the years from sports fields to corporate offices. It’s a ...

Watch The CyberStrong Platform ...
on April 27, 2022

With cyber-attacks on businesses at an all-time high, it’s more crucial than ever to keep an eye out for potential cyber risks. These risks pose an even bigger threat when ...

Alison Furneaux
January / February Product Update
on March 7, 2022

New year, new features! Each year brings a new list of new year’s resolutions - you know, that list of fake promises you make to yourself, like giving up chocolate, exercising ...

Kyndall Elliott
The Complete Guide to Your ...
on March 4, 2022

The incident response framework by the National Institute of Standards and Technology (NIST) is an impactful beginning for organizations looking to optimize their incident plan ...

Kyndall Elliott
All You Need to Know About NIST ...
on March 3, 2022

Businesses depend on protecting confidential information to establish a reputation of dependability in the market and build trusting relationships with their customers and ...

How Cyber and IT Risk ...
on March 10, 2022

Cybercrime has reached new heights over the last five years, especially during the COVID-19 pandemic. This is made evident by the costly security breaches in big corporations that ...