Strong Password Policy Isn't Enough, Study ShowsStrong Password Policy Isn't Enough, Study Shows
New analysis reveals basic regulatory password requirements fall far short of providing protection from compromise.
![person entering password on their phone to illustrate two-factor authentication person entering password on their phone to illustrate two-factor authentication](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt2e770611ab92c94d/64f17458705b0e42664ca741/password_Tero_Vesalainen_Alamy.jpg?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
A new look at a database of more than 800 million known-breached passwords reveals that 83% of them met basic security standards set by five different standards agencies.
Minimum password lengths prescribed by NIST, HITRUST for HIPPS, PCI, ICO for GDPR, and Cyber Essentials for NCSC ranged from seven to 10 and included requirements for password complexity, special characters, and numbers — but none were enough to keep compliant passwords off the breached list, according to a new report from Specops Software.
"What this data really tells us is that there is a very good reason why some regulatory recommendations now include a compromised password check," said Darren James, product specialist at Specops Software, in a statement about the new password policy research. "Complexity and other rules might help but the most compliant password in the world doesn’t do anything to protect your network if it's on a hacker's compromised password list."
About the Author
You May Also Like
Uncovering Threats to Your Mainframe & How to Keep Host Access Secure
Feb 13, 2025Securing the Remote Workforce
Feb 20, 2025Emerging Technologies and Their Impact on CISO Strategies
Feb 25, 2025How CISOs Navigate the Regulatory and Compliance Maze
Feb 26, 2025Where Does Outsourcing Make Sense for Your Organization?
Feb 27, 2025