this post was submitted on 27 Jul 2023
1468 points (98.2% liked)

Memes

46654 readers
1110 users here now

Rules:

  1. Be civil and nice.
  2. Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.

founded 5 years ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 100 points 2 years ago (11 children)

And despite security recommendations, too many IT depts still force password resets every 90 days...

And people confronted with this change their password from "p@55w0rd!1" to "p@55w0rd@2". Yep extra-secure!

[–] [email protected] 27 points 2 years ago

At some point most security recommendations are self-defeating.

[–] [email protected] 17 points 2 years ago (1 children)

I work in the IT section of a bank and they force a change every 30 days and can only have an 8 character password no more no less 🙃

[–] [email protected] 14 points 2 years ago

Seems like a job for Bobby tables

[–] [email protected] 16 points 2 years ago (2 children)

Ideally we'd all use password managers, but I'm aware 99% of peoole don't. Even with one, it's frankly a pain in the butt to be nagged about changing it. "Man, my passwords are 20 random characters. I don't need yo reset ot unless you've had a breach."

load more comments (2 replies)
[–] [email protected] 15 points 2 years ago (2 children)

A job I quit about 6mos ago required monthly changes. It was awful. And, yes, it absolutely led to me just incrementing a number at the end. I knew it was time to quit when I was about to hit double digit numbers.

load more comments (2 replies)
[–] [email protected] 11 points 2 years ago

@278 and going strong, across 7 companies. One time, just to mix things up, I used an exclamation mark instead. It was exhilerating. /s

[–] [email protected] 10 points 2 years ago (1 children)

Some IT guys have caught on to this and require 2 digits difference.

So "ThisJobSucks#11" becomes "ThisJobSucks#22"

[–] [email protected] 13 points 2 years ago (14 children)

How would they know how many digits changed? They don't store the password in cleartext.

Right?

...

load more comments (14 replies)
[–] Rusty 8 points 2 years ago

Hey, how do you know my password?

[–] [email protected] 8 points 2 years ago (2 children)

{Sitename}+{SaLt}+{yymmdd of password change} easy peasy

[–] [email protected] 9 points 2 years ago

I college we had to change our password every semester. Guess who added the semester number onto the end of their password. Hint: everyone.

Same as a government job that required monthly password changes. Well, at least those people had more security than the post-it note on the monitor people

load more comments (1 replies)
[–] [email protected] 5 points 2 years ago (1 children)

And despite security recommendations, too many IT depts still force password resets every 90 days...

It could be for contractual or for insurance reasons. We have some contracts with government agencies that require it, and our cyberinsurance also does. Even though NIST has been recommending for years to do long passphrase + MFA and no reset unless you suspect compromise.

So yeah, the reason behind this might not be just plain incompetence.

load more comments (1 replies)
[–] [email protected] 5 points 2 years ago

The worst is when you have a bunch of independent systems that all have their own login info, all configured by the dame IT department, all with different forced reset timers.

[–] [email protected] 4 points 2 years ago

I've had arguments with clients' IT security about this in the past where they demanded forced password resets. Citing NIST controls that insist you should avoid them was apparently insufficient.

[–] [email protected] 46 points 2 years ago (12 children)

Who still isn't using a password manager?

[–] [email protected] 56 points 2 years ago (1 children)

The most infuriating part is when this happens while using a password from a password manager

[–] [email protected] 15 points 2 years ago (1 children)

The fact this happens is infuriating. 😣

[–] pulverizedcoccyx 5 points 2 years ago (2 children)

Then you finally do the password change, go to login and now the new password doesn't work because you copied it to clipboard and overwrote it somehow in that small time frame goddamn shit! I always win+r and put it there until I know everything is all good.

load more comments (2 replies)
[–] [email protected] 21 points 2 years ago (3 children)

What if I were to tell you my password manager password is the most vulnerable of all?

Nobody would guess it's hunter2.

[–] criticon 15 points 2 years ago (1 children)

I only see ******* when you type hunter2

[–] [email protected] 5 points 2 years ago
[–] [email protected] 12 points 2 years ago (1 children)

You should really upgrade to hunter3

[–] [email protected] 8 points 2 years ago

But how did you see it? I used the spoiler tag

/s

[–] [email protected] 5 points 2 years ago (2 children)

Mine is bigboipassword123. Can't dictionary attack it cuz boi isn't in the dictionary.

[–] [email protected] 4 points 2 years ago
load more comments (1 replies)
[–] [email protected] 7 points 2 years ago (3 children)

I promise you that does not help.

I suspect a large number of these incidents are due to the password field in the login page allowing fewer characters than the field in the sign up page, so the password gets truncated. A couple of help desk meat shields have confirmed that for me, but mostly I think this because it seems to fix itself if I use a shorter password.

How short, you ask? Who tf knows! They sure as shit won't tell you! Just spend the next 20 minutes trying shit til it works, because you have nothing better to do with your time!

[–] [email protected] 6 points 2 years ago (3 children)

My company doesn't tell you what the AD policy is for changing your domain logon password but windows will just tell you that it doesn't meet the policy. What IS the password policy you ask?

Well it's uh... 🤷‍♂️

Try again!

load more comments (3 replies)
load more comments (2 replies)
[–] pulverizedcoccyx 5 points 2 years ago (3 children)

My parents. All written down on paper in handy notebooks for anyone that breaks in. Two entire lives and everything in them just there for the taking.

[–] [email protected] 4 points 2 years ago* (last edited 2 years ago)

If I recall, a few (most) security experts now support written-on-paper passwords. Why? Because it is the solution for users who would otherwise commit far a more egregious security faux pas otherwise.

In most circumstances, it is easier to keep the notebook secure than your wallet, your car, etc. And let's be honest, the list of suspects are REALLY short if someone breaks into your house, opens the third drawer, grabs the notebook and runs. And if it's more than that and somebody ransacks your entire house, I guarantee having to change your passwords is the least of your headaches.

Ultimately, physical compromise is the lowest possible security risk for most people throughout their lives. Yes, it happens. Yes, it sucks. But having your bank password out in the wild with nobody realizing it is possibly far more dangerous.

load more comments (2 replies)
load more comments (8 replies)
[–] [email protected] 33 points 2 years ago (1 children)
[–] [email protected] 11 points 2 years ago

If it helps, I think we’re all in this picture at some point lol.

[–] [email protected] 11 points 2 years ago (1 children)

And that’s why I generate my passwords randomly.

Thank you Bitwarden.

[–] [email protected] 5 points 2 years ago

So do I. This still happens.

[–] [email protected] 10 points 2 years ago (1 children)

Ahh, so you all also shop at target online, eh?

[–] [email protected] 4 points 2 years ago

I'm guessing this is american target and not Australian target

[–] [email protected] 4 points 2 years ago

Why is that? Couldn't find anything on Google.

load more comments
view more: next ›