1459
Incorrect password (i.imgur.com)
submitted 1 year ago by TheGoldenGod@lemmy.world to c/memes@lemmy.ml
top 50 comments
sorted by: hot top controversial new old
[-] meldroc@lemmy.world 100 points 1 year ago

And despite security recommendations, too many IT depts still force password resets every 90 days...

And people confronted with this change their password from "p@55w0rd!1" to "p@55w0rd@2". Yep extra-secure!

[-] TheGoldenGod@lemmy.world 27 points 1 year ago

At some point most security recommendations are self-defeating.

[-] nomadjoanne@lemmy.world 17 points 1 year ago

Ideally we'd all use password managers, but I'm aware 99% of peoole don't. Even with one, it's frankly a pain in the butt to be nagged about changing it. "Man, my passwords are 20 random characters. I don't need yo reset ot unless you've had a breach."

load more comments (2 replies)
[-] chrischryse@lemmy.world 17 points 1 year ago

I work in the IT section of a bank and they force a change every 30 days and can only have an 8 character password no more no less 🙃

[-] HurlingDurling@lemm.ee 14 points 1 year ago

Seems like a job for Bobby tables

[-] AlecSadler@lemmy.world 15 points 1 year ago

A job I quit about 6mos ago required monthly changes. It was awful. And, yes, it absolutely led to me just incrementing a number at the end. I knew it was time to quit when I was about to hit double digit numbers.

[-] Nikel23@lemmy.world 4 points 1 year ago* (last edited 1 year ago)

you're saying not to hold a job for more than 10 months?

[-] AlecSadler@lemmy.world 12 points 1 year ago

It was a joke.

But also, holding a shitty toxic job for 10mos took a mental health toll.

But also, I don't know, in some cases that might be good advice. Since 2020 I've changed jobs every 6-10mos and I'm making triple what I made in 2019, so that's nice.

[-] jbloggs777@discuss.tchncs.de 11 points 1 year ago

@278 and going strong, across 7 companies. One time, just to mix things up, I used an exclamation mark instead. It was exhilerating. /s

[-] The_v@lemmy.world 10 points 1 year ago

Some IT guys have caught on to this and require 2 digits difference.

So "ThisJobSucks#11" becomes "ThisJobSucks#22"

[-] psilocybin@discuss.tchncs.de 13 points 1 year ago

How would they know how many digits changed? They don't store the password in cleartext.

Right?

...

load more comments (14 replies)
[-] Agent641@lemmy.world 8 points 1 year ago

{Sitename}+{SaLt}+{yymmdd of password change} easy peasy

[-] Narjah@lemmy.world 9 points 1 year ago

I college we had to change our password every semester. Guess who added the semester number onto the end of their password. Hint: everyone.

Same as a government job that required monthly password changes. Well, at least those people had more security than the post-it note on the monitor people

load more comments (1 replies)
[-] Rusty@lemmy.ca 7 points 1 year ago

Hey, how do you know my password?

[-] tool@r.rosettast0ned.com 5 points 1 year ago

And despite security recommendations, too many IT depts still force password resets every 90 days...

It could be for contractual or for insurance reasons. We have some contracts with government agencies that require it, and our cyberinsurance also does. Even though NIST has been recommending for years to do long passphrase + MFA and no reset unless you suspect compromise.

So yeah, the reason behind this might not be just plain incompetence.

load more comments (1 replies)
[-] Stuka@lemmy.ml 5 points 1 year ago

The worst is when you have a bunch of independent systems that all have their own login info, all configured by the dame IT department, all with different forced reset timers.

[-] abraxas@lemmy.ml 4 points 1 year ago

I've had arguments with clients' IT security about this in the past where they demanded forced password resets. Citing NIST controls that insist you should avoid them was apparently insufficient.

[-] FlexibleToast@lemmy.world 44 points 1 year ago

Who still isn't using a password manager?

[-] jetsetdorito@lemmy.world 56 points 1 year ago

The most infuriating part is when this happens while using a password from a password manager

[-] TheGoldenGod@lemmy.world 15 points 1 year ago

The fact this happens is infuriating. 😣

[-] pulverizedcoccyx@lemmy.ca 5 points 1 year ago

Then you finally do the password change, go to login and now the new password doesn't work because you copied it to clipboard and overwrote it somehow in that small time frame goddamn shit! I always win+r and put it there until I know everything is all good.

load more comments (2 replies)
[-] Thassodar@lemm.ee 20 points 1 year ago

What if I were to tell you my password manager password is the most vulnerable of all?

Nobody would guess it's hunter2.

[-] criticon@lemmy.ca 15 points 1 year ago

I only see ******* when you type hunter2

[-] Thassodar@lemm.ee 5 points 1 year ago
[-] jetsetdorito@lemmy.world 10 points 1 year ago

You should really upgrade to hunter3

[-] Thassodar@lemm.ee 8 points 1 year ago

But how did you see it? I used the spoiler tag

/s

[-] circuitfarmer@lemmy.sdf.org 5 points 1 year ago

Mine is bigboipassword123. Can't dictionary attack it cuz boi isn't in the dictionary.

[-] ImFresh3x@sh.itjust.works 4 points 1 year ago
load more comments (1 replies)
[-] totallynotarobot@lemmy.world 7 points 1 year ago

I promise you that does not help.

I suspect a large number of these incidents are due to the password field in the login page allowing fewer characters than the field in the sign up page, so the password gets truncated. A couple of help desk meat shields have confirmed that for me, but mostly I think this because it seems to fix itself if I use a shorter password.

How short, you ask? Who tf knows! They sure as shit won't tell you! Just spend the next 20 minutes trying shit til it works, because you have nothing better to do with your time!

[-] codapine@lemm.ee 6 points 1 year ago

My company doesn't tell you what the AD policy is for changing your domain logon password but windows will just tell you that it doesn't meet the policy. What IS the password policy you ask?

Well it's uh... 🤷‍♂️

Try again!

[-] totallynotarobot@lemmy.world 4 points 1 year ago

I am annoyed on your behalf.

I've had goons tell me they can't tell me the character max because of "security"

load more comments (2 replies)
load more comments (2 replies)
[-] pulverizedcoccyx@lemmy.ca 5 points 1 year ago

My parents. All written down on paper in handy notebooks for anyone that breaks in. Two entire lives and everything in them just there for the taking.

load more comments (3 replies)
load more comments (8 replies)
[-] 001100010010@lemmy.dbzer0.com 30 points 1 year ago
[-] TheGoldenGod@lemmy.world 11 points 1 year ago

If it helps, I think we’re all in this picture at some point lol.

[-] Soundhole@lemm.ee 16 points 1 year ago

C00kies!

6 months later: C00kies?

6 months later: C00kies!

6 months later: C00kies?

This is how it's done.

[-] pineapplelover@lemm.ee 22 points 1 year ago

Or use a fucking password manager like Bitwarden or Keepass

[-] Gormadt@lemmy.blahaj.zone 9 points 1 year ago

I won't say where I work but we have strict password requirements including that they have to be exactly 8 characters long.

Yeah our passwords aren't very secure as we also have to change them every 90 days and if you miss the window by 3 days you have to call the IT desk to reset it which takes about 45 minutes to an hour. And in that time you basically can't get anything done.

At home I use a password manager and all my passwords are randomly generated and whenever possible 2fa is enabled.

[-] Trapping5341@lemmy.world 11 points 1 year ago

Personally I would use a password manager for at work as well. Bitwarden can generate 8 character passwords. Easy enough to remember and if you forget it's right there on your phone.

[-] abraxas@lemmy.ml 7 points 1 year ago

Not sure if you're in the US. But if you are, you should leave this anonymously on the security team's desks.

> Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically). However, verifiers SHALL force a change if there is evidence of compromise of the authenticator. - NIST control SP 800-63B Section 5.1.1.2

Basically a fairly widespread standard of security. All kinda of complaince you can fall out of if you do business with anyone who cares about NIST controls.

load more comments (3 replies)
load more comments (2 replies)
load more comments (1 replies)
[-] KalloFox34@lemm.ee 11 points 1 year ago

And that’s why I generate my passwords randomly.

Thank you Bitwarden.

[-] totallynotarobot@lemmy.world 5 points 1 year ago

So do I. This still happens.

[-] Lucidlethargy@sh.itjust.works 10 points 1 year ago

Ahh, so you all also shop at target online, eh?

[-] x4740N@lemmy.world 4 points 1 year ago

I'm guessing this is american target and not Australian target

[-] DaveNa@lemmy.ml 4 points 1 year ago

Why is that? Couldn't find anything on Google.

load more comments
view more: next ›
this post was submitted on 27 Jul 2023
1459 points (98.2% liked)

Memes

45560 readers
810 users here now

Rules:

  1. Be civil and nice.
  2. Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.

founded 5 years ago
MODERATORS