But even long and complex passwords are not much better
Security experts are often heard preaching: “If you can remember your password, it’s not secure enough.” And come to think of it, there are password managers like LastPass or KeePass. Sure, passwords managers can help to enhance security, if they are used the right way: by generating a unique and secure password for each individual service used and storing it in an encrypted database. This takes time and effort, but it’s worth it.
However, password managers cannot prevent an attacker logging on to a third-party account via the Internet using a password that has been stolen via social engineering or recorded via a man-in-the-middle attack. Even the longest, most complex and most secure password in the world cannot do anything to prevent unauthorized use.
The Federal Office for Information Security (BSI) has a clear view on changing passwords regularly
Only multi-factor authentication (MFA) promises real security. As well as the protection offered by username and passwords, MFA adds an extra layer of security such as a TOTP (time-based one-time password). When logging on to a service, the user must enter their username, password and a TOTP code, which is generated on a separate device, for example, using an app such as the NCP Authenticator. The TOTP code is valid only for a short period of time, usually 30 seconds.
Of course, the era of passwords is not really coming to an end. We will also need passwords in the future – but either as part of an MFA-protected environment or, for example, as a passphrase for the secure encryption of data. Passwords should always be long and complicated. They may and should, of course, also be changed, particularly if they have been compromised. But is it worth changing your password just because it’s “Change Your Password Day”? That’s hardly a convincing reason.
Incidentally, the Federal Office for Information Security (BSI) has now also come to this conclusion. Until recently, the BSI had also called for regular password changes. In the current version of the Guide to Basic Protection, it no longer does so. Follow this good example and secure your accounts with TOTP instead of relying on half-baked tips that won’t make your passwords any more secure.
Learn more about TOTP now: “How 2FA works with time-based one-time passwords”