Cybersecurity Statistic of the Month: Password Complexity and MFA

Long before word processing, spreadsheets, and most recently artificial intelligence (AI), modern computers were designed to do math quickly. In 1965, Intel CEO Gordon Moore observed that every year the number of components per integrated circuit doubled. In 1975, this number was revised, doubling every two years. This has held true for every year from 1975 on. This is known as “Moore’s Law.”

Cracking a password comes down to a math problem. The table below shows recent statistics for password cracking using hardware commonly found in desktop computers based on complexity:

This highlights that using more characters and requiring numbers, upper- and lower-case letters and symbols makes it significantly harder to crack a password. It is why accounts are set to lock out after a number of password attempts.

Part of password complexity includes lock out triggers and lock out times. It is unlikely a user will type a password incorrectly five times and even less likely to do so in one second. Requiring a 15-minute time out after five consecutive incorrect password attempts increases the amount of time required to crack a password.

According to a Forbes study, 35% of people with stolen passwords say that a simple password was the cause of their problems.  

The problem with reusing passwords

People come up with a single password they are comfortable with.

Seventy-eight percent reuse passwords and 68% who had their password stolen have to change it in multiple places.

The problem with using a single factor

What is a factor when it comes to multifactor authentication (MFA). A factor is a piece of evidence to get a computer, a network or an application to trust a user with information or privileges. Factors are broken out into three categories:

  • Something you have. Examples include physical keys, a car fob, a badge, a bank card, a phone, and a USB token.
  • Something you know. Examples include a password, social security number, date of birth, mother’s maiden name.
  • Something you are. Examples include facial recognition, voice recognition, fingerprints, eye iris recognition.

From the Forbes study, 27% of credentials were exposed due to a company data breach and 21% were stolen through phishing attacks. Looking at the combination of cracked passwords, passwords that are guessed because of reuse, or passwords that are stolen, the value of additional factors becomes easy to see. This is why you need a PIN to access your bank account with your card.

As we continue to navigate the ever-evolving landscape of cybersecurity threats, it’s clear that strong password practices and MFA are crucial defenses against unauthorized access. Simple passwords, reused credentials, and single-factor authentication can leave us vulnerable to attacks that can have serious repercussions. Idaho Office of Information Technology Services (ITS) and Idaho Office of Emergency Management (IOEM) urge everyone to adopt unique, complex passwords and integrate MFA to significantly enhance our security posture and protect sensitive information.

Take the next step today: review your current password practices, implement MFA wherever possible, and encourage your colleagues and loved ones to do the same.