
Rethinking Password Expiry: Why the UK’s NCSC Says “Ditch the Requirement”
For years, we’ve been told to change our passwords regularly, often every 30, 60, or 90 days. This felt like a security best practice, a way to stay ahead of hackers and keep our accounts safe. But the UK’s National Cyber Security Centre (NCSC) has challenged this traditional wisdom, arguing that forced regular password expiry is often more trouble than it’s worth.
Their blog post, “The problems with forcing regular password expiry” (published on March 13, 2025), delves into the reasons why this practice, while well-intentioned, can actually weaken our security. Let’s break down their arguments in a way that’s easy to understand:
The Problem: What’s Wrong with Regularly Changing Passwords?
The NCSC isn’t saying that passwords are unimportant. They’re saying that forcing regular changes can lead to several problems:
- Predictable Passwords: When people are forced to change their passwords frequently, they often resort to predictable patterns. They might simply increment a number at the end of their password (e.g., “Password1!”, “Password2!”, “Password3!”), or make minor, easily guessable alterations. This makes it significantly easier for attackers to guess or crack these passwords.
- Weakened Passwords: To remember a constantly changing password, users might choose simpler, weaker passwords that are easier to recall. A complex, long, and randomly generated password is hard to remember, especially when you have to change it every few weeks.
- Password Reuse: Faced with the constant burden of creating new passwords, people are more likely to reuse the same password across multiple accounts. If one of those accounts is compromised, the attacker now has access to all the accounts using that password.
- Frustration and Resentment: Forced password changes can be incredibly frustrating for users. This can lead to them actively trying to circumvent the rules or, even worse, writing their passwords down – negating the entire purpose of the exercise.
- Administrative Overhead: From an organizational perspective, enforcing and managing regular password expiry requires significant IT resources and infrastructure.
The Alternative: Focus on Strong Passwords and Other Security Measures
Instead of relying on forced password changes, the NCSC recommends focusing on a more holistic approach to security:
- Encourage Strong, Unique Passwords: The emphasis should be on creating passwords that are long, complex, and unique to each account. Think of a password as a short sentence or phrase, incorporating a mix of uppercase and lowercase letters, numbers, and symbols. A good example would be something like: “My cat’s name is Mittens, and she loves to chase 23 mice!”
- Implement Multi-Factor Authentication (MFA): This is arguably the most important recommendation. MFA adds an extra layer of security by requiring a second verification method in addition to your password. This could be a code sent to your phone, a biometric scan, or a hardware security key. Even if an attacker manages to guess your password, they won’t be able to access your account without this second factor.
- Monitor for Compromised Credentials: Organizations should actively monitor for compromised credentials (usernames and passwords) that have been exposed in data breaches. This allows them to proactively alert users and reset their passwords if necessary.
- Educate Users About Phishing and Other Threats: Users need to be aware of common phishing techniques and other social engineering tactics that attackers use to steal credentials. Regular security awareness training can help them spot and avoid these threats.
- Use Password Managers: Password managers can help users create, store, and manage strong, unique passwords for all their accounts. They also often include features like password generators and security alerts.
- Implement Account Lockout Policies: If an attacker tries to guess a password multiple times, the account should be temporarily locked out to prevent brute-force attacks.
- Good hygiene of systems: Keep systems up to date with security patches to mitigate known vulnerabilities.
Why This Shift in Thinking Matters
The NCSC’s recommendations are a significant departure from traditional security advice. They highlight the fact that security is not just about ticking boxes but about understanding how users behave and how attackers operate. By focusing on strong passwords, MFA, and other proactive measures, we can create a more robust and user-friendly security environment.
In Summary:
- Old Approach: Forced regular password changes.
- New Approach: Focus on strong, unique passwords, Multi-Factor Authentication (MFA), monitoring for compromised credentials, and user education.
The NCSC’s message is clear: ditch the forced password expiry requirement and embrace a more effective and sustainable approach to security. It’s about empowering users to protect themselves, not burdening them with arbitrary rules that can ultimately weaken security. This change in perspective requires a shift in how we think about password security, but it’s a shift that’s ultimately necessary to stay ahead of evolving cyber threats.
The problems with forcing regular password expiry
The AI has delivered the news.
The following question was used to generate the response from Google Gemini:
At 2025-03-13 11:50, ‘The problems with forcing regular password expiry’ was published according to UK National Cyber Security Centre. Please write a detailed article with related information in an easy-to-understand manner.
30