<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>General Archives - Password RBL</title>
	<atom:link href="https://www.passwordrbl.com/blog/category/general/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.passwordrbl.com/blog/category/general/</link>
	<description>Real-time Password Blacklist</description>
	<lastBuildDate>Thu, 21 Dec 2023 04:14:44 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.passwordrbl.com/wp-content/uploads/2020/05/cropped-Special_SmallRes_White_Circle_cropped-32x32.png</url>
	<title>General Archives - Password RBL</title>
	<link>https://www.passwordrbl.com/blog/category/general/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Password Firewall Blocks Keyboard Patterns</title>
		<link>https://www.passwordrbl.com/blog/password-firewall-blocks-keyboard-patterns/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Mon, 03 Jul 2023 03:35:40 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Products]]></category>
		<category><![CDATA[Password Firewall for Windows]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80196</guid>

					<description><![CDATA[<p>Password RBL has released the next version of Password Firewall. This is version 7.10 and builds upon the solid foundation [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/password-firewall-blocks-keyboard-patterns/">Password Firewall Blocks Keyboard Patterns</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Password RBL has released the next version of Password Firewall. This is version 7.10 and builds upon the solid foundation of previous versions, but it also adds a new feature that has been requested numerous times by customers and prospects.  Password Firewall now blocks common keyboard patterns in password choices even if the exact password permutation that includes the pattern is not blacklisted.  We have also included a few safeguards so Password Firewall doesn&#8217;t make choosing a new password overly burdensome on users..  Continue reading for details of how it works.</p>
<h2>Blocking the Most Common Patterns</h2>
<p>Password Firewall v7.10 blocks the most common keyboard-based patterns.  Examples include, &#8220;qwerty&#8221;, &#8220;zxcvbn&#8221;, &#8220;qazwsx&#8221;, etc.  The matching is not case sensitive so Password Firewall will catch most use of these patterns as part of password choices.  If a match is found then Password Firewall will block the password choice without a need for performing the blacklist query.  But we don&#8217;t want to deny just any password that happens to include one of these keyboard patterns.  That is where our safeguards apply.</p>
<p>&nbsp;</p>
<h2>Safeguards</h2>
<p>Not all passwords containing a keyboard pattern are of poor quality.  Qwerty12345 is certainly a bad choice.  After all, it is in our curated blacklist and commonly tops the Worst Passwords of the Year lists.  But a randomly generated 30-character password that happens to include a case insensitive match for &#8220;qazwsx&#8221; is likely still a plenty secure password, due to it&#8217;s length and randomness.  Because of this, Password Firewall includes length as a safeguard to keyboard pattern matching.   If a password choice that matches a common keyboard pattern is not significantly longer than the pattern itself, then Password Firewall will block the password choice.  Generally, since the keyboard patterns are short (5-6 characters), then the password choice will need to be at least 15 characters in length to be exempted from the pattern-based matching.</p>
<p>But we also include a safeguard to the safeguard.   Before granting an exemption to the pattern matching based upon password length, an additional check is done to make sure the end-user has also included some non-pattern characters in their password choice.  This prevents &#8220;clever&#8221; password choices based upon keyboard patterns from being exempted just because overall length is good.  This is best understood by example:  &#8220;aE8QazWSx72-8uNn3vPR&#8221; would be exempted from pattern matching but &#8220;QAZ2WSXqaz2wsxQAZ2WSX&#8221; would not.</p>
<p>&nbsp;</p>
<h2>Blacklisting Still Applies</h2>
<p>It&#8217;s important to remember that once a password choice makes it past the keyboard pattern matching check, blacklist checks still apply. &#8220;Qwerty12345password&#8221; might make it passed the pattern check, but it&#8217;s still a blacklisted password.</p>
<p>&nbsp;</p>
<h2>Upgrade Today</h2>
<p>Password Firewall v7.10 is available for <a href="https://www.passwordrbl.com/downloads/">download</a> now.  Upgrades are easy, but you have to be running v7.10 (or later) to gain this additional protection.</p>
<p>The post <a href="https://www.passwordrbl.com/blog/password-firewall-blocks-keyboard-patterns/">Password Firewall Blocks Keyboard Patterns</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Zero-Trust Before It Was Cool</title>
		<link>https://www.passwordrbl.com/blog/zero-trust-before-it-was-cool/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Tue, 07 Jun 2022 16:55:40 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Industry News]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80201</guid>

					<description><![CDATA[<p>Password RBL&#8217;s secure design has always been zero-trust.  In fact, Password RBL was zero-trust before zero-trust was even a phrase.  [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/zero-trust-before-it-was-cool/">Zero-Trust Before It Was Cool</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Password RBL&#8217;s secure design has always been zero-trust.  In fact, Password RBL was zero-trust before zero-trust was even a phrase.  Nowadays it seems every product is scrambling for a way to claim it is zero-trust.  But Password RBL&#8217;s original focus was on security &#8211; even before there was a viable product.  Since the service would be screening customer&#8217;s passwords, it was assumed that there would never be any customers if the service was not &#8220;obviously secure&#8221; (the original phrase used to describe Password RBL).</p>
<p>So we set out to make a Password Blacklisting service that was &#8220;obviously secure.&#8221;  A password screening service that had no possibly of ever knowing the password choices involved.  Or the username associated with the password.  Or even the customer sending the query.  A service where customers did not have to extend any trust or sacrifice any security to use the service.  This is what we built at Password RBL.  But the industry came up with a concise way to describe such a service:  &#8220;zero-trust.&#8221;</p>
<p>For additional details, <a href="https://www.passwordrbl.com/about-security/">follow this link</a> to read about how Password RBL&#8217;s architecture truly is zero-trust.</p>
<p>TL;DR: Password RBL was &#8220;zero-trust&#8221; before it was cool.</p>
<p>The post <a href="https://www.passwordrbl.com/blog/zero-trust-before-it-was-cool/">Zero-Trust Before It Was Cool</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity Attitudes and Behaviors Report</title>
		<link>https://www.passwordrbl.com/blog/cybersecurity-attitudes-and-behaviors-report-2021/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Sun, 17 Oct 2021 21:32:28 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[API Access]]></category>
		<category><![CDATA[Password Firewall for Windows]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80107</guid>

					<description><![CDATA[<p>The National Cybersecurity Alliance (NCSA) has released their Attitudes and Behaviors report for 2021, and, honestly, it&#8217;s not great.  Well, [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/cybersecurity-attitudes-and-behaviors-report-2021/">Cybersecurity Attitudes and Behaviors Report</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The <a href="https://staysafeonline.org/" target="_blank" rel="noopener">National Cybersecurity Alliance (NCSA)</a> has released their <a href="https://staysafeonline.org/resource/oh-behave-2021/" target="_blank" rel="noopener">Attitudes and Behaviors report for 2021</a>, and, honestly, it&#8217;s not great.  Well, the reporting is great, and it&#8217;s great that the NCSA conducts and releases this annual report.  But the content of the report contains some not-so-great behaviors among real users.</p>
<h2>MFA</h2>
<p>As we know, Multi-Factor Authentication (MFA) is a great way to combat potential account takeovers or just general bad password hygiene.  Even when MFA is used, <a href="https://www.passwordrbl.com/blog/got-mfa-good-but-you-still-need-password-blacklisting/">Password Blacklisting still makes sense</a>.  But if MFA is not in use, then Password Blacklisting is an absolute must!   Unfortunately, the report found that 52% of people have never heard of MFA.  This makes enforcing strong passwords even more important.  But why is this?  Well, 64% say they have no access to MFA, and another 10% say they do have access MFA, but choose not to use it.</p>
<p>&nbsp;</p>
<h2>Responsibility</h2>
<p>Additionally, the data indicates a significant proportion of people simply do not see themselves as responsible for looking after their workplace’s sensitive information.  Over a third (40%) of the full-time and part-time employees participating in this report considered themselves to be the least responsible agency for their organization’s cybersecurity.  That means that nearly half of your employees don&#8217;t think it&#8217;s their responsibility to choose a strong password!  This statistic is alarming and makes the case for all businesses to deploy Password Blacklisting in order to prevent users from choosing poor passwords.</p>
<p>&nbsp;</p>
<h2>Passwords</h2>
<p>Speaking of passwords, the report also discovered some alarming, but simultaneously not surprising, statistics on real-life password behaviors.  Only 43% of participants reported creating long and unique passwords for their online accounts “very often” or “always”. However, almost a third (28%) stated that they didn’t do so.  A third of real-life users are knowingly choosing weak passwords!  That&#8217;s a big number!</p>
<p>But about the more middle-of-the-road, average password behavior.  It&#8217;s still not great.  A majority (58%) of the respondents say they only &#8220;sometimes&#8221; (30%), &#8220;rarely&#8221; (18%), or &#8220;never&#8221; (10%) create long (12 character) and unique passwords.  This is probably because use of a stand-alone password manager application, which would create these long unique passwords, was uncommon, with almost half (49%) of the participants noting they ‘never’ or ‘rarely’ used one.</p>
<p>&nbsp;</p>
<h2>Not Great.  But What To Do?</h2>
<p>The full Cybersecurity Attitudes and Behaviors report (<a href="https://staysafeonline.org/resource/oh-behave-2021/" target="_blank" rel="noopener">available here</a>) contains lots more information and statistics.  But even with just the few takeaways mentioned above, it&#8217;s clear that more work needs to be done.  Deployment of Multi-Factor Authentication would absolutely help, but by 2021, the reason MFA isn&#8217;t completely pervasive is because of many real-life problems, including end-user adoption woes, cost to the business, supportability, and definitely incomplete deployments since businesses commonly support legacy systems which have no concept of MFA &#8211; or anything other than usernames and passwords, really.</p>
<p>Enter Password Blacklisting &#8211; the incredibly affordable and easy to use solution to the bad password problem.  Password RBL has drop-in support for Microsoft Active Directory (and anything linked to AD) and a dead-simple API that can be incorporated into basically anything else.  The return on investment (ROI) of a subscription to Password RBL makes deployment an easy choice &#8211; for IT and decision makers.  See our <a href="https://www.passwordrbl.com/solutions/">solutions</a> in action and <a href="https://www.passwordrbl.com/request-a-quote/">request a free quote</a> today!</p>
<p>The post <a href="https://www.passwordrbl.com/blog/cybersecurity-attitudes-and-behaviors-report-2021/">Cybersecurity Attitudes and Behaviors Report</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Password Attacks Continue to Cause Major Problems</title>
		<link>https://www.passwordrbl.com/blog/password-attacks-continue-to-cause-major-problems/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Sat, 07 Aug 2021 14:39:33 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Industry News]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80113</guid>

					<description><![CDATA[<p>Password attacks continue to cause major problems.  These attacks are as old as passwords themselves, and seemingly will never go [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/password-attacks-continue-to-cause-major-problems/">Password Attacks Continue to Cause Major Problems</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Password attacks continue to cause major problems.  These attacks are as old as passwords themselves, and seemingly will never go away.  Every year there are more and more high profile attacks or breaches get traced back to poor password hygiene.  Most critics lament that if only these companies had deployed Multi-Factor Authentication (MFA), this wouldn&#8217;t have happened.  But MFA doesn&#8217;t get deployed for a multitude of real-life reasons, including cost, incompatibility with older systems, end-user acceptance, etc.  And the incredibly cost-effective and simple solution of Password Blacklisting could have also stopped these attacks and without the negatives associated with MFA.</p>
<h2>Pipeline Problems</h2>
<p>In May 2021, a <a href="https://www.theverge.com/2021/6/5/22520297/compromised-password-reportedly-allowed-hackers-colonial-pipeline-cyberattack" target="_blank" rel="noopener">password-based hack of Colonial Pipeline Co</a>. took down the largest fuel pipeline in the U.S. which led to fuel shortages all across the East Coast.  It was a single compromised password that allowed the attackers to completely shutdown the company and cause devastating downstream affects, including a run on fuel, higher fuel prices, but also a data breach of customer information as well.  If the company had just implemented Password Blacklisting, the poor password choice would have been caught and prevented from use in the first place.  No MFA required.</p>
<p>&nbsp;</p>
<h2>Supply Chain Problems</h2>
<p>Of course we all remember the <a href="https://www.itpro.com/security/cyber-attacks/358738/intern-blamed-for-weak-password-that-may-have-sparked-solarwinds" target="_blank" rel="noopener">Solarwinds hack from late 2020</a>.  Again, a single compromised password, &#8220;solarwinds123&#8221;, was found in data breach data from 2019.  The company&#8217;s poor password hygiene allowed a user to choose such a terribly crafted password.  And it doesn&#8217;t matter if it was an intern, manager or leader.  A single compromised account spells disaster.  And in the case of Solarwinds, it was not only disasters for Solarwinds, but all of their downstream customers, too.  Once in the Solarwinds network, the attackers were able to change the code of their product, granting access to any Solarwinds customer who installed the latest version &#8211; and there were some big customers hit by this, including numerous departments of the US Government and many Fortune 500 companies.</p>
<p>&nbsp;</p>
<h2>A Simple Solution</h2>
<p>The easiest and most cost effective way to combat these types of attacks is to deploy Password Blacklisting.  It&#8217;s incredibly easy to do &#8211; much easier than deploying MFA.  There isn&#8217;t even a requirement to change end-user behavior or provide training.  A subscription to Password RBL is incredibly inexpensive and easy to deploy, adding another layer to your companies security stack.  Check out our <a href="https://www.passwordrbl.com/solutions/">solutions</a> and <a href="https://www.passwordrbl.com/request-a-quote/">request a quote</a> today!</p>
<p>The post <a href="https://www.passwordrbl.com/blog/password-attacks-continue-to-cause-major-problems/">Password Attacks Continue to Cause Major Problems</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Got MFA? Good. But You Still Need Password Blacklisting</title>
		<link>https://www.passwordrbl.com/blog/got-mfa-good-but-you-still-need-password-blacklisting/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Tue, 26 Jan 2021 05:20:31 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80072</guid>

					<description><![CDATA[<p>Password Blacklisting is sometimes considered a bridge solution until organizations can finally implement Multifactor Authentication (MFA).  Password blacklisting may get [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/got-mfa-good-but-you-still-need-password-blacklisting/">Got MFA? Good. But You Still Need Password Blacklisting</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Password Blacklisting is sometimes considered a bridge solution until organizations can finally implement Multifactor Authentication (MFA).  Password blacklisting may get deployed with plans to retire it once MFA is in place.  On the surface, this seems to make sense.  Once MFA has been implemented, it should not matter if end-user passwords are poor quality, because attacks on those poor passwords would still be thwarted by the extra authentication step of MFA.  However, we are here to inform you that you should not forgo Password Blacklisting if you have already implemented MFA.  In fact, the best, most secure solution is to use both!  Below are some real-world reasons why you should keep using password blacklisting even if you have MFA in place (or plan to soon).</p>
<h3>Reason 1 &#8211; Exceptions</h3>
<p>First off, it is very common that when MFA gets implemented, there will be exceptions for systems/services that just do not (yet) support MFA.  Each of these applications/services are holes in your organization&#8217;s security and attackers will find them.  Most MFA rollouts have at least one of these apps/services that still rely on classic username and password authentication.  As many organizations found out the hard way in the <a href="https://www.passwordrbl.com/blog/bad-password-plus-zerologon-equals-ransomware/">summer of 2020, MFA is great, but if your company VPN solution doesn&#8217;t use/support it</a>, then very bad things can happen.  Attackers can log into the company VPN, impersonating a real company user.  Once attackers have direct access to the interior of company networks, it is as if the bad guys are freely roaming the isles of the company datacenter.  Nothing good becomes of that!</p>
<p>&nbsp;</p>
<h3>Reason 2 &#8211; MFA Bypass</h3>
<p>Another great reason to keep password blacklisting around is that as the prevalence of MFA deployments increases, attackers are changing their ways and are figuring out how to bypass MFA altogether.  There have been numerous high-profile MFA-bypasses in the past year.  A quick <a href="https://www.google.com/search?q=mfa+bypass+attacks">google search</a> shows reports on many of them.  But the most disastrous MFA bypass has to be the Solarwinds supply-chain attack announced in late 2020.   In order for the attackers to gain access to the source-code of Solarwinds&#8217; popular Orion platform, they first had to bypass the MFA that Solarwinds had deployed.  Spoiler alert, the attackers were able to bypass Duo MFA and injected malicious code into the Solarwinds source.   The Cybersecurity and Infrastructure Security Agency (CISA) in the US <a href="https://threatpost.com/cloud-attacks-bypass-mfa-feds/163056/">issued an advisory</a> about attackers combining numerous different attack methods, but notably, MFA bypasses.</p>
<p>&nbsp;</p>
<h3>The Bottom Line</h3>
<p>The answer is clear: you should deploy both Password Blacklisting and Multifactor Authentication.  MFA deployments can stress the budget, but whereas the cost for a Password RBL subscription is quite reasonable.  If you do not have the budget for MFA, then Password RBL blacklisting is a perfect first step &#8211; providing an effective addition to your security makeup and fantastic ROI.  And if you do already have MFA deployed (or the budget to do so), then you can inexpensively add Password RBL blacklisting for a fraction of the total cost.  Either way, Password RBL is for you!  Check out our <a href="https://www.passwordrbl.com/packages/">Packages for Small &amp; Medium Business</a> or request a <a href="https://www.passwordrbl.com/request-a-quote/">free quote</a> if your organization is larger.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.passwordrbl.com/blog/got-mfa-good-but-you-still-need-password-blacklisting/">Got MFA? Good. But You Still Need Password Blacklisting</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Billion Passwords Analyzed; Password Firewall Protects You</title>
		<link>https://www.passwordrbl.com/blog/a-billion-passwords-analyzed-password-firewall-protects-you/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Tue, 21 Jul 2020 04:28:05 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Industry News]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=79926</guid>

					<description><![CDATA[<p>A student studying in Cyprus recently released the results of an analysis of 1 billion leaked passwords.  This is one [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/a-billion-passwords-analyzed-password-firewall-protects-you/">A Billion Passwords Analyzed; Password Firewall Protects You</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A student studying in Cyprus recently <a href="https://github.com/FlameOfIgnis/Pwdb-Public">released the results</a> of an analysis of 1 billion leaked passwords.  This is one of the biggest leaked password data sets ever analyzed and can provide some insights to contemporary password use.  Unfortunately, the results show that the common bad password hygiene that has coinutually plagued the industry, continues to occur.  But, studying such a large dataset has also revealed some other interesting information.  We will go over some of these more interesting discoveries and show you how Password RBL and Password Firewall protect you from these types of problems.</p>
<p>&nbsp;</p>
<h2>Basic Findings</h2>
<p>Out of the 1 billion credentials analyzed, there were only 168.9 million unique passwords in the list.  This means there is a startling amount of password reuse &#8211; bad password reuse.  Password RBL specifically blocks these poor and reused passwords.  This prevents Account Takeover Events by preventing users from, knowingly or inadvertently, choosing the passwords that hackers already know and use in password-based attacks.</p>
<p>The most popular password was &#8220;123456&#8221; &#8211; a truly horrible password choice, as this password (or similar ascending numerical variants) has been in the top 10 worst password choices for years now.  In fact, it was so popular that it was 1 out of ever 142 passwords in this dataset!  This password has been blocked by Password RBL since the very beginning of our service.</p>
<h2>Password Complexity</h2>
<p>Of all the unique passwords in the list, 28.79% were comprised of letters only with 26.16% using lowercase letters only.  Sadly, 13.37% of the passwords used only numbers, which is terrible since there are only 10 characters in the numeric alphabet, making brute-force of numeric-only passwords far easier.  And finally, only 2.04% of the passwords used special characters.</p>
<p>Password Firewall for Windows, specifically addresses password complexity with the Minimum Character Sets Required option.  This allows administrators to choose how many character sets must be present in password choices.  It doesn&#8217;t require a specific number of characters from each character set, because it&#8217;s only important that the passwords have at least one character from the specified number of sets.</p>
<p>Interestingly, 34.41% of the passwords analyzed ended in a numeric digit (but only 4.52% began with a digit).  This is exactly why Password Firewall has the Password DoubleCheck feature.  It will drop any digits at the end of a password choice and then re-query the Password RBL database with the resulting (truncated) password to see if the end-user has chosen a bad password, but simply added a digit to the end.</p>
<h2>Password Reuse</h2>
<p>There is plenty more evidence of the bad password reuse happening.  Unique passwords, that are found only once in the dataset, make up only 8.83% of the dataset.  The top 1,000 most common unique passwords from made up 6.61% of all passwords in the dataset.  The top 1 million most common passwords comprised 36.28% of the dataset.  And the top 10 million most common passwords made up 54.00% of the entire dataset.  So an attacker cracking a password database (that did not use password blacklisting) with a wordlist of only the 10 million most common passwords, has a better than 50/50 chance at cracking each password.  This is why password blacklisting is so necessary.</p>
<p>There is diminishing returns in brute-forcing with a larger datasets.  Brute forcing attackers obviously don&#8217;t need to.  But, we go even farther at Password RBL.  Our highly curated database currently has over 75 million of the most commonly used bad passwords and is growing every year.  Additionally, we provide a conduit for our customers to simultaneously query the Pwned Passwords database as well.  There is a large overlap in our databases, especially at the top end of the most commonly used bad passwords.  But it is a fairly safe assumption to say that this provides protection from over 500 million bad password combinations, which is more than the total number of unique passwords from this latest analysis.</p>
<h2>Conclusion</h2>
<p>This analysis confirmed alot of what Password RBL has known for a long time.  People reuse passwords, alot!  And the passwords they are reusing are common and well-known at this time.  These are the passwords you do not want your users or customers using on your network or app/service.</p>
<p>Password RBL provides an easy way to block these bad passwords as well as any custom passwords you want banned, too.  We even provide statistics so you can know if your users are getting better at choosing passwords.  And best of all, <a href="https://www.passwordrbl.com/packages/">subscriptions are inexpensive</a> so organizations of any a size can afford this effective base-layer of security.</p>
<p>The post <a href="https://www.passwordrbl.com/blog/a-billion-passwords-analyzed-password-firewall-protects-you/">A Billion Passwords Analyzed; Password Firewall Protects You</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why You Need Password Firewall to Protect Okta</title>
		<link>https://www.passwordrbl.com/blog/why-you-need-password-firewall-to-protect-okta/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Wed, 01 Jul 2020 18:32:32 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Products]]></category>
		<category><![CDATA[Password Firewall for Windows]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=79914</guid>

					<description><![CDATA[<p>Many organizations are in the process of moving applications to cloud-based service offerings.  This includes big, well-known services like productivity [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/why-you-need-password-firewall-to-protect-okta/">Why You Need Password Firewall to Protect Okta</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Many organizations are in the process of moving applications to cloud-based service offerings.  This includes big, well-known services like productivity suites Office 365 and G-Suite, and point-solutions, such as online meeting services and external file storage/sharing services.  But as companies continue these moves, they retain their core on-premise infrastructure because moving completely to the cloud is more difficult than it seems.  Plus, there are always good reasons to keep some servers/services on-premise.  The most popular on-premise service that is retained is Active Directory, since it is the core directory service that everything is built upon in a Microsoft-based network.</p>
<p>Active Directory services get extended to cloud services via proprietary directory synchronization tools such as Microsoft&#8217;s Azure AD Connect (previously known as DirSync) or Okta&#8217;s AD Agent.  In the case of <a href="https://www.okta.com">Okta</a>, the AD Agent is a small service that runs on one (or more) servers on-premise, synchronizes directory users into Okta and acts as an authentication relay agent using a method refereed to as Delegated Authentication.</p>
<p>Okta becomes an organization&#8217;s central cloud-services authentication hub.  This is where [Active Directory] users authenticate to gain access to the organization&#8217;s growing cloud-based services catalog.  This centralization of authentication helps organizations control cloud-service sprawl and therefore the number of places where they can be attacked.  But this also means that the passwords that grant access into an organization&#8217;s Okta tenant are even more important to protect.</p>
<p>Okta does have an option for preventing the use of the most common bad passwords.  But not only is this blacklist small, it only protects Directory Users when they choose to change their password from inside the Okta portal (which is a feature that is not even enabled by default).  Most directory users still use plenty of on-premise applications and still use a computer that is joined to the company&#8217;s Active Directory.  These users will be changing their passwords against Active Directory, directly interfacing with one of their organization&#8217;s Domain Controllers.  Okta&#8217;s bad password prevention feature is not involved in these password change events.  This is why you still need Password Firewall for Windows to protect your Okta environment, as well as Active Directory and anything else linked to it.</p>
<p>Not only is Password Firewall&#8217;s blacklist far more extensive and our solution more configurable, but most importantly, it catches these on-premise password change (and Admin/Helpdesk password reset) events that are happening directly with Active Directory.  Without Password Firewall&#8217;s protection of your on-premise Active Directory passwords, your Okta tenant is at risk.</p>
<p>Check out <a href="https://www.passwordrbl.com/password-firewall/">Password Firewall for Windows</a>.  It&#8217;s fast to deploy, super easy to use, and inexpensive, too.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.passwordrbl.com/blog/why-you-need-password-firewall-to-protect-okta/">Why You Need Password Firewall to Protect Okta</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
