Security Experts:

Connect with us

Hi, what are you looking for?


Identity & Access

Password Practices Still Poor, Google Says

The Problems With Passwords and MFA on Safer Internet Day

The Problems With Passwords and MFA on Safer Internet Day

To mark International Safer Internet Day (Feb. 5), Google commissioned Harris Poll to survey 3,000 American adults to understand attitudes and behaviors around online security. As expected, there is much room for improvement — and the usual gap between perception and reality is clear.

Passwords are the big pain point. While 53% of respondents understand the value of including letters, numbers and symbols in their passwords, only 39% do so — and only 23% believe that password length is important. Seven percent have never changed the password of their most used account, and only 23% use a password manager.

One of the problems is clearly educational. Only 32% of respondents could correctly define phishing, password manager, and 2FA — and 19% were unable to define any of these terms.

In response to the survey, Google has published its five Official Security Tips. These will have greater resonance for Chrome browser users. They comprise: keep software up-to-date; use unique passwords; take the Google security checkup; set up a recovery phone number or email address; and use 2FA.

One difficulty for users is that advice on unique passwords and 2FA is not universally consistent. In the UK, the NCSC’s official guidance on passwords includes a section, ‘Help users cope with password overload’, which suggests that companies should ‘only implement passwords when they are really needed.’ 

Many websites require that you establish an account with a password before you can access the services. If establishing that account does not take any more information than the user allows and is comfortable with, and the service doesn’t store any personal data, then why does the account need to be protected by a strong, unique password? Provided that the user uses a strong unique password for any ‘important’ account, the rest matters less.

Multi-factor authentication provides an even bigger friction pain point than passwords without always providing any more security. Fausto Oliveira, principal security architect at Acceptto explains, “When users have to consult their Time-based One-time Password algorithm (TOTP) every single time they try to open a website, the temptation is to have the authenticator reside in the same device that is used to access the website. When that happens, the attacker only needs to take control of one device in order to gain access. The user is simply trying to minimize friction, have a better user experience, and is often unaware of the risk.”

Of course, if a tablet and a phone are carried in the same bag, a street attacker will get access to both devices simultaneously.

“On the other hand,” continued Oliveira, “if the authenticator is stored on a different device — as it should — the user has to authenticate to that device, open the authenticator and then type the new TOTP code. Unfortunately, doing this routine throughout the day causes a break in productivity and concentration. And a high effort attacker can find ways to defeat the TOTP by hijacking the browser, DNS entries and other similar techniques. Causing this much friction, the authenticator discourages the user which leads to unsecure habits.”

It’s worse for those users — there are some still — who don’t have a mobile phone or live in a rural area mobile phone dead zone. As a result, users tend to ignore MFA unless it is required by the service — and some services offer it without requiring it. There is an argument that this is a service issue rather than a user issue: services rather than users should decide whether MFA is required. Banks almost universally require MFA; Google offers it but does not require it.

If MFA is treated purely as a service responsibility, then it would be up to those requiring it to reduce the friction. They are doing so by shifting the second factor (and more) towards behavioral authentication, which can often be taken without friction from the user’s mobile phone. 

Given the problems and difficulties with MFA — which is not universally offered — we come back to password and password strength. Here the modern user has little excuse given the password storage capabilities of modern browsers. Google’s own Chrome browser, for example, can generate strong unique passwords, store them safely, and insert them automatically at log-on to a site. Users can have as many strong unique passwords as is necessary without having to remember any of them, and without having to rely on a third-party password manager.

Google’s Emily Schechter, product manager for Chrome Security at Google, describes her work as improving both the security and usability of the browser. She told SecurityWeek that using Chrome to manage internet passwords is completely safe. While it is true that an attacker with access to a device could also access the passwords stored by Chrome, it is already game over if the attacker has the device.

To further protect the integrity of passwords, Google is also introducing a new Chrome extension called Password Checkup. This extension informs users whenever they use a logon password that is known to have been hijacked. The user can then change the password. In cases where the password was neither generated by nor stored within Chrome, no information is sent to Google.

In reality, while the jury is still out over the value of some forms of MFA, there is little excuse for the poor password practices detected by the Google/Harris poll.

Related: Acceptto Emerges from Stealth with Behavioral Biometric Authentication  

Related: Why User Names and Passwords Are Not Enough 

Related: Google Helps G Suite Admins Enforce Strong Passwords 

Related: The Enduring Password Conundrum 

Related: Spring 2018 Password Attacks 

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Identity & Access

Strata Identity has raised $26 million in a Series B funding round led by Telstra Ventures, with additional investment from Forgepoint Capital, Innovating Capital,...