The Complete Guide to Modern Password Security
How to protect your organisation with NCSC-aligned password policies that balance genuine security with usability. Stop frustrating users with outdated rules that don't actually improve protection.
Your password policy is probably making your organisation less secure. Mandatory monthly changes, complex character requirements, and arbitrary rules don't prevent breaches. They frustrate users into predictable patterns that attackers exploit ruthlessly.
The UK's National Cyber Security Centre revolutionised password guidance precisely because traditional approaches failed. Their recommendations, now embedded in Cyber Essentials certification requirements, prioritise what actually works: length over complexity, multi-factor authentication over frequent changes, and technical defences over expecting perfect human behaviour.
Why Traditional Password Policies Fail
For decades, organisations enforced password rules designed around outdated assumptions about how attacks happen and how humans behave. These policies created security theatre: visible complexity that provided minimal actual protection.
The Complexity Trap
Traditional policy: "Passwords must contain uppercase, lowercase, numbers, and special characters. Minimum eight characters. Change every 30 days."
What actually happened: Users created predictable patterns. "Password1!" became "Password2!" next month, then "Password3!" the month after. Attackers know these patterns. Their tools exploit them automatically.
Real-World Consequence
Westminster Parliament suffered a brute-force attack in 2017, compromising 90 email accounts. The attackers exploited short, complex passwords that users had made predictable to remember them. Modern NCSC guidance specifically addresses this failure pattern.
The Monthly Change Problem
Forcing regular password changes sounds sensible. In practice, it achieves the opposite of its intent. Users increment passwords predictably, write them down, or reuse variations across systems. Each behaviour increases vulnerability rather than reducing it.
Research demonstrates that enforced changes create weaker passwords. The NCSC guidance acknowledges this reality and recommends change only when compromise occurs or is suspected.
NCSC Core Principles
The National Cyber Security Centre rebuilt password guidance on evidence rather than assumptions. Their approach centres on six fundamental principles that system owners should understand and implement.
1. Reduce Password Reliance
Use single sign-on, hardware tokens, or biometric authentication wherever practical. Passwords should be one layer, not the only layer.
2. Implement Multi-Factor Authentication
Especially for privileged accounts, internet-facing systems, and access to sensitive data. MFA prevents most credential-based attacks.
3. Prioritise Technical Controls
Account throttling after failed attempts, lockout policies, protective monitoring, and password deny lists defend better than user training alone.
4. Protect Passwords Properly
Salt and hash passwords with strong algorithms. Protect them in transit with HTTPS. Never store plain text passwords anywhere, ever.
5. Help Users Manage Passwords
Provide password managers. Support self-service resets. Make secure practices easier than insecure shortcuts.
6. Focus Training Effectively
Teach practical skills: spotting phishing, using password managers, enabling MFA, protecting high-value accounts. Skip generic warnings about "being careful".