{"id":8,"date":"2023-09-19T19:27:54","date_gmt":"2023-09-19T19:27:54","guid":{"rendered":"https:\/\/blog.nfrontsecurity.com\/?p=8"},"modified":"2023-11-22T17:11:35","modified_gmt":"2023-11-22T17:11:35","slug":"ncsc-password-guidance-and-recommendations","status":"publish","type":"post","link":"https:\/\/nfrontsecurity.com\/blog\/ncsc-password-guidance-and-recommendations\/","title":{"rendered":"NCSC Password Guidance and Recommendations"},"content":{"rendered":"\n<p>The NCSC (National Cyber Security Centre) provided guidance for Systems Administrators to simplify their approach to passwords. This guidance is not mandatory, but rather recommendations to eliminate the risk of breaches due to weak passwords on a company network. Furthermore, NCSC\u2019s guidance is intended to reduce the daunting task of users having to recall complex password requirements. From an initial standpoint, NCSC resembles NIST compliance. NIST compliance\u2019s general concept is to eliminate complex passwords by requiring longer passwords. In other words, they would prefer for users to create a password like&nbsp;<em>I ate pineapple for breakfast<\/em>&nbsp;than&nbsp;<em>monkey#BUSINESS77<\/em>. For more information about NIST, click&nbsp;<a href=\"https:\/\/vimeo.com\/477236689\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n\n\n\n<p>For background knowledge, NCSC is a part of the GCHQ (Government Communications Headquarters). GCHQ is partners with Secret Intelligence Services (MI6) and MI5. The ultimate goal of both NCSC and GCHQ is to keep people safe.<\/p>\n\n\n\n<p>The NCSC password security guidance begins with how passwords are cracked. According to NCSC, passwords are cracked by: interception, brute force, searching, stealing passwords, manual guessing, shoulder surfing, social engineering, and key logging. Here are descriptions for what each method means:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Interception: A hacker can intercept a password as it is being transmitted across a network.<\/li>\n\n\n\n<li>Brute Force: A hacker uses a software that will automatically guess millions of passwords until the correct password is found or the list is exhausted.<\/li>\n\n\n\n<li>Searching: A hacker can search the IT infrastructure for stored password information.<\/li>\n\n\n\n<li>Stealing Passwords: A hacker would use information provided that is insecurely stored. For example, a password might be written on a notecard next to a computer.<\/li>\n\n\n\n<li>Manual Guessing: A hacker would guess passwords until the correct password is found. Usually, personal information and commonly hacked passwords are used for the guessing tactics.<\/li>\n\n\n\n<li>Shoulder Surfing: A hacker would watch a user as the password is typed into the computer.<\/li>\n\n\n\n<li>Social Engineering: A hacker would use tactics to trick a user into revealing their password. An example of this would be a phishing attempt via email.<\/li>\n\n\n\n<li>Key Logging: A hacker would install a device which intercepts the password as it is typed into the computer.<\/li>\n<\/ul>\n\n\n\n<p>Finally, the NCSC provides guidance on how to improve your company\u2019s system security. Here are a few key tips for success:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Blacklist commonly used passwords.<\/li>\n\n\n\n<li>Monitor failed login attempts and have a procedure in place to report any abnormal activity.<\/li>\n\n\n\n<li>Prioritize passwords for administrator and remote user accounts.<\/li>\n\n\n\n<li>Never store passwords in plain text format.<\/li>\n\n\n\n<li>Change default vendor supplier account passwords before new software is deployed.<\/li>\n\n\n\n<li>Use account lockout features to prevent brute force password attacks.<\/li>\n<\/ul>\n\n\n\n<p>Many of these tips can be easily obtained with internal systems as well as a Windows Password Filter, more specifically the&nbsp;<a href=\"https:\/\/nfrontsecurity.com\/products\/nfront-password-filter\/\" target=\"_blank\" rel=\"noreferrer noopener\">nFront Password Filter<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The NCSC (National Cyber Security Centre) provided guidance for Systems Administrators to simplify their approach to passwords. This guidance is not mandatory, but rather recommendations to eliminate the risk of breaches due to weak passwords on a company network. Furthermore, NCSC\u2019s guidance is intended to reduce the daunting task of users having to recall complex [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[13,14],"class_list":["post-8","post","type-post","status-publish","format-standard","hentry","category-compliance","tag-nist","tag-password-guidance"],"featured_image_src":{"landsacpe":false,"list":false,"medium":false,"full":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NCSC Password Guidance and Recommendations - Password123<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nfrontsecurity.com\/blog\/ncsc-password-guidance-and-recommendations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NCSC Password Guidance and Recommendations - Password123\" \/>\n<meta property=\"og:description\" content=\"The NCSC (National Cyber Security Centre) provided guidance for Systems Administrators to simplify their approach to passwords. This guidance is not mandatory, but rather recommendations to eliminate the risk of breaches due to weak passwords on a company network. Furthermore, NCSC\u2019s guidance is intended to reduce the daunting task of users having to recall complex [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nfrontsecurity.com\/blog\/ncsc-password-guidance-and-recommendations\/\" \/>\n<meta property=\"og:site_name\" content=\"Password123\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nFrontsoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-19T19:27:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-22T17:11:35+00:00\" \/>\n<meta name=\"author\" content=\"Gregg B\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nfrontsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@nfrontsecurity\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gregg B\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/ncsc-password-guidance-and-recommendations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/ncsc-password-guidance-and-recommendations\\\/\"},\"author\":{\"name\":\"Gregg B\",\"@id\":\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/#\\\/schema\\\/person\\\/f9c9fef8e54a5e7bd9ac876f60be041b\"},\"headline\":\"NCSC Password Guidance and Recommendations\",\"datePublished\":\"2023-09-19T19:27:54+00:00\",\"dateModified\":\"2023-11-22T17:11:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/ncsc-password-guidance-and-recommendations\\\/\"},\"wordCount\":461,\"publisher\":{\"@id\":\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/#organization\"},\"keywords\":[\"NIST\",\"Password Guidance\"],\"articleSection\":[\"Compliance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/ncsc-password-guidance-and-recommendations\\\/\",\"url\":\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/ncsc-password-guidance-and-recommendations\\\/\",\"name\":\"NCSC Password Guidance and Recommendations - Password123\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/#website\"},\"datePublished\":\"2023-09-19T19:27:54+00:00\",\"dateModified\":\"2023-11-22T17:11:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/ncsc-password-guidance-and-recommendations\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/ncsc-password-guidance-and-recommendations\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/ncsc-password-guidance-and-recommendations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NCSC Password Guidance and Recommendations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/\",\"name\":\"Password123\",\"description\":\"Friends do not let friends use bad passwords.\",\"publisher\":{\"@id\":\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/#organization\",\"name\":\"Password123\",\"url\":\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/nFront-Logo-for-Blog.png\",\"contentUrl\":\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/nFront-Logo-for-Blog.png\",\"width\":520,\"height\":139,\"caption\":\"Password123\"},\"image\":{\"@id\":\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/nFrontsoftware\\\/\",\"https:\\\/\\\/x.com\\\/nfrontsecurity\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/nfront-security-inc-\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/#\\\/schema\\\/person\\\/f9c9fef8e54a5e7bd9ac876f60be041b\",\"name\":\"Gregg B\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e7644a213c0452e3528cd193a0a3b190c30b968ed6d340adc5a21fcc0c60fbcf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e7644a213c0452e3528cd193a0a3b190c30b968ed6d340adc5a21fcc0c60fbcf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e7644a213c0452e3528cd193a0a3b190c30b968ed6d340adc5a21fcc0c60fbcf?s=96&d=mm&r=g\",\"caption\":\"Gregg B\"},\"description\":\"Gregg has been working with Windows Server technologies since Windows NT 4. He has taught classes worldwide on Windows, TCP\\\/IP and Cisco Technologies. He has written magazine articles and authored a book for Macmillan Technical Publishing on Windows domain architecture.\",\"url\":\"https:\\\/\\\/nfrontsecurity.com\\\/blog\\\/author\\\/gregg\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NCSC Password Guidance and Recommendations - Password123","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nfrontsecurity.com\/blog\/ncsc-password-guidance-and-recommendations\/","og_locale":"en_US","og_type":"article","og_title":"NCSC Password Guidance and Recommendations - Password123","og_description":"The NCSC (National Cyber Security Centre) provided guidance for Systems Administrators to simplify their approach to passwords. This guidance is not mandatory, but rather recommendations to eliminate the risk of breaches due to weak passwords on a company network. Furthermore, NCSC\u2019s guidance is intended to reduce the daunting task of users having to recall complex [&hellip;]","og_url":"https:\/\/nfrontsecurity.com\/blog\/ncsc-password-guidance-and-recommendations\/","og_site_name":"Password123","article_publisher":"https:\/\/www.facebook.com\/nFrontsoftware\/","article_published_time":"2023-09-19T19:27:54+00:00","article_modified_time":"2023-11-22T17:11:35+00:00","author":"Gregg B","twitter_card":"summary_large_image","twitter_creator":"@nfrontsecurity","twitter_site":"@nfrontsecurity","twitter_misc":{"Written by":"Gregg B","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nfrontsecurity.com\/blog\/ncsc-password-guidance-and-recommendations\/#article","isPartOf":{"@id":"https:\/\/nfrontsecurity.com\/blog\/ncsc-password-guidance-and-recommendations\/"},"author":{"name":"Gregg B","@id":"https:\/\/nfrontsecurity.com\/blog\/#\/schema\/person\/f9c9fef8e54a5e7bd9ac876f60be041b"},"headline":"NCSC Password Guidance and Recommendations","datePublished":"2023-09-19T19:27:54+00:00","dateModified":"2023-11-22T17:11:35+00:00","mainEntityOfPage":{"@id":"https:\/\/nfrontsecurity.com\/blog\/ncsc-password-guidance-and-recommendations\/"},"wordCount":461,"publisher":{"@id":"https:\/\/nfrontsecurity.com\/blog\/#organization"},"keywords":["NIST","Password Guidance"],"articleSection":["Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/nfrontsecurity.com\/blog\/ncsc-password-guidance-and-recommendations\/","url":"https:\/\/nfrontsecurity.com\/blog\/ncsc-password-guidance-and-recommendations\/","name":"NCSC Password Guidance and Recommendations - Password123","isPartOf":{"@id":"https:\/\/nfrontsecurity.com\/blog\/#website"},"datePublished":"2023-09-19T19:27:54+00:00","dateModified":"2023-11-22T17:11:35+00:00","breadcrumb":{"@id":"https:\/\/nfrontsecurity.com\/blog\/ncsc-password-guidance-and-recommendations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nfrontsecurity.com\/blog\/ncsc-password-guidance-and-recommendations\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/nfrontsecurity.com\/blog\/ncsc-password-guidance-and-recommendations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nfrontsecurity.com\/blog\/"},{"@type":"ListItem","position":2,"name":"NCSC Password Guidance and Recommendations"}]},{"@type":"WebSite","@id":"https:\/\/nfrontsecurity.com\/blog\/#website","url":"https:\/\/nfrontsecurity.com\/blog\/","name":"Password123","description":"Friends do not let friends use bad passwords.","publisher":{"@id":"https:\/\/nfrontsecurity.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nfrontsecurity.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/nfrontsecurity.com\/blog\/#organization","name":"Password123","url":"https:\/\/nfrontsecurity.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nfrontsecurity.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/nfrontsecurity.com\/blog\/wp-content\/uploads\/2023\/06\/nFront-Logo-for-Blog.png","contentUrl":"https:\/\/nfrontsecurity.com\/blog\/wp-content\/uploads\/2023\/06\/nFront-Logo-for-Blog.png","width":520,"height":139,"caption":"Password123"},"image":{"@id":"https:\/\/nfrontsecurity.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/nFrontsoftware\/","https:\/\/x.com\/nfrontsecurity","https:\/\/www.linkedin.com\/company\/nfront-security-inc-"]},{"@type":"Person","@id":"https:\/\/nfrontsecurity.com\/blog\/#\/schema\/person\/f9c9fef8e54a5e7bd9ac876f60be041b","name":"Gregg B","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e7644a213c0452e3528cd193a0a3b190c30b968ed6d340adc5a21fcc0c60fbcf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e7644a213c0452e3528cd193a0a3b190c30b968ed6d340adc5a21fcc0c60fbcf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e7644a213c0452e3528cd193a0a3b190c30b968ed6d340adc5a21fcc0c60fbcf?s=96&d=mm&r=g","caption":"Gregg B"},"description":"Gregg has been working with Windows Server technologies since Windows NT 4. He has taught classes worldwide on Windows, TCP\/IP and Cisco Technologies. He has written magazine articles and authored a book for Macmillan Technical Publishing on Windows domain architecture.","url":"https:\/\/nfrontsecurity.com\/blog\/author\/gregg\/"}]}},"_links":{"self":[{"href":"https:\/\/nfrontsecurity.com\/blog\/wp-json\/wp\/v2\/posts\/8","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nfrontsecurity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nfrontsecurity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nfrontsecurity.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/nfrontsecurity.com\/blog\/wp-json\/wp\/v2\/comments?post=8"}],"version-history":[{"count":2,"href":"https:\/\/nfrontsecurity.com\/blog\/wp-json\/wp\/v2\/posts\/8\/revisions"}],"predecessor-version":[{"id":10,"href":"https:\/\/nfrontsecurity.com\/blog\/wp-json\/wp\/v2\/posts\/8\/revisions\/10"}],"wp:attachment":[{"href":"https:\/\/nfrontsecurity.com\/blog\/wp-json\/wp\/v2\/media?parent=8"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nfrontsecurity.com\/blog\/wp-json\/wp\/v2\/categories?post=8"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nfrontsecurity.com\/blog\/wp-json\/wp\/v2\/tags?post=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}