Nowadays everyone has multiple accounts across multiple domains and services, you have your email account, your work email account, your online bank account, your Amazon account, your Netflix account…
The list goes on and on, and sure: nobody likes remembering a lot of passwords; but for now, they are not going anywhere. Even with other means of authentication, in the end, you still need to hold on to your trusted password.
Everytime the password policy topic is discussed, the same principles are spelled out as a gospel:
But these policies are at the very least incomplete, and mostly wrong.
To choose a proper password policy we need first to understand the most common attacks to which the password will be subject.
Stepping away from social engineering – where we directly reveal our password, the most common attacks are:
Source: www.freevector.com
To make it as hard as possible for attackers to succeed using these methods, let’s take a look at modern password policies that we should try to implement in our personal accounts and within our work environment.
Passwords have changed only slightly over time, but password management is evolving considerably. Password managers represent one of the safest solutions to safeguarding your authentication information.
Stolen or weak passwords are still the most common reason for data breaches, so we should carefully examine our password security policies and password management.
Following the ten tips we provided in this article, you can create an effective password security policy and enforce stronger protection against unauthorised access.
After understanding the best practices on choosing and managing passwords, it is time to increase the security degree with some more protection measures. Consider that a password is a proof or evidence of identity that is “known to the user”, but this can be combined with other different kinds of evidence, in case some of the password knowledge is leaked.
The three well-known authentication factors, or kinds of credentials to verify the identity of a user, are grouped based on something the user…
A basic, common parallelism with real life is the need to protect a bike parked in the street. First, it should have different kinds of locks, to be opened with something owned (a key) or known (a code). A burglar will have a harder time removing all locks in order to get the bike in a profitable state. Another example would be accessing an office with any combination of card, fingerprint and/or access code.
Combining different authentication factors (e.g., something known by the user and something owned by the user) comprises the so-called Multi-Factor Authentication (MFA). In MFA, multiple (at least two) types of authentication factors are combined in order to increase security. Some of the most common types are:
Naturally, each authentication type has its pros and cons. Aspects like the security of the process, the reliability under failing conditions or the user experience are to be considered.
On the security side:
On the reliability side:
Now, besides the different types of MFA, other techniques may help achieve safer authentication:
Wrapping up: whichever combination of authentication factors you use, you should ask yourself questions like how easily your password could be guessed by others (or a machine); what could happen and what would be your backup plan in case a specific piece in the authentication chain is not accessible anymore or fails; in case all authentication steps rely on the same infrastructure (e.g., a mailbox, your computer and PC if bundled together in travels); etc.
Authors: Nil Ortiz, Carolina Fernández
December 3, 2025
December 2, 2025
November 27, 2025