Is it a mistake to use a password that has previously been used (by anyone ever)?

A few months ago, kutschkem answered a question about HIBP with this:

Let’s say every person on earth has used ~1000 passwords so far. That makes approximately 10 trillion passwords, which is ~243 if I am not mistaken. Choosing any exi… Continue reading Is it a mistake to use a password that has previously been used (by anyone ever)?

Automate Password Policy & NIST Password Guidelines

Enable automated password policy enforcement with daily password auditing and customizable remediation. With compromised password detection, custom password dictionary, fuzzy matching with common character substitutions, and continuous ongoing monitori… Continue reading Automate Password Policy & NIST Password Guidelines

Learning how to audit a linux system, what does it mean to configure password & system auth?

I’m currently using Linux Red Hat OS, and I need to configure it accordingly to /etc/pam.d/password-auth and /etc/pam.d/system-auth under CIS Red Hat Enterprise Linux 8 Benchmark v1.0.0-1.

What page do I start in that docume… Continue reading Learning how to audit a linux system, what does it mean to configure password & system auth?

Can an employee be sued for gross negligence by reusing personal passwords at work? [migrated]

An employee is using some easy guessable reused passwords well known to Have I Been Pwned.

OUCH.

Something bad happens.

Can an employee be sued?

Option A: An organization does not have password policy.

Option B: An organ… Continue reading Can an employee be sued for gross negligence by reusing personal passwords at work? [migrated]