Changing Passwords Periodically Doesn’t Increase Security

Does your organization or some financial website require you to create a new password periodically? This practice was recommended long ago, but some organizations haven’t kept up with current recommendations that discourage such policies. If you’re bound by a password expiration policy, you can use this article to encourage your IT department or financial institution to update its approach to password security.

The rationale behind password expiration policies was that if an attacker were to steal a password database and decrypt some passwords, they would work for only a limited period, lessening the risk of unauthorized access. Even if an attacker gained access to an account, they could remain undetected only if they didn’t change the password, and that access wouldn’t last indefinitely.

Over time, security experts realized that the problem wasn’t so much how long an attacker could remain undetected but allowing users to set weak passwords that could be decrypted. It turns out that users often choose weaker passwords when they know they will have to change them, perhaps by tweaking a previous password for easier memorization. This fact hasn’t been lost on attackers, making it easier for them to figure out future passwords. In other words, attempting to increase security by requiring users to change passwords paradoxically reduces security.

The National Institute for Standards and Technology (NIST) is a US government agency that develops cybersecurity standards and best practices for the federal government that large corporations and other institutions tend to follow. In 2017, NIST changed its guidelines to say, “Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically).” In a FAQ, NIST explains:

Users tend to choose weaker memorized secrets when they know that they will have to change them in the near future. When those changes do occur, they often select a secret that is similar to their old memorized secret by applying a set of common transformations such as increasing a number in the password. This practice provides a false sense of security if any of the previous secrets have been compromised since attackers can apply these same common transformations.

Of course, if there’s evidence of unauthorized access or a breach of the password database, all passwords should be invalidated and everyone should be required to create a new password immediately—that’s entirely different than requiring passwords to be changed on a schedule.

Interestingly, NIST also doesn’t recommend password composition requirements—such as requiring the password to contain a letter, number, and special character—because users tend to devise predictable techniques to meet such requirements, such as appending an exclamation point to every password. Instead, NIST encourages longer passwords because a long password that’s easily remembered and typed can be stronger than a shorter password composed of random characters. Password managers can generally create both types.

If you’re forced to change a website password periodically, it’s easiest to use a password manager to generate and enter a new strong password, and you won’t have to memorize the new password. For the very few passwords you must remember and type manually, aim for longer passwords that won’t trip up your fingers while typing or require numerous switches of iPhone uppercase and numeric keyboards. To aid memorization, perhaps consider choosing words for your password from categories with many possibilities. For instance, if your initial password is gouda-purple-1989-New-York, the next one could be cheddar-black-2011-Des-Moines. Both are strong in their own right, but only you would know the categories used for each portion.

(Featured image based on an original by iStock.com/designer491)


Social Media: Security experts no longer recommend password expiration policies that require users to change their passwords periodically. Here’s why.

More Insights

Tech Article

Not All Your Mac’s USB-C Ports Are the Same

We recently helped a client set up an external boot drive on a Mac mini for testing, but the installation kept failing near the end with vague errors. We tried different cables, swapped drives, and more, to no avail. On a hunch, we moved the SSD to a different USB-C port, and the installation completed […]

Read More »
Tech Tip

macOS 26.4 Warns Against Terminal-Based Malware Attacks

We’ve warned before about scams that trick users into pasting malicious commands into Terminal. Attackers create fake CAPTCHA pages—often resembling Cloudflare’s “are you a human” tests—that instruct visitors to open Terminal, paste a command, and press Return. Because the user executes the command themselves, macOS’s security protections are bypassed. Malwarebytes recently documented a macOS infostealer […]

Read More »
Tech Tip

Check Your Input Source If Your Mac Types Unexpected Characters

If your Mac starts typing unexpected characters—or rejects a password you know is correct—check to see if the Input Source menu appears in the upper-right corner of the screen, indicating that your Mac has more than one keyboard layout available for writing in other languages. Accidentally switching from the standard U.S. keyboard (or whatever you […]

Read More »
Tech Article

Understanding New MacBook Battery Charging Features

The just-released macOS 26.4 Tahoe introduced two battery-related features for MacBook users, helping them understand and control MacBook charging. A Slow Charger indicator now appears in the battery status menu and in Battery settings when your Mac is connected to a charger that isn’t delivering the minimum recommended wattage. More significantly, a new Charge Limit […]

Read More »
Tech Article

View Suspicious Documents Safely with Dangerzone

A standard piece of advice for staying safe online is to avoid opening attachments from people you don’t know or attachments that seem suspicious. It’s good advice, since PDFs and office documents can contain JavaScript and macros that present a security risk, or they could be maliciously crafted to take advantage of vulnerabilities in common […]

Read More »
Tech Tip

Create AI-Powered Playlists with iOS 26.4’s Playlist Playground

Apple Music subscribers running iOS 26.4 can use the new Playlist Playground feature to create AI-generated playlists tailored to any mood, genre, activity, or era. To try it on your iPhone, open the Music app, tap the Library tab, tap the + button, then tap Create New Playlist. Instead of manually adding songs, tap the […]

Read More »

If you are here and not sure how to proceed, please call us at 626-286-2350, and we would be happy to help you find a solution to your needs.