It’s been years since we talked about passwords in this column. While passwords seem a bit old school, they are still what most people, including lawyers, use to gain access to protected networks and data. As Verizon’s 2018 Data Breach Investigations Report noted, “Eighty-one percent of hacking-related breaches leveraged stolen and/or weak passwords.”
Based on the questions we get from audiences at CLEs, there is now a fairly burning interest in upping security in law firms—and that’s a very good thing. Let’s start at the beginning with concepts that are sure to be new to some readers.
Fair warning: This is a good time to get a cup of strong coffee.
Multifactor authentication simply means a security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity for a login or other transaction. While it’s been around for a long time, it was ignored by most small businesses as it simply added another element of complexity and possible cost.
As we note constantly, users pick convenience over security every time. But as data breaches became commonplace and the compendium of known breached passwords became enormous, it became clear that we needed a stronger way to protect our data. If you visit the Pwned Passwords website of the Microsoft regional director and Most Valuable Professional awardee for Developer Security, Troy Hunt, as of Aug. 28, 2018, there were 517,238,891
Hunt’s database was introduced in August 2017 after the National Institute of Standards and Technology (NIST) released guidelines recommending that user passwords be checked against those revealed by known data breaches. This means that the good guys can now download the Pwned Passwords list and integrate it into their systems. They can now literally block the use of those compromised passwords, which is a very prudent move to make. While that’s a terrific new step to be taken, most small law firms have not taken it—at least not yet. It’s time to consider taking that step. And the next one would be to move to multifactor authentication.
Simplifying Multifactor Authentication
Here’s how we explain multifactor authentication to audiences. First, there is two-factor authentication, which is one form of multifactor authentication. Technically, many two-factor authentication systems are actually two-step authentication systems, but we won’t quibble over the little stuff. Small law firms are indeed beginning to use two-factor authentication, especially to get access to data in the cloud—perhaps client data, or perhaps the firm’s certified public accountant, payroll or banking data.
Two-factor authentication is often referred to in short as “2FA.” All of us, at this point, use 2FA somewhere in our lives. One common usage is when you enter your ID or password and you are sent a code via text message or via email. You then enter the code and your login is complete. This methodology is often used when we wish to change a password—and since lawyers notoriously forget passwords and need to reset them, we’re guessing most of you have been exposed to this scenario many times!
A common form of multifactor authentication is something the user knows (a password), something the user has (a token) and something the user is (biometrics). This is known as “defense in depth,” adding layer upon layer of security.
Let’s offer a few examples of multifactor authentication, just to make things simpler:
- You swipe a card and enter a passcode.
- You swipe a card and scan your finger, or you use a retina scanner, for biometric verification.
- You download a virtual private network client with a digital certificate and log in to the virtual private network before you can get into the network.
- You attach a USB hardware token to a laptop that generates a one-time passcode that you use to log in to a virtual private network client.
There are many variations on the theme, but you get the idea.
Why Do Lawyers Resist Multifactor Authentication?
Lawyers dislike learning new technology—at least most of our lawyer clients do. And they fear it will cost them time. Actually, multifactor authentication doesn’t have to be hard. For instance, suppose we want to log in to our bank account. With our
The truth is, we can’t even get our law firm clients to compose good passwords. What prayer do we have of getting them to accept multifactor authentication? We are actually apt to use the term 2FA because it scares them less than multifactor authentication, which they somehow think means three or more authentication factors rather than two or more. Constant prodding, and providing our clients with security statistics, has helped many law firms agree that 2FA is a minimum security requirement these days—and that is
Preaching About Passwords (But the Gospel Has Changed)
We’re not even going to talk about the old rules of coming up with passwords. The rules changed in 2017 when NIST issued its new Digital Identity Guidelines. The new guidelines were in large part based on an August 2016 Carnegie Mellon study that showed that, when it comes to passwords, length beats complexity. So those passwords you can’t remember because they are all random characters meaning nothing? Trash them.
What you need are passphrases that you can remember. NIST recommends that passwords be 14 to 64 characters long—and we are here to tell you that lawyers are not going to enter 64-character passwords. Therefore use a passphrase of 14 characters or more that you can remember, and improve its complexity with a special character or two.
An example (and a blast from the past): In the old television series “Batman,” Robin was fond of saying “Holy [insert a word] Batman”; he actually said “Holy Switcheroo, Batman!” in one episode. Since we know that many systems don’t allow for spaces in a password, we came up with “HolyswitcherooBatman!” as a good example of a strong password that you can remember.
And why is it important that you remember? Well, because a 2017 Pew Research Center study showed that 65 percent of Americans rely mainly on memorizing passwords. Forty-nine percent write at least some of them down. (And, sigh, this is obviously not a good practice, and yes, since we do undercover forensics examinations, we know where you all place your password sticky notes.) Twenty-four percent keep a list of their passwords on one of their digital devices (encrypted, one would hope, but we doubt it). Only 3 percent primarily rely on password management software to keep track of their passwords.
Worse yet, we reuse our passwords. The average user accesses 40 sites requiring a password—but uses only five passwords. We are our own undoing. As we said before, lawyers sacrifice security for convenience.
Certainly, our best advice is to use password management software. But we are realists and know that many lawyers will choose not to do that. So at least make your passwords strong under the new NIST standards—and do not reuse or share them. Never, ever reuse a password for your law firm network anywhere else. That is an engraved invitation into the law firm network if that password is breached on another site.
We leave you with some words to the wise:
- Do have passphrases as passwords and make them at least 14 characters long, with a special character or two.
- Do not reuse passwords.
- Do use multifactor authentication wherever it is available.
- Do not share passwords with others.
One final benefit of the new NIST guidelines is that we don’t need to change our passwords as frequently as was once thought. As long as the passwords are checked against a database of known compromised passwords and meet minimum criteria, they really don’t need changing on a regular basis. Huzzah for not having to go through this nuisance every 30 or 60 or 90 days. This could save you a fortune in sticky notes.