Technology in terms you understand. Sign up for the Confident Computing newsletter for weekly solutions to make your life easier. Click here and get The Ask Leo! Guide to Staying Safe on the Internet — FREE Edition as my thank you for subscribing!

Is a Periodic Password Change a Good Thing?

When does a good password go bad?

Conventional wisdom says to change your passwords periodically. I disagree.
The Best of Ask Leo!
A home office desk with a frustrated man sitting in front of a computer. The screen shows multiple reminders for password changes, with sticky notes scattered around displaying various passwords crossed out. The man's expression reflects annoyance, with his hand on his forehead.
(Image: DALL-E 3)
Question: I read many articles (including some on Ask Leo!) that recommend that people should change their passwords from time to time. But what is good practice in this respect? Should it be related to frequency of use? For instance, some passwords are used frequently, some less often, and some rarely. Or should it be related to the level of security needed? For instance, passwords for online banking are more sensitive than passwords for magazine subscriptions. Good practice in a corporate environment seems to be to force network and other password changes every 30 days or so. This would seem to be overkill in the home environment, as it could result in some accounts being accessed more often to change a password than to do anything else. Unless you get into a good routine, like when you do data backups, password changes will only get done sporadically, if at all. Do you have a view on how to build such a good routine?

As you say, routines for things like this are difficult to set up. If not automated, they are easily forgotten. Automation may often be the answer but it’s not always available, at least not in a convenient form.

But before we even get to that, I want to talk about the “you should change your password periodically” rule of thumb.

I disagree.

Become a Patron of Ask Leo! and go ad-free!

TL;DR:

Periodic Password change

There’s no reason to change your password only because time has passed. Most password-based hacks have little to do with age and more to do with bad passwords, phishing attacks, and/or keystroke loggers. For the best security, use good password hygiene to begin with. Change your password if you hear of a breach or something else that affects your account.

Password value over time

Conventional wisdom is to change your password every so often. I know of no good reason to do that. If it was ever a good guideline, it’s certainly outlived its usefulness.

There’s nothing about the age of a password that makes it lose quality over time.

The vast majority of password-based hacks are due to:

  • Weak passwords
  • Sharing passwords when you shouldn’t
  • Phishing attacks
  • Technology-based compromises like malware (especially keyloggers)

Hackers get your current password without regard to its age. It doesn’t matter whether you changed it last week or last year; they have it right now.

Periodically changing your password adds a tiny layer of security that avoids less common threats such as the compromise of an old database of accounts and passwords. These things happen, but not nearly as often as the more common compromises mentioned above. Even when they do, more often than not your password is never exposed because of how databases are maintained.

Keeping a password safe

Here’s how to keep your passwords (and accounts) safe, in priority order.

  1. Choose a good password.

    Longer is better. If you’re still using an eight- or even a 12-character password, it’s not long enough; passwords should be at least 16 or 20 characters or longer.

  2. Tell no one.

    I’m always surprised at how often people share passwords. Then they’re surprised when their friend is no longer their friend or their spouse is no longer their spouse and suddenly their email, Facebook, or other account is compromised.

  3. Don’t write it down.

    Yes, make it a good password, but either make it something you can remember, so you don’t have to write it down, or use a password manager to remember it for you.

  4. NEVER re-use passwords.

    When you re-use passwords, you allow the compromise of one account to affect all your accounts using the same password. Hackers know that people do this, and they absolutely try it to see if you’re one of those people. This may be the most common way accounts get compromised.

  5. If hacked, secure your account.

    Remember that changing your password is not enough if your account gets compromised.

  6. Consider adding two-factor authentication.

    For those accounts that support it, two-factor authentication prevents hackers from getting in even if they know the password.

When to change your password

There are situations where you do want to change your password, but they’re not tied to a schedule or length of time.

  • Change your password if you realize you’ve selected a poor password, be it easy to guess or too short. Choose a better, more secure one.
  • Change your password at the first hint of strange account activity. If your account has been hacked, doing this immediately is step one. Then take additional steps to secure your account. 
  • Change your password if you find out that the service has been compromised. For instance, if you read about your favorite online store getting hacked, immediately change your password there.
  • If you’ve been using a service (say an email service gets hacked) as the alternate account for one of your other accounts, consider changing the other account’s password as well.

Automating the process

As you can see, I’ve concluded that a periodic password-changing routine isn’t as important as we’ve been led to believe. Perhaps you don’t agree and still want to set up a system, as our questioner did. So, how to automate this process?

The only approach I can think of is to set a reminder in your calendar. The problem is that changing your password on all your accounts (I have over 350) just isn’t practical. As a result, we skip it.

Technology is the other approach.  There are systems — including Windows itself — that can be configured to require you to change your password according to a set schedule. The problem here is that most password-requiring systems don’t include this type of functionality. For example, the major free email providers do not.

The power of determination

I’ll end this with a story I’ve seen myself (and also overheard in an episode of Security Now!) as an example of how ineffectual forced periodic password changes can be.

A company had configured its Windows logins to require a new password every 30 days. It had also configured the system so you couldn’t re-use your last five passwords; you had to come up with a new one each time.

So one individual, every 30 days, would change his password six times in succession, so his current password would be forgotten by the system and he could use it again.

Yes, he changed his passwords six times in a row so he could end up with his favorite password — unchanged.

Users can be… innovative at getting what they want.

Do this

Use good password hygiene, of course. I’ve described what I mean by that above. But there’s no need to change your password because time has passed.

Subscribe to Confident Computing! Less frustration and more confidence, solutions, answers, and tips in your inbox every week.

Podcast audio

Play

25 comments on “Is a Periodic Password Change a Good Thing?”

  1. For the average person this has become unmanageable nightmare. I have passwords written in my day planner and even stuck to my laptop. I have so many and have been forced to change passwords so much that I don’t have a choice. I think the forced password change is a horrible idea and it only forces people to keep writing them down which makes them unsafe (DUH). It is a complete waste of my time and I suspect is probably just keeping some tech geeks employed….Please stop the madness, I HATE IT!!!!!!

    Reply
  2. In Mark Burnett’s book “Perfect Passwords: Selection, Protection, Authentication” (https://amzn.com/1597490415), he relates the tale of a company constantly being targeted by “crackers” (the “correct” term for “hackers”); the personnel had strong passwords, but because users were changing their passwords piecemeal, and because the crackers always had at least one password that worked, the crackers were able to leverage their way back into the system. Solution? Every employee (all 500 of them!) had to change ALL of their passwords on the SAME DAY! That did lock the intruders out (and I can only imagine their growing frustration as the found account after account closed to them); but this is the only sort of occasion where I can see such a massive password change being truly necessary (one wonders what kind of security that company had, that required such an extreme measure in the first place).

    Leo, you mention “Tell no one,” and emphasize the need to keep one’s password a secret. Unfortunately, things aren’t always that simple. There may be a legitimate need to share one’s password in order to grant temporary access. What truly astonishes me is that those who do this so often fail to take the basic and rudimentary step of changing their password afterwards!

    Folks, if you must grant temporary access to an account, please do the obvious! Either —

    1. Log in beforehand, out of the other person’s sight, so he or she never learns your password; OR,

    2. Log in with the person present, then change your password after he or she leaves; OR,

    3. Change your password BEFORE the person arrives, log on with that new password while the person is present, then change the password back to your previous one again (assuming the system will LET you!) after the person leaves.

    Whenever at all possible, I greatly prefer to use either (1) or (3), because those two will let you keep your original password intact. :)

    Hope this helps!

    Reply
    • “Leo, you mention “Tell no one,” and emphasize the need to keep one’s password a secret. Unfortunately, things aren’t always that simple.”

      I totally get that, and indeed don’t follow my own rules to the letter. (My wife knows many of my passwords, for example, and other friends have trusted me with theirs as I’ve helped them out with things.)

      I publish that hard line, though, because too many people are much too quick to share with others when they shouldn’t. I want it to be a well considered decision, if they do, including the steps you list for regaining privacy thereafter.

      Reply
      • Yeah, I have been using Password Safe (pwsafe dot org for Windows version) since probably around 2007 or so and the Windows database works fine on Linux to (Linux version is here… sourceforge.net/projects/passwordsafe/files/Linux/ ). I had no issues with it as it just works and, to state the obvious, make sure to make backups of the database file otherwise if your main file ever gets corrupt or lost from say a hard drive crash etc you can easily restore your Password Safe database file from the backups.

        also, to further harden the Password Safe database file a bit I suggest… Options > Security. then raise the ‘Unlock Difficulty’ slider a bit higher (I use roughly 25% higher than default). this increases time it takes to open the database file but unless your computer has a really slow CPU it only ads a small delay before opening after you enter your password to access the database. but this probably does not matter all that much, especially if your master password is very secure. but if it’s moderately secure I suspect it could help against brute force attacks should someone try to crack your Password Safe database file since it will slow the amount of passwords they can test in the same amount of time as if this is slowed down enough, as long as your password is not horrible, chances are it won’t be cracked. but I suspect it’s not likely someone would try to brute force your Password Safe database file in general unless a person stores it online in which case it’s possible it will help. but if I was storing the Password Safe database file online it would definitely run it through AT LEAST one other encryption program with a password that’s guaranteed secure (i.e. Diceware (with say a 10 word password which is 129bits of entropy) and the like) etc.

        Reply
    • I have been using RoboForm for the last 15 years, but unfortunately its utility for me has diminished as my browsers mostly no longer support it now web-extensions are out of favour. I’d be interested to know if any of the others still work on most browsers, and also if you have any views about using form-fillers built into browsers.

      Reply
        • I agree with Leo that extensions still work and are in use.

          I, too, have used Roboform for the last 10-12 years and I find it works with all of my browsers. I use Chrome, Edge, occasionally, IE, and, rarely, Foxfire. I also have it as an app on my Samsung S9 (and my iPhone before that). I’ve never had an issue with Roboform. In fact, the recent incarnations and upgrades have polished it to the point that I can see no reason to consider any other manager – although I have been looking at LastPass. For now, I am quite content.

          Reply
  3. How about a “Computer” changing password? Like selecting the first three letters of the current month with the second in Uppercase while the others in lower, then the first four digits of the year, in reverse order, and then selection of special characters (#* ) in four random selection of order, with the randomity being according to the chosen email account??
    I think you may help many of your readers doing that, which will be difficult for hackers to do, and
    .specially that the randomness changes with the selected computer (from one laptop, to another, to a desktop…etc)..

    Reply
  4. Uncle Sam hasn’t gotten the message about passwords. The Department of Defense still requires changing passwords every 150 days, even when using 2FA. Until recently, the Social Security Administration had a similar requirement. They now use Login.gov or ID.me.
    I use Bitwarden and max out most of the passwords. I only change them if I get informed about a breach. What I’m surprised by is some sites still limit the number and types of characters even today. I have several that are only 8 characters, letters and numbers only. Fortunately those sites don’t have any financial information of mine that would be of any use.

    Reply
  5. Leo,

    I just noticed your reply comment to my comment of 11/10/2020 (yes, I reread all the old comments -slow day …).

    I just checked my copy of Roboform and they do offer an Import/Export function. It is located in the “Account and Data” section of the Options menu. Of course, this might have been for an update subsequent to 2020 when the original article was published.

    Keep on keepin’ on …

    Ed Kant
    Naples, FL

    Reply
  6. My solution (?) is to:

    1) create a Word file
    2) holding all my usernames and passwords,
    3) unique passwords created by random-generators
    4) like 4s8s9DfG4xFF&0$H&ds^,
    5) the Word file updated whenever a password is changed or created,
    6) the Word file stored on three small thumb drives,
    7) one hidden at arm’s length from my computer,
    8) the other two, backups of course, hidden in our house where a burglar would never find them.

    I recognize this may not work for everyone. For example, I don’t do computing outside the house nor ever on the phone. Our house is all-electric, so no chance of a gas fire. I live across the street from a fire hydrant and only a mile from our town’s fire house.

    Lot of problems with my plan, I know, but it’s worked for me so far. One day, though, I’m going to look into BitWarden.

    Reply
  7. Leo, how true your article is. I used to work at a place that insisted we changed our password once a month; guess what, most of us used our favourite password with a number at the end which we incremented each month. Now that I am retired, I use a password manager with a unique and unmemorable password for each account. Use 2FA where possible and only change a password where there has been a breach.

    Reply

Leave a reply:

Before commenting please:

  • Read the article.
  • Comment on the article.
  • No personal information.
  • No spam.

Comments violating those rules will be removed. Comments that don't add value will be removed, including off-topic or content-free comments, or comments that look even a little bit like spam. All comments containing links and certain keywords will be moderated before publication.

I want comments to be valuable for everyone, including those who come later and take the time to read.