Weak passwords defeat secure access

secure access

One benefit to all of the leaked information from site breaches is that it provides researchers with access to millions of passwords and user names. Password management company SplashData recently released their analysis of the worst passwords of 2015.

Reviewing more than 2 million passwords leaked in 2015, they found that users are beginning to come up with longer passwords (which is good), but they tend to be simple and not random (boo). The two examples provided were the old favorite “1234567890” and the lame “qwertyuiop,” which you can figure out yourself.

Here is the list:

  1. 123456 (Unchanged)
  2. password (Unchanged)
  3. 12345678 (Up 1)
  4. qwerty (Up 1)
  5. 12345 (Down 2)
  6. 123456789 (Unchanged)
  7. football (Up 3)
  8. 1234 (Down 1)
  9. 1234567 (Up 2)
  10. baseball (Down 2)
  11. welcome (New)
  12. 1234567890 (New)
  13. abc123 (Up 1)
  14. 111111 (Up 1)
  15. 1qaz2wsx (New)
  16. dragon (Down 7)
  17. master (Up 2)
  18. monkey (Down 6)
  19. letmein (Down 6)
  20. login (New)
  21. princess (New)
  22. qwertyuiop (New)
  23. solo (New)
  24. passw0rd (New)
  25. starwars (New)

When you need secure access for network management

Uplogix doesn’t care if you want to use Star Wars as an inspiration for your passwords, but we can definitely help keep your network infrastructure secure. We extend role-based administrative access policies to devices with detailed auditing and reporting for compliance when the network is up, or down. Some of the specific cybersecurity functions include:

  • Maintain and enforce AAA (Authentication, Authorization and Accounting of the state of the network. Under normal circumstances, Uplogix Local Managers (LMs) integrate with remote multi-factor authentication mechanisms, such as TACACS and Radius, but if connectivity is lost, the LM can failover to other AAA servers before falling back on cached authentication data to maintain authorized access.
  • Prevent unauthorized user access by automatically closing idle sessions, eliminating a potential security gap. Uplogix also ensures that the right users have the right access by enforcing granular, role-based permissions.
  • Enable audit and compliance reporting by constantly logging all changes made to managed devices and the results of these changes.
  • Eliminate modem security issues with call-home connectivity. Uplogix appliances always “dial-out,” never allowing in-bound dial-up requests, to restore connectivity when the primary network connection goes down, closing common security holes.
  • Improve overall security by restricting access to specific IP addresses and encrypting passwords stored in the database, and by automating management functions related to security enforcement, like updating the access passwords on hundreds of managed devices at once.

For more information, visit Uplogix.com/network-security or check out the Granular Authorization video:[/fusion_text]

Uplogix TechTip: Granular Authorization and Access

Uplogix provides highly configurable and granular role-based administrative access to managed gear. Role-based access controls and complete activity logging (including system prompts and responses) are maintained even when the network is down.

Published:

Share:

Subscribe to Blog Updates

More Posts

Uplogix Resource Center

Uplogix attacks the challenges of network management from a different angle. Take a few minutes to browse through our Data Sheets, Case Studies and additional resources to see for yourself.