Password wrap up and summary
While this is the latest in password technology, it is not the final word – more changes will come. For example, biometric and other types of password validation methods will become the norm as well. And just as keyboards may fade away over time, so might today’s traditional passwords.
Cyber attacks will continue to grow over time and executives will remain accountable for taking the steps necessary to protect corporate data.
While there may be dependencies on the application and system vendors that incorporated password methodologies, IT executives should modify relevant configurations and policies, where possible, to address the changes. This shift to the new directives should get priority and the word disseminated to employees and users of company systems.
Business and IT executives should update their password methodologies to incorporate the latest NIST thinking and implement it throughout the organization as quickly as possible.