Security professionals have spent decades teaching people to create complex passwords, change them regularly, and never reuse them across sites. Meanwhile, the most devastating breaches continue happening because these rules don’t address how attackers actually compromise credentials. Password complexity requirements force users to create passwords like “P@ssw0rd123!” that satisfy character requirements whilst remaining trivially guessable. Mandatory password changes every 90 days encourage predictable patterns where users increment numbers or swap special characters. These policies create the illusion of security whilst training users in behaviours that actually weaken protection.
The Real Threats to Credential Security
Attackers rarely crack passwords through brute force anymore. They purchase credentials leaked from breached databases, use keyloggers to capture passwords directly, or simply trick users into providing credentials through phishing. Complex password policies don’t defend against any of these attacks. Credential stuffing attacks succeed because users reuse passwords across multiple sites. When a gaming forum gets breached, attackers try those credentials against banking sites, corporate VPNs, and cloud services. Password complexity doesn’t matter if the same password protects everything.
Expert Commentary
Name: William Fieldhouse
Title: Director of Aardwolf Security Ltd
Comments: “Password audits during our assessments reveal that strict complexity requirements actually reduce security. Users create patterns that satisfy rules whilst remaining memorable, leading to passwords that appear complex but follow predictable structures. We crack these ‘secure’ passwords faster than simple, long, random phrases.”

What Actually Improves Credential Security
Length matters more than complexity. A 16-character password containing only lowercase letters provides better security than an 8-character password with uppercase, numbers, and symbols. Attackers must try exponentially more combinations as length increases, whilst complexity adds linear difficulty.
Password managers solve the reuse problem properly. Generate unique random passwords for every service, store them encrypted, and synchronise across devices. Users only need to remember one strong master password instead of dozens of weak variations. Working with the best penetration testing company includes assessment of password management practices across the organisation.
Multi-factor authentication provides defence when passwords inevitably compromise. Even if attackers obtain credentials, they can’t access accounts without the second factor. This doesn’t eliminate password importance, but it significantly reduces the impact of credential theft. Implement passkeys where possible. These cryptographic credentials can’t be phished, don’t require memorisation, and work across devices seamlessly. They’re not suitable for every application yet, but adoption is growing rapidly as industry support expands.
Moving Beyond Traditional Passwords
Monitor for credential exposure proactively. Services scan breach databases for employee credentials and alert when corporate passwords appear in leaks. This allows forced resets before attackers exploit compromised credentials. Many organisations only discover credential exposure during post-breach investigations. Ban common passwords at creation time. Check new passwords against lists of frequently used and previously breached passwords. This prevents users from choosing “Password123” whilst allowing complex passwords that don’t appear in attacker dictionaries.
Regular web application penetration testing includes credential security assessment. Testing authentication mechanisms identifies weaknesses like inadequate lockout policies, poor session management, or insufficient protection against credential stuffing attacks.
Consider passwordless authentication for appropriate use cases. Biometrics, hardware tokens, or magic links sent to verified email addresses can replace passwords entirely. These aren’t perfect solutions, but they eliminate entire categories of password-related attacks.
The Organisational Challenge
Changing password policies requires overcoming years of ingrained habits. Users expect complexity requirements because they’ve seen them everywhere. Removing these requirements without explanation causes confusion and concern. Education about why simpler, longer passwords provide better security helps smooth this transition. Legacy systems often enforce outdated password rules. Updating these systems requires investment that security budgets may not accommodate easily. Prioritise changes to systems handling the most sensitive data, then expand to other systems as resources allow. Password security evolves as threats change. The rules that made sense when attackers primarily used brute force don’t address modern credential theft methods. Organisations that adapt their password policies to counter actual threats rather than theoretical attacks achieve significantly better security outcomes with less user frustration.
