Password Security and Multi-Factor Authentication

Create strong, unbreakable passwords, manage them without memorizing hundreds of them, and enable multi-factor authentication across every important account.

📘 Reading Lesson

Lesson Notes

Read through the key concepts before you try the challenge.

Real-World Scenario

A front desk employee at a neighboring clinic used the same password — 'Clinic2023!' — for their work email, the EHR portal, and the insurance billing system. When the insurance company's portal was breached and their password was exposed in the breach data, attackers used it to log into the EHR system and access over 1,000 patient records. This lesson teaches you the specific habits that would have prevented that breach entirely.

What Makes a Password Strong?

Strong passwords are difficult for both humans and computers to guess. Understanding what attackers actually do helps you understand what makes a password resistant:

  • Length is the most important factor — a 16-character password is exponentially harder to crack than an 8-character password, regardless of complexity. Every additional character multiplies the possible combinations by the number of characters in the set. A 20-character password of random lowercase letters is more secure than an 8-character password with symbols. Current recommendations from NIST (the National Institute of Standards and Technology) prioritize length over mandatory complexity rules.
  • Avoid predictable patterns — attackers use dictionaries of common passwords and common substitution patterns (3 for E, @ for A, 0 for O). 'P@ssw0rd' is no more secure than 'Password' to a modern cracking tool that tests all common substitution variants. 'Tr0ub4dor&3' is famous for being highly memorable to the person who invented it but still vulnerable. 'correct-horse-battery-staple' (random common words strung together) is both more memorable and more secure.
  • Never reuse passwords across different accounts — if any one account is breached (as in the scenario above), attackers immediately try your exposed password against every other service using the same username or email. This attack is called credential stuffing and is automated — within minutes of a breach, attackers attempt your exposed credentials against hundreds of sites. A unique password for every account limits breach damage to one account.
  • Change passwords only when there is reason to — contrary to outdated guidance, changing passwords on an arbitrary schedule (every 90 days) without a specific reason leads staff to create predictable passwords (adding a number at the end each quarter: 'Password1,' 'Password2'). The current guidance is: use a strong, unique password and only change it when you know or suspect it has been compromised, or after a service you use reports a breach.

Password Managers

The only practical way to have a unique, strong password for every account is to use a password manager — software that generates, stores, and fills in passwords securely:

  • A password manager stores all your passwords in an encrypted vault protected by one strong master password — you only need to remember one very strong master password, and the password manager handles everything else. Popular options include Bitwarden (free, open source), 1Password (business-focused), and Dashlane. Your IT department may have a specific recommendation or requirement for which password manager to use for work accounts.
  • Password managers generate strong random passwords for new accounts — when you create a new account, click the password manager's generator to create a 20-character random password. You never need to see, type, or remember it — the manager fills it in automatically when you log in. This is the correct solution to the password reuse problem: unique, random passwords for every account, no memorization required.
  • Never store passwords in a browser if a password manager is available — browser-built-in password managers are convenient but less secure than dedicated password managers. On shared workstations, browser-stored passwords are accessible to anyone who uses the browser on that computer. Use a dedicated password manager instead.
  • The master password must be exceptional — since one master password protects all others, make it long (20+ characters), unique (not used anywhere else), and memorable only to you. A passphrase of four or more random words works well: 'purple-telescope-mountain-river-2025.' Write it on paper and store it in a physically secure location (not a sticky note on your monitor), or use a backup method provided by the password manager.

Multi-Factor Authentication (MFA)

MFA is the single most effective security measure available to an individual user — it means that even if an attacker obtains your password, they still cannot access your account without the second factor:

  • What counts as MFA: something you know (password) + something you have (phone with an authentication app or SMS code) + something you are (fingerprint or face). Any combination of two or more of these factors is MFA. The most common combination for work accounts is password + authentication app code.
  • Authentication apps (Microsoft Authenticator, Google Authenticator, Authy) generate a new 6-digit code every 30 seconds — when logging in, you enter your password and then the current code from the app. Even if an attacker has your password, they cannot log in without access to your physical phone. This is significantly more secure than SMS codes (which can be intercepted via SIM swapping attacks), though SMS MFA is far better than no MFA.
  • Enable MFA on every account that offers it — at minimum: your Microsoft 365 work account, any EHR or clinical system, any insurance portal, and any billing system. If a service does not offer MFA, be aware that it is more vulnerable and treat its password accordingly.
  • MFA fatigue attacks are real — attackers who have your password can flood you with MFA approval requests (push notifications from the authenticator app) hoping you accidentally approve one. If you receive unexpected MFA prompts you did not initiate — especially multiple in a row — deny them all, notify IT immediately, and change your password. You did not forget logging in; someone else is trying to.

Responsible Use

Never share passwords — not with colleagues, not with supervisors, not with IT support over the phone. If a colleague needs access to a system, request that IT grant them access through the proper account provisioning process. If someone claiming to be IT calls you and asks for your password to 'fix a problem,' hang up and call IT back using a number you know is real. Legitimate IT staff do not need your password to work on your account — they have administrative access through other means. Password sharing is a policy violation and a security incident at Lakeside Medical Associates.

AI Assist

💡 AI Task: Ask ChatGPT — 'Evaluate the strength of these passwords and explain why each is strong or weak: (1) Clinic2023! (2) correct-horse-battery-staple-23 (3) P@ssw0rd (4) XkP9#mQ2!vLr7$nB8 (5) my-dogs-name-is-biscuit-born-2019. Then recommend which password manager I should use for a healthcare organization and why.' Use the evaluation to audit your own current passwords.

Knowledge Check

You receive five consecutive Microsoft Authenticator push notifications asking you to approve a sign-in, but you are not logging into anything. What does this indicate and what should you do?

Challenge

Apply what you've learned in this lesson.

Conduct a password security audit and implement MFA on a key account.

  1. List 5 accounts you use regularly (work email, EHR, insurance portal, personal email, a social or professional account). For each, answer: Is the password unique? Is it 12+ characters? Is MFA enabled? Create a simple table. Do not record the actual passwords — just rate them Strong/Weak based on these criteria.
  2. Go to haveibeenpwned.com and check whether your personal email address appears in any known data breaches. Screenshot the results. If it appears in a breach, change the password for that email immediately.
  3. Enable MFA on your Microsoft 365 work account (if not already enabled): go to office.com > Account Settings > Security Info > Add method > Authenticator App. Follow the setup steps. Screenshot the Security Info page showing the Authenticator App listed as a method.
  4. Research one free password manager (Bitwarden is recommended). Install it or sign up for the web version. Generate a new random 20-character password using the generator tool. Screenshot the generated password (it will be replaced in a moment — screenshot just to confirm the tool works, then discard this test password).