Sign in to view more content

Create your free account or sign in to continue your search

Welcome back

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

New to LinkedIn? Join now

or

New to LinkedIn? Join now

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Skip to main content
LinkedIn
  • Top Content
  • People
  • Learning
  • Jobs
  • Games
Join now Sign in
Last updated on Apr 6, 2025
  1. All
  2. IT Services
  3. Information Security

Your users constantly forget their passwords. How can you enhance your security protocols?

How do you balance security and convenience? Share your strategies for enhancing password protocols.

Information Security Information Security

Information Security

+ Follow
Last updated on Apr 6, 2025
  1. All
  2. IT Services
  3. Information Security

Your users constantly forget their passwords. How can you enhance your security protocols?

How do you balance security and convenience? Share your strategies for enhancing password protocols.

Add your perspective
Help others by sharing more (125 characters min.)
35 answers
  • Contributor profile photo
    Contributor profile photo
    Nitin Maurya

    Cyber Security Specialist & SOAR Specialist (SME) @ BT Group | Cybersecurity Incident Response Automation Specialist | 10 Years in Securing Enterprises | Certified - PCSAE | Security+ | CEH

    • Report contribution

    Implement a multi-layered authentication and user-friendly security strategy: 1. Passwordless Authentication - Biometrics/FIDO2 Keys: Replace passwords with fingerprint/face recognition or hardware keys (e.g., YubiKey). 2. MFA - Eg. TOTP apps (Google Authenticator) 3. Account Recovery Improvements - Send temp access tokens that are time-limited tokens via email/SMS for recovery (instead of password resets). Also backup codes can be considered for recovery. 4. User Education & Alternatives - Self-Service Portal: Let users reset passwords via verified MFA methods without IT helpdesk. 5. Advanced Options - SSO Integration: Reduce password fatigue via centralized logins (Okta, Azure AD). Password Managers like Keepass can also be used.

    Like
    5
  • Contributor profile photo
    Contributor profile photo
    Akhil S Nath

    Cybersecurity& Operations Leader| Threat Detection & Response | Cloud Security | Zero trust Advocate

    • Report contribution

    Passwords are often forgotten by users, making them a weak security method as resets can be exploited. The problem is likened to gym members forgetting their access cards, slowing down entry and risking unauthorized access. Solutions include multi-factor authentication (MFA), passwordless logins using biometrics or magic links, single sign-on for multiple services, educating users on password managers, and enhancing recovery protocols with identity verification and time locks. By adding layers like MFA or biometrics, security remains strong even if passwords are forgotten..

    Like
    5
  • Contributor profile photo
    Contributor profile photo
    Adarsh Gupta

    Senior Business Analyst | Product Owner | Data Analyst | QA Analyst | Software Engineer | Ex-IBMer | Certified SAFe® 5 Practitioner

    • Report contribution

    This is a common issue, and rather than relying on repetitive manual resets, I’d prefer a structured, secure, and user-friendly approach: 1. Azure Key Vault, which helps manage credentials securely — and passwords are auto-rotated every 10 days. This significantly reduces the risk of exposure. 2. Enable Self-Service Password Reset (SSPR) with multi-factor authentication (MFA), so users can reset their passwords securely without needing IT intervention. 3. Implement Single Sign-On (SSO) across systems to reduce password fatigue and improve access control. 4. Keep MFA mandatory across critical systems to ensure strong verification, even if passwords are compromised.

    Like
    3
  • Contributor profile photo
    Contributor profile photo
    Luis Valente ™

    Information Security & Cyber-Intelligence for Law Firms | Privacy • Compliance • Risk Management | Protect Your Clients' Data & Preserve Your Reputation

    • Report contribution

    First, implement multi-factor authentication (MFA). It's a game-changer that adds an extra layer of protection beyond passwords. Consider passwordless options like biometrics or security keys. They're user-friendly and highly secure. Educate users on creating strong, memorable passphrases instead of complex passwords. Think "ILovePizzaWithExtraCheese!" rather than "P@ssw0rd123". Use a password manager to generate and store unique passwords for each account. Implement adaptive authentication, which analyzes user behavior to detect anomalies. Security should enable, not hinder. The key is finding the sweet spot between protection and usability.

    Like
    3
  • Contributor profile photo
    Contributor profile photo
    Alexia Wong

    Tuition teacher. Earned Community Top Voice Badge in Teaching in '23 and Community Top Voice Badge in Cybersecurity in '24.

    • Report contribution

    To enhance your security protocols, you need to first make sure that you implement multi-factor authentication. This is so that you would know that only authorized users have access. You could also use biometrics such as facial recognition or fingerprint as part of your security protocols. This is so that users wouldn't have to face the problem of forgetting their passwords. You could also implement single sign-on. This is so that users wouldn't need to remember so many different passwords.

    Like
    2
View more answers
Information Security Information Security

Information Security

+ Follow

Rate this article

We created this article with the help of AI. What do you think of it?
It’s great It’s not so great

Thanks for your feedback

Your feedback is private. Like or react to bring the conversation to your network.

Tell us more

Report this article

More articles on Information Security

No more previous content
  • Facing a data breach incident in Information Security. How do you prioritize stakeholder needs effectively?

    41 contributions

  • Your team is divided on handling a security breach. How will you navigate conflicting opinions effectively?

    37 contributions

  • You've discovered a security breach during an audit. How do you address it without neglecting other tasks?

    69 contributions

  • You're facing a security incident. How do you decide which operational impacts to address first?

    54 contributions

  • Non-technical stakeholders downplay the risk of a cyber attack. Are you prepared to handle the consequences?

    47 contributions

  • You're focused on security and business success. How can you balance both effectively?

    92 contributions

  • You need to explain security risks to non-technical colleagues. How can you make them understand?

    31 contributions

  • Security updates are disrupting your critical business processes. How do you keep operations smooth?

    37 contributions

  • Balancing user demands for customization and security needs, how do you find the perfect solution?

    46 contributions

  • Your employees are pushing back on new security measures. How can you effectively train them?

    31 contributions

  • Your team is hesitant about data protection measures. How can you overcome their resistance effectively?

    66 contributions

No more next content
See all

More relevant reading

  • Systems Management
    How can you ensure all stakeholders understand your system security policies?
  • Technological Innovation
    How can you test new technology for man-in-the-middle attacks?
  • Network Administration
    What are the most effective solutions for preventing buffer overflow attacks?
  • IT Security Operations
    What are some of the best practices for creating and sharing security indicators of compromise (IOCs)?

Explore Other Skills

  • IT Strategy
  • System Administration
  • Technical Support
  • Cybersecurity
  • IT Management
  • Software Project Management
  • IT Consulting
  • IT Operations
  • Data Management
  • Information Technology

Are you sure you want to delete your contribution?

Are you sure you want to delete your reply?

  • LinkedIn © 2025
  • About
  • Accessibility
  • User Agreement
  • Privacy Policy
  • Your California Privacy Choices
  • Cookie Policy
  • Copyright Policy
  • Brand Policy
  • Guest Controls
  • Community Guidelines
Like
3
35 Contributions