# Regular Password Resets Aren't as Safe as You Think
For decades, mandatory password resets have been considered a cybersecurity cornerstone. Organizations worldwide have enforced policies requiring employees to change passwords every 30, 60, or 90 days—a practice enshrined in compliance frameworks and security standards. Yet mounting evidence from security researchers, user behavior studies, and real-world breach data reveals a troubling truth: this widespread practice may actually *weaken* security rather than strengthen it.
## The Enduring Myth
The rationale behind forced password resets seems logical on the surface. If an attacker compromises a password, resetting it frequently should limit the window of exposure. If a user's credentials leak in a breach, regular changes provide a recovery mechanism. This reasoning made sense in an era of perimeter-based security and less sophisticated threat vectors.
However, the security landscape has evolved dramatically:
The practical effect? Mandatory password resets have become a security theater—appearing to enhance protection while delivering little tangible benefit.
## The User Behavior Problem
One of the most significant drawbacks of forced password resets is their impact on user behavior. When people are required to change passwords at arbitrary intervals—especially under time pressure or frustration—they take dangerous shortcuts.
Research from organizations like NIST and the National Cyber Security Centre (UK) has documented these patterns consistently:
| User Behavior | Security Impact |
|---------------|-----------------|
| Password variation is minimal (e.g., "Password1" → "Password2") | Attackers exploit predictable patterns |
| Passwords become shorter and simpler | Weaker entropy, easier to crack |
| Users reuse passwords across systems | Breach in one system compromises others |
| Credentials written down or stored unsecurely | Physical or digital exposure |
| Authentication friction increases | Users bypass protections or choose MFA alternatives poorly |
A study by Microsoft found that users forced to reset passwords frequently create predictable variations that can be cracked with minimal additional effort—essentially extending the window of vulnerability rather than closing it.
## What the Data Shows
The turning point came when security authorities began re-examining the data. In 2017, NIST released updated guidance (SP 800-63B) explicitly recommending *against* mandatory periodic password changes except when a breach is suspected. Instead, NIST emphasized:
The UK's National Cyber Security Centre followed suit, stating that "forcing password expiry is no longer considered good practice" and can actually reduce security.
## Real-World Breach Evidence
Analysis of major data breaches reveals the disconnect between password age and breach impact. In most cases:
Organizations that experienced breaches often implemented reactive password resets afterward—finding this far more effective than periodic forced changes would have been proactively.
## The Compliance Trap
Many organizations continue mandatory password resets not because they believe in their effectiveness, but because:
This creates a self-perpetuating cycle where outdated security theater persists because institutional inertia is stronger than evidence-based security.
## Modern Alternatives
Forward-thinking organizations have shifted to evidence-based approaches:
1. Passwordless Authentication
2. Multi-Factor Authentication
3. Risk-Based Access Controls
4. Breach Detection and Response
5. Security Awareness Training
## Implications for Organizations
The shift away from mandatory password resets has significant implications:
Organizations clinging to 90-day password reset requirements are not ahead of the security curve—they're behind it, implementing a practice that security researchers have largely discredited.
## Recommendations
For Security Leaders:
For Compliance and Audit:
For All Organizations:
## Conclusion
Mandatory password resets have persisted in corporate security policy long after their effectiveness expired. The evidence is clear: this practice doesn't meaningfully improve security and often makes it worse by encouraging weak password behaviors and authentication friction.
The future of account security lies not in forcing users to periodically reset weak passwords, but in eliminating passwords altogether through passwordless authentication, implementing strong multi-factor protections, and detecting actual compromises in real time.
Organizations that continue enforcing arbitrary password resets aren't being more secure—they're simply maintaining the illusion of security while introducing genuine friction that undermines user compliance with stronger protections. It's time for security practices to catch up with the research.