How Common Security Questions Can Pose a High Risk | BeyondTrust (2024)

Every individual who has online accounts to access services or applications invariably has had to establish answers to security questions. We logon to a new bank account, social media service, or check out via our favorite online paid service, and we are required to enter initial responses to security questions. The purpose of these questions is to periodically re-affirm our identity, or to regain access if we forget our password, by providing our personal secret answers.

Here are examples of some common security questions:

  • In what city were you born?
  • What is the name of your favorite pet?
  • What is your mother's maiden name?
  • What high school did you attend?
  • What was the name of your elementary school?
  • What was the make of your first car?
  • What was your favorite food as a child?
  • Where did you meet your spouse?
  • What year was your father (or mother) born?

Why Are Common Security Questions a Problem?

The problem with common security questions (and with our answers) is they become a liability when the results are leaked online, such as through a data breach, or become public knowledge via outlets like social media. Why? Because many (in fact, thousands) of sites potentially use identical security questions. The variation from site-to-site is low, and questions for each user frequently, and inevitably, overlap across their many accounts. This standardization of security questions creates a substantial, but unnecessary, risk.

The threat of common security questions is comparable to reusing passwords. Security pros, and end users, should know they should never reuse a password across accounts. This is because, if one account is compromised, the password is no longer secret and is associated with your credentials/identity and could be used for future attacks against any account you own that has the same (or similar) usernames. When passwords are re-used across dozens of accounts, the compromise of just one account could potentially lead to the compromise of all the other un-related accounts and ultimately your identity.

How Do I Make My Security Questions Stronger?

While we do usually have control over the passwords we choose, as individuals, we do not have the power to change the security questions these websites and services require. However, we can answer these questions in creative ways to make our accounts more secure and eliminates the threat of multiple accounts being compromised. Here is some basic guidance on how make security questions stronger:

1. Choose Different Security Questions Across Sites: As much as is possible, do not select the same security questions across multiple sites. Keep your selections unique when the site allows you to pick your own questions. This will help limit the fallout and compromise of other accounts if the security question/answer is ever leaked. This is especially important for public figures whose history may be a part of public record or biographies posted on websites. For example, we all know the city our favorite musician or actor was born in, right?

2. Use Special Characters in Your Answers: Do not answer security questions in plain English (or your native language). That is what is expected, but it’s a security misstep. Treat your answers like passwords and introduce complexity in your response and its characters. For example, let’s say I was born in Little Rock, Arkansas. The security question for, “what city where you born in” would require the response, “Little Rock”. Now, add some password complexity. The new entry could therefore be, “L!ttl3 r0ck”. This answer is more difficult to guess or crack through automated tools and provides a simple layer of obfuscation to protect your security question responses. And, if anyone ever asks, you can honestly state your mother’s maiden name does have numbers and symbols in it. Doesn’t yours? I think you get the point—a little obfuscation can go along way to secure your answers.

3. Use Fictitious Information: In many instances, the best course of action is to provide fictitious information to these questions to keep them unique. You could use a personal password manager to populate the answer fields with password-like responses. Next, store each question and response in your password manager. For example, for an ecommerce site, you could create the entry “ecommercesite.com/question_birthcity” as the account and then enter a random, recommended password as the security response. This provides the secure storage you need in case of a password problem, while keeping your answers to same security question completely random and unique across sites and applications.

Why Mitigating the Use of Common Security Questions Is Important

Security questions were designed with the intent of strengthening identity validation for access to applications and websites, particularly in the case of a password issue or other fault. However, just as with password reuse, reusing security question and answer pairs across multiple sites has enabled threat actors to compromise many accounts associated with an identity. Typically, this requires a hacker to compromise a secondary application as well, like email or SMS texting, to pair a password reset with the knowledge of these security questions. Unfortunately, some websites and applications do not even go that far, and knowledge of a security question answer is sufficient to compromise the account, if the user provide the correct response

For IT and security professionals interested in a more rigorous and thorough examination of all the ways identities (corporate and personal) are at risk or under attack, and the best strategies for protecting them, check out: Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution, a book co-authored by Darran Rolls, former CTO at SailPoint, and I. You can also watch our joint webinar on-demand here: Deconstructing Identity as a Cyberattack Vector.

This blog has been updated since it was originally published on June 4, 2020.

How Common Security Questions Can Pose a High Risk | BeyondTrust (2024)

FAQs

How Common Security Questions Can Pose a High Risk | BeyondTrust? ›

The problem with common security questions (and with our answers) is they become a liability when the results are leaked online, such as through a data breach, or become public knowledge via outlets like social media. Why? Because many (in fact, thousands) of sites potentially use identical security questions.

What are common security questions? ›

Basic Types of Secure Questions

Family (What year was your grandmother born?); Preferences (What is your favorite sport?); First (What month was your first child born?); Personal characteristics (What is your skin color?);

Are security questions a security risk? ›

If the answers to your security questions are ever compromised, it can lead to widespread privacy violations. Identity theft: With access to something like your bank account, it wouldn't take much work for an attacker to impersonate you, open new accounts, or commit fraud with your stolen identity.

What is an example of a security question and answer? ›

A good security question should have a fixed answer, meaning that it won't change over time. A good example of a security question with a stable answer: “What is your oldest cousin's first name?” This example works because the answer never changes.

Are security questions still valid? ›

Answers can be hacked

While security questions are secure in theory, they do not always stand the test of real-life use. They can be hacked just like a password, for example.

How to answer the security questions? ›

Make answers to the security questions just as strong as your passwords. “Statistically, the longer a password — or answer to a security question — the more difficult it is for someone to guess,” as Jordan Holz, CIPP/US, advises in a post via International Association of Privacy Professionals (IAPP) website.

What are the 4 C's security? ›

The 4 C's security refers to a framework comprising four essential elements: Concealment, Control, Communication, and Continuity. These elements collectively contribute to fortifying security measures and safeguarding assets, premises, and individuals against potential threats and risks.

What makes a security risk? ›

Security risk is a type of risk that involves the potential for loss or damage to an organization's assets, data, and reputation due to malicious activities. It can be caused by external threats such as hackers, malware, viruses, or internal threats such as employee negligence or malicious intent.

What are the three types of security risks? ›

The main types of information security threats are: Malware attack. Social engineering attacks. Software supply chain attacks.

What is the most common security threat? ›

Malware Threats
  • Viruses and Worms. Viruses and worms are some of the oldest types of malware but remain highly effective due to their evolving mechanisms. ...
  • Ransomware. ...
  • Cryptojacking. ...
  • Fileless Malware. ...
  • Phishing Variants. ...
  • Baiting and Pretexting. ...
  • Business Email Compromise (BEC) ...
  • Distributed Denial of Service Attacks.

How do I create a strong security question? ›

What makes a good security question?
  1. Memorable. The answer to the question should immediately pop into your head, even if you're logging in two years after you first created the account. ...
  2. Unique. ...
  3. Consistent. ...
  4. Unpredictable.
Mar 14, 2023

What is security question hint? ›

A security question is just another form of a password mechanism. Therefore, a security question should not be shared with anyone else, or include any information readily available on social media websites, while remaining simple, memorable, difficult to guess, and constant over time.

What are the questions for security? ›

Top Security Guard Interview Questions
  • What Made You Choose a Security Guard Job?
  • Have You Previously Worked as a Security Guard? ...
  • How Do You Identify Potential Security Breaches or Threats?
  • How Do You Handle Potentially Dangerous Situations?
  • Do You Have Any Experience With Surveillance Equipment?

What are the benefits of security questions? ›

The security questions help verify your identity to prevent unauthorized access or changes to your financial, health benefits or personal information.

What are the best security questions? ›

Examples of good security questions
Effective Security QuestionRationale
What is your oldest sibling's middle name?Typically, this is something intimately known between siblings and difficult for others to research.
What was the first concert you attended?The answer isn't prone to change.
3 more rows
Mar 4, 2021

Are security questions a form of MFA? ›

When to Use Security Questions. Applications should generally use a password along with a second authentication factor (such as an OTP code) to authenticate users. The combination of a password and security questions does not constitute MFA, as both factors as the same (i.e. something you know)..

What are the 5 C's for security guard? ›

Change, Compliance, Cost, Continuity, and Coverage; these are all basic considerations for any organization.

What are the 5 security questions at airport? ›

8 Airport questions you need to be able to answer in English
  • Do you have an e-ticket or a paper ticket? ...
  • Are you checking in baggage or carrying on? ...
  • Would you like a window or aisle seat? ...
  • May I see your boarding pass? ...
  • Which gate should I board from? ...
  • Is my flight delayed or on-time? ...
  • Do you have anything to declare?

Top Articles
Crypto Recovery Services: Separating the Wheat from the Chaff
How Discord Makes Money - GeeksforGeeks
Canya 7 Drawer Dresser
My E Chart Elliot
Zabor Funeral Home Inc
1970 Chevrolet Chevelle SS - Skyway Classics
Erika Kullberg Wikipedia
Horoscopes and Astrology by Yasmin Boland - Yahoo Lifestyle
Acts 16 Nkjv
Melfme
Osrs But Damage
Bill Devane Obituary
Sotyktu Pronounce
Brenna Percy Reddit
Dallas’ 10 Best Dressed Women Turn Out for Crystal Charity Ball Event at Neiman Marcus
Bend Pets Craigslist
Troy Bilt Mower Carburetor Diagram
10-Day Weather Forecast for Santa Cruz, CA - The Weather Channel | weather.com
List of all the Castle's Secret Stars - Super Mario 64 Guide - IGN
Apply for a credit card
Swgoh Blind Characters
Td Small Business Banking Login
Schedule An Oil Change At Walmart
Blue Rain Lubbock
Vernon Dursley To Harry Potter Nyt Crossword
Utexas Iot Wifi
Labcorp.leavepro.com
4 Methods to Fix “Vortex Mods Cannot Be Deployed” Issue - MiniTool Partition Wizard
Garden Grove Classlink
Tinyzonehd
Vivification Harry Potter
My Reading Manga Gay
Our Leadership
Housing Intranet Unt
How To Make Infinity On Calculator
Best Restaurants In Blacksburg
Troy Gamefarm Prices
Jail View Sumter
Janaki Kalaganaledu Serial Today Episode Written Update
Umd Men's Basketball Duluth
Free Crossword Puzzles | BestCrosswords.com
Sofia Franklyn Leaks
Wordle Feb 27 Mashable
Patricia And Aaron Toro
Stitch And Angel Tattoo Black And White
Dragon Ball Super Card Game Announces Next Set: Realm Of The Gods
Devotion Showtimes Near Showplace Icon At Valley Fair
Premiumbukkake Tour
Enjoy Piggie Pie Crossword Clue
Dolce Luna Italian Restaurant & Pizzeria
Vrca File Converter
Latest Posts
Article information

Author: The Hon. Margery Christiansen

Last Updated:

Views: 5584

Rating: 5 / 5 (70 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: The Hon. Margery Christiansen

Birthday: 2000-07-07

Address: 5050 Breitenberg Knoll, New Robert, MI 45409

Phone: +2556892639372

Job: Investor Mining Engineer

Hobby: Sketching, Cosplaying, Glassblowing, Genealogy, Crocheting, Archery, Skateboarding

Introduction: My name is The Hon. Margery Christiansen, I am a bright, adorable, precious, inexpensive, gorgeous, comfortable, happy person who loves writing and wants to share my knowledge and understanding with you.