Blog Home > IT Security > Brute Force Attack Prevention | Know Your Enemy
Password Management

Brute Force Attack Prevention | Know Your Enemy


Password Management

From the north, an ominous and frigid wind howls fiercely down across the ramparts. Each snow flake hurtles through the air chaotically creating the sensation of tiny stabbing daggers striking your wind burned face. The dull drone of throat gurgled snarling and rhythmic scratching rises up from war ravaged landscape below. The stench of putrid rotting flesh fills your winter stung nostrils to the point of utter revulsion.

Many would have cowered in fear or flee at the horrific sight below, but not you.

Oh no! You are the one to bravely charge headlong into the mutilated fray, ferociously cutting down your enemy with swift and surgical precision. You are the protector. You are the Alpha and Omega. For you demand your enemy to bend to your will, and when the dust settles and the smoke clears, there will only be one.

You, IT Hero.

You have seen many foes on the field of battle, each more deceptive and malicious than the last. If it were not for you, IT Hero, your Kingdom would be a smoldering mass of ruins devoured by the plague of undead. Your end users, lost souls in a sea of pestilence and despair, marching along like mindless Lemmings ripe for the picking.

It pains my heart, IT Hero, to see one labor so hard for so little glory. The life of a Guardian is a thankless occupation, riddled with countless trials and tribulations, but it must be done.

The sheer number of adversaries you have encountered is immeasurable. In the ever changing world of IT, you never know what is lurking just over the horizon. That is why you have implemented certain steps, such as brute force attack prevention, to secure your kingdoms future.

As you peer off into the distance, beyond the raging fires and past billowing columns smoke, your eyes fall upon a nasty adversary of sheer brute strength and a familiar, calculated patience. Although its tactics are simple, it’s hardened resolve makes this foe extremely dangerous to users with weak passwords.

Your gaze stays locked onto this lumbering mass of muscle and armor. It raises its heavy war ax high into the wintery sky and bellows out a blood curdling battle cry. In that moment, everyone knows that the mighty Ogre known as Brute Force Attacks has just entered the battlefield.

Your brute force attack prevention has prepared you for this moment.  Heedless to your efforts, the beast advances. Charging forward with great speed, this unstoppable force methodically bashes its head against your end users logins until it breaks through and uncovers the passwords of those to weak to heed your warnings. This relentless brute, preys upon the end user with weak password habits and wreaks havoc with a stolen password in an environment without the proper safeguards in place.

To slow down this hulking beast a Kingdom must enforce a strong yet flexible Password Management, enhancing your brute force attack prevention. To thwart this Ogre’s brute force attacks, one needs to instill a password policy solution that allows you to set complexity rules that enable you to weed out weak, commonly used passwords. You must limit the number of incorrect login attempts by enforcing a strike out count that locks a user’s account. If that still does not keep the raging menace out, implement a frequent password expiration policy to set the Brute Force’s attacks back to square one.

Now all of these tactics sound quite effective for snaring a Brute Force Attack, but what of the end user convenience? They will indeed be secure but still need to be productive with as little impact as possible from your brute force attack prevention methods. That is why one must empower their end users towards better password management, so they can quickly jump back into the fray. By giving your end users the tools to be self-reliant, you will be able to enforce a more stringent password policy and weather the relentless storm of attacks from the berserking Ogre know as Brute Force attacks.

For the last time, the horns of war sound and echo throughout the Kingdom walls, reverberating endlessly until it gradually fades into the rising sound of clashing steel. You grab your trusty shield and sword, lower the visor on your helm, take a deep breath, . . . and charge heroically into battle. Just like you have done countless times before.

password management Tech Brief


Please follow and like us:
Jason Garfagna

Author: Jason Garfagna

Jason is a Project Manager at PistolStar, Inc. in Bedford, NH. He received a degree in Marketing from Mt. Washington College and spent over eight years as a manager of sales in the customer service industry. His current position has him focusing on providing authentication solutions to companies worldwide.


  1. Incredіblе points. Outstanding arguments. Keeep up the
    good work.

  2. That is a good tip particularly to those fresh to the
    blogosphere. Simple but very precise info… Appreciate your sharing this one.
    A must read article!

  3. I just like the valuable info you provide in your articles.
    I will bookmark your weblog and check once more here regularly.
    I am moderately certain I will be told lots of new stuff proper here!

    Best of luck for the following!

Leave a Reply

Required fields are marked *.

Main menu