I did a bit of research and I couldn't find a company that really provided a tool that did site password strength testing. While network penetration tools will test if a website is vulnerable to known attacks, they don't check password strength. There are some free individual password strength testers on the Internet, but the infosec pro in me wonders if they are legitimate strength testers or malware sites waiting for unsuspecting...
users to enter their passwords. As in most cases concerning security, the best enforcement of strong password generation is policy. By requiring passwords to meet minimum requirements and socializing the policy's rules to the general user population, password strength compliance will rise.
I find the following requirements useful. Passwords should:
- not be based on an English word,
- contain at least 3 lower-case letters,
- contain at least 3 upper-case letters,
- contain at least 2 decimal digits,
- be at least 8 characters in length, and
- be sufficiently random, meaning they are not common knowledge, such as a birth date, and do not follow a sequence of characters..
Of course, there are people who say that no password is strong enough, and there is some truth to this. Password authentication services are a weak solution without good on-boarding/off-boarding procedures, password retry rules, password expiration, and an understanding of the risks around sensitive information. And no matter how complicated a password is, it will never measure up to the security of multifactor authentication, which typically supplements a password with a second form of authentication like a smart card (something you have) or a thumbprint reader (something you are).
For more information:
- Check out these password management strategies to prevent password cracking in this expert response.
- Is it illegal to ask a fellow employee for his or her password? Read more.
Dig Deeper on Password Management and Policy
Related Q&A from Randall Gamby, Contributor
Is your remote desktop access software really secure? Randall Gamby offers advice for conducting a remote access audit to validate security.continue reading
Expert Randall Gamby discusses risk-based authentication, and whether that type of user identification system is right for the enterprise.continue reading
Expert Randall Gamby discusses various types of single sign-on, specifically the approaches of Ping Identity's SSO and Symplified SSO.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.