I did a bit of research and I couldn't find a company that really provided a tool that did site password strength...
testing. While network penetration tools will test if a website is vulnerable to known attacks, they don't check password strength. There are some free individual password strength testers on the Internet, but the infosec pro in me wonders if they are legitimate strength testers or malware sites waiting for unsuspecting users to enter their passwords. As in most cases concerning security, the best enforcement of strong password generation is policy. By requiring passwords to meet minimum requirements and socializing the policy's rules to the general user population, password strength compliance will rise.
I find the following requirements useful. Passwords should:
- not be based on an English word,
- contain at least 3 lower-case letters,
- contain at least 3 upper-case letters,
- contain at least 2 decimal digits,
- be at least 8 characters in length, and
- be sufficiently random, meaning they are not common knowledge, such as a birth date, and do not follow a sequence of characters..
Of course, there are people who say that no password is strong enough, and there is some truth to this. Password authentication services are a weak solution without good on-boarding/off-boarding procedures, password retry rules, password expiration, and an understanding of the risks around sensitive information. And no matter how complicated a password is, it will never measure up to the security of multifactor authentication, which typically supplements a password with a second form of authentication like a smart card (something you have) or a thumbprint reader (something you are).
For more information:
- Check out these password management strategies to prevent password cracking in this expert response.
- Is it illegal to ask a fellow employee for his or her password? Read more.
Related Q&A from Randall Gamby
Simple photography cracking biometric systems highlights the need for two-factor authentication in enterprises according to expert Randall Gamby.continue reading
Bimodal IAM may be a new term, but this new way to use user credentials should probably already be in practice among secure organizations.continue reading
Reviewing credential dumps could potentially save identity information from being stolen and used in a data breach. Expert Randall Gamby explains why...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.