I did a bit of research and I couldn't find a company that really provided a tool that did site password strength testing. While network penetration tools will test if a website is vulnerable to known attacks, they don't check password strength. There are some free individual password strength testers on the Internet, but the infosec pro in me wonders if they are legitimate strength testers or malware sites waiting for unsuspecting users to enter their passwords. As in most cases concerning security, the best enforcement of strong password generation is policy. By requiring passwords to meet minimum requirements and socializing the policy's rules to the general user population, password strength compliance will rise.
I find the following requirements useful. Passwords should:
- not be based on an English word,
- contain at least 3 lower-case letters,
- contain at least 3 upper-case letters,
- contain at least 2 decimal digits,
- be at least 8 characters in length, and
- be sufficiently random, meaning they are not common knowledge, such as a birth date, and do not follow a sequence of characters..
Of course, there are people who say that no password is strong enough, and there is some truth to this. Password authentication services are a weak solution without good on-boarding/off-boarding procedures, password retry rules, password expiration, and an understanding of the risks around sensitive information. And no matter how complicated a password is, it will never measure up to the security of multifactor authentication, which typically supplements a password with a second form of authentication like a smart card (something you have) or a thumbprint reader (something you are).
For more information:
- Check out these password management strategies to prevent password cracking in this expert response.
- Is it illegal to ask a fellow employee for his or her password? Read more.
Dig Deeper on Password management and policy
Related Q&A from Randall Gamby
Enterprise SSO products have matured over the years, so what's the state of eSSO today? Expert Randall Gamby discusses. Continue Reading
Enterprises need a full understanding of the FIDO authentication framework before switching to its technology. Expert Randall Gamby looks at the most... Continue Reading
A self-managed HSM appliance may be the safer external key management system to use with your organization's encryption keys. Here's why. Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.