RESOURCES

Password strength checker

How secure is your password?

Does your password rely on common phrases, sequential numbers, or important dates? If so, your credentials may be easier to crack than you think!

With each passing day, cybercriminals are finding more effective methods to steal and decode the private credentials of employees and consumers. Often, the last line of defense against these attacks is a strong password. Yet, how can you be sure that your password is secure enough to prevent a breach?

To help users understand just how secure their password truly is, D2|Cybersecurity created the Password Strength Checker. The Password Strength Checker is a complimentary tool which allows users to submit any string of text as a potential password and see how long it would take to crack. The Password Strength Checker also supplies a series of suggestions that may improve the security rating of the password, such as including numbers or symbols.

How the Password Strength Checker works:
  • Fill out the form on this page.
  • You will be redirected to the Password Strength Checker page.
  • Enter any string of characters into the text box.
  • Click “Submit”.
  • The Password Strength Checker instantly provides your results!

What are some common password attacks?

  • Brute Force Attack: An attempt to guess a password by trying every possible combination of letters, numbers, and symbols.  
  • Dictionary Attack: The process of trying to guess a user’s private login credentials by retrying each item on a list of previously hacked user names and passwords.

A strong password is...

At least 12 characters long

Comprised of letters, numbers, & symbols

Easy to remember

Only used for one website/service​​

Maintained by a password manager

Broken up with words and symbols

E.g. “Lo0oKdo)wn"

A weak password is...

Less than 12 characters

A common phrase or saying

An important name or date

This is a major social engineering risk

Created through common character substitutions

E.g. “Hello, World” = “H3110_W0R1D”

Dependent on sequential numbers

E.g. “Test1234”, “Red0987”

Already being used for another website/service

One that has appeared in data breaches

Uses substitutions for letters, numbers, or symbols

E.g. “down should not be d0wn”

For Greater Security…

Avoid using a common password

Use a short sentence comprised of random uncommon words

E.g. “correct horse battery staple"

Use a password generator

stay up to date
MORE FROM D2

Stay up-to-date on the latest security threats