How Secure Is My Password?

The #1 Password Strength Tool. Trusted and used by millions.



Entries are 100% secure and not stored in any way or shared with anyone. Period.
As Seen On
As seen on a wide variety of popular publications such as The New York Times and Nerdwallet

Data breaches and identity theft are on the rise, and the cause is often compromised passwords. After stealing credentials, cybercriminals can use passwords to start disinformation campaigns against companies, use people’s payment information for purchases, and spy on users through WiFi-connected security cameras. We built this tool to help you better understand password security.

Pro Tip: We recently rolled out a new password generator tool that will help you create super secure passwords in a snap! 

How To Create Secure Passwords

The best practices for creating secure passwords are:

Why Is Password Security Important?

Not having secure passwords has its consequences, which include but are not limited to:

The Impact of Stolen Passwords

Compromised passwords caused 80 percent of all data breaches in 20192, resulting in financial losses for both businesses and consumers.

Impact on Businesses

Top Data Compromised Percent of Manufacturers With Data Breaches in 2020
Credentials 55%
Personal 49%
Payment 20%
Other 25%

Impact on Consumers

Customers’ PII-related data is the most valuable data type that hackers can extract from security breaches, costing $150 per record according to IBM’s 2020 Cost of Data Breach Report.

The FTC reports that in 2019, total losses from identity theft, which can be caused by stolen passwords, totaled $92 million. The median loss from identity theft for consumers was $8946.

Other Ways To Protect Yourself Online

Aside from creating secure and unique passwords for all web accounts, there are other best practices to increase one’s digital security.

  1. Use a VPN: While passwords keep unauthorized users out of accounts, Internet Service Providers can still track a user’s online activity as well as their devices’ private IP addresses. The only way to hide web activity and IP addresses is to connect not directly to a public Wi-Fi network, but instead to a VPN, which stands for Virtual Private Network. Learn more about finding the best VPN, all tested by our digital security experts.
  2. Get identity theft protection: While a strong password can go a long way in protecting online accounts, there’s no single action that can protect a user’s personally identifiable information from identity theft. Rather, top identity theft protection software monitors key criminal and financial areas for users’ personal information.
  3. Install a home security system: Users can protect their homes and families by using the best home security system. See how we tested these top systems by reading our ADT Review, our SimpliSafe Review and finally our Vivint Review.
  4. Use antivirus software: Antivirus software scans computers, phones, and tablets for malware, viruses, ransomware, spyware, and other cyber threats.
  5. Use a password manager: Password managers store users’ usernames and passwords in encrypted vaults, requiring only master passwords or biometrics to log into accounts.
  6. Only change passwords when needed: It’s a myth that users should change their passwords in regular intervals. Rather, it’s only necessary to change passwords if the account itself is compromised, according to recent reports.

How Our Tool Works: Methodology

Our “how secure is your password” tool above checks users’ passwords against a database of common weak passwords. It evaluates each password based on key factors such as:

Using these factors, the tool scores each password and converts this score into the amount of time it would take a computer to crack this password. For example, the password “f0JB^B5sjmXl” would take a computer 34,000 years to crack.

Frequently Asked Questions

For more information on password security and hygiene, we’ve answered the questions we get the most often.

Citations
  1. Big Commerce. (2020). Ecommerce Data Breaches. bigcommerce.com/blog/data-breaches/

  2. ID Agent. (2020). Ecommerce Data Breaches. idagent.com/blog/10-password-security-statistics-that-you-need-to-see-now/

  3. IBM. (2020). Ecommerce Data Breaches. ibm.com/security/data-breach

  4. Verizon Enterprise. (2020). 2020 Data Breach Investigations Report. enterprise.verizon.com/resources/reports/2020-data-breach-investigations-report.pdf

  5. UNC | Kenan-Flager. (2015). Risky business: The impact of data breaches.

  6. FTC. (2020). Consumer Sentinel Network. ftc.gov/system/files/documents/reports/consumer-sentinel-network-data-book-2019/consumer_sentinel_network_data_book_2019.pdf