Password Audit
Audit and improve password security across all your accounts. Evaluates password practices, identifies vulnerabilities, and creates an actionable plan to upgrade your security posture systematically.
Usage
Describe your current password habits and concerns. The audit evaluates your practices against security best practices and creates a prioritized remediation plan. Never share actual passwords — describe your patterns instead.
Parameters
- Scope: Personal accounts, Business accounts, or Both
- Current state: No manager, Some manager usage, or Full manager adoption
- Priority: Quick wins, Comprehensive overhaul, or Ongoing maintenance
- Accounts: Approximate number of online accounts
Examples
- Full Personal Audit: Systematic review of password practices across email, banking, social media, and shopping accounts — prioritized by breach impact, with a 2-week migration plan to a password manager.
- Business Account Security: Audit shared team credentials for SaaS tools, identify accounts using personal emails, and create a policy for password rotation and access management.
- Post-Breach Response: Step-by-step response after receiving a breach notification — which passwords to change first, how to check for unauthorized access, and how to prevent cascading compromise.
- Password Manager Migration: Guide for moving from browser-saved passwords to a dedicated manager (1Password, Bitwarden) with export/import steps and family sharing setup.
Guidelines
- Password strength is evaluated using entropy calculations, not arbitrary rules
- Reuse detection focuses on the highest-risk pattern: email + bank sharing a password
- Accounts are prioritized by breach impact: email first, then financial, then social
- Password manager recommendations compare features, pricing, and platform support
- Passkey and FIDO2 adoption is recommended where supported
- Breach checking using Have I Been Pwned is explained with safety context
- Recovery codes and backup methods are included in the security audit
- Phishing resistance is addressed alongside password strength
- The audit creates a realistic timeline — not "change everything today"
- Enterprise SSO and federation recommendations reduce password sprawl