Skip to main content
Security Guide

How to Audit Your Passwords: Find and Fix Your Worst Security Risks (2026)

Step-by-step guide to auditing all your passwords. Find reused, weak, and breached credentials using your password manager's built-in tools.

Sarah Chen — Lead Security Editor
Sarah Chen·Lead Security Editor
Updated
2 min read

Why Audit Your Passwords

The average person has 100+ online accounts. Over the years, you've likely accumulated weak passwords, reused the same password across multiple sites, and been caught in data breaches without knowing it.

A password audit identifies your weakest credentials so you can fix them before attackers exploit them.

Step 1: Use Your Password Manager's Health Tool

Every major password manager has a built-in audit feature:

  • Bitwarden: Reports > Vault Health Reports (exposed passwords, reused, weak)
  • 1Password: Watchtower (compromised, weak, reused, 2FA eligible)
  • Dashlane: Password Health (score out of 100, categorized issues)
  • Proton Pass: Pass Monitor (dark web alerts, weak password detection)

Run this report now. It takes 30 seconds and shows you exactly where your risks are.

Step 2: Check Have I Been Pwned

Visit haveibeenpwned.com and enter each of your email addresses. This free service checks your email against every known data breach. You'll likely find breaches you didn't know about.

For each breach found:

  1. Change the password on that service immediately
  2. If you reused that password elsewhere, change it on those sites too
  3. Enable 2FA on the breached account

Step 3: Fix the Worst Offenders First

Prioritize in this order:

  1. Breached passwords — These are in the hands of attackers. Change immediately
  2. Reused passwords — One breach exposes all accounts sharing that password
  3. Weak passwords — Short, simple, or dictionary-word passwords
  4. Accounts without 2FA — Even strong passwords can be phished

Step 4: Generate New Passwords

For each password you replace:

  1. Use your password manager's generator
  2. Set length to 20+ characters
  3. Include uppercase, lowercase, numbers, and symbols
  4. Let the password manager auto-save the new credential
  5. Never try to memorize generated passwords — that's the manager's job

Step 5: Enable 2FA on Everything

While you're auditing, enable 2FA on every account that supports it. Your password manager may show which accounts offer 2FA but don't have it enabled.

Step 6: Delete Unused Accounts

Old, forgotten accounts are liabilities. If you haven't used a service in over a year:

  1. Log in one last time
  2. Delete or deactivate the account
  3. Remove it from your password manager

Services like justdelete.me provide direct links to account deletion pages for hundreds of services.

Make It a Habit

Set a quarterly calendar reminder to:

  • Run your password manager's health report
  • Check haveibeenpwned.com for new breaches
  • Replace any flagged passwords
  • Review and remove unused accounts

How We Verified

Audit workflows tested with Bitwarden, 1Password, and Dashlane current versions. Have I Been Pwned verified as accurate against known breach databases. Recommendations based on NIST SP 800-63B. April 2026.

Share:XLinkedInEmail

Related Guides

Was this guide helpful?

Advertisement

Ready to Get Protected?

Take the next step in securing your remote work setup.

Sources & Citations

  1. 1Have I Been Pwned — haveibeenpwned.com
  2. 2NIST SP 800-63B: Digital Identity Guidelines