Skip to main content
Security Guide

How to Audit Your Passwords: Find and Fix Your Worst Security Risks (2026)

Step-by-step guide to auditing all your passwords. Find reused, weak, and breached credentials using your password manager's built-in tools.

Sarah Chen — Lead Security Editor
Sarah Chen·CISSPCompTIA Security+·Lead Security Editor
Updated
Sarah Chen — Lead Security Editor
Sarah ChenCISSPCompTIA Security+

Lead Security Editor · San Francisco, CA

Updated Editorial policy
Editor's picks

Our Recommended VPNs

Chosen after real-world testing across speed, privacy, and streaming. Each ranking is independent — we buy every VPN at retail and test it ourselves.

EDITOR'S PICK
NordVPN logo
Best Overall
NordVPN
4.8/ 5

Fastest speeds, audited no-logs, 6000+ servers

Audited no-logs policyThreat Protection blocks malware10 devices per account30-day money-back guarantee
Save 74%
was $12.99/mo
$3.39/mo
Get NordVPN
30-day money-back guarantee
Read full NordVPN review
Surfshark logo
Best for Unlimited Devices
Surfshark
4.6/ 5

Unlimited devices, CleanWeb blocker, 100+ countries

Unlimited simultaneous devicesCleanWeb ad & malware blockerRAM-only server network30-day money-back guarantee
Save 87%
was $15.45/mo
$1.99/mo
Get Surfshark
30-day money-back guarantee
Read full Surfshark review
Proton VPN logo
Best for Privacy
Proton VPN
4.5/ 5

Swiss privacy laws, open-source, free tier

Swiss jurisdiction (no data laws)Open-source and auditedSecure Core multi-hopFree tier available forever
50% off
was $9.99/mo
$4.99/mo
Get Proton VPN
30-day money-back guarantee
Read full Proton VPN review
FastestVPN logo
Best Budget
FastestVPN
4.2/ 5

Lifetime plans, 10 devices, ad blocker

Lifetime deal available10 devices per accountBuilt-in ad blockerNo-logs policy
Save 89%
was $10/mo
$1.11/mo
Get FastestVPN
30-day money-back guarantee
Read full FastestVPN review

We earn a commission when you click “Get” buttons, at no extra cost to you. Read our affiliate disclosure

2 min read

Why Audit Your Passwords

The average person has 100+ online accounts. Over the years, you've likely accumulated weak passwords, reused the same password across multiple sites, and been caught in data breaches without knowing it.

A password audit identifies your weakest credentials so you can fix them before attackers exploit them.

Step 1: Use Your Password Manager's Health Tool

Every major password manager has a built-in audit feature:

  • Bitwarden: Reports > Vault Health Reports (exposed passwords, reused, weak)
  • 1Password: Watchtower (compromised, weak, reused, 2FA eligible)
  • Dashlane: Password Health (score out of 100, categorized issues)
  • Proton Pass: Pass Monitor (dark web alerts, weak password detection)

Run this report now. It takes 30 seconds and shows you exactly where your risks are.

Step 2: Check Have I Been Pwned

Visit haveibeenpwned.com and enter each of your email addresses. This free service checks your email against every known data breach. You'll likely find breaches you didn't know about.

For each breach found:

  1. Change the password on that service immediately
  2. If you reused that password elsewhere, change it on those sites too
  3. Enable 2FA on the breached account

Step 3: Fix the Worst Offenders First

Prioritize in this order:

  1. Breached passwords — These are in the hands of attackers. Change immediately
  2. Reused passwords — One breach exposes all accounts sharing that password
  3. Weak passwords — Short, simple, or dictionary-word passwords
  4. Accounts without 2FA — Even strong passwords can be phished

Step 4: Generate New Passwords

For each password you replace:

  1. Use your password manager's generator
  2. Set length to 20+ characters
  3. Include uppercase, lowercase, numbers, and symbols
  4. Let the password manager auto-save the new credential
  5. Never try to memorize generated passwords — that's the manager's job

Step 5: Enable 2FA on Everything

While you're auditing, enable 2FA on every account that supports it. Your password manager may show which accounts offer 2FA but don't have it enabled.

Step 6: Delete Unused Accounts

Old, forgotten accounts are liabilities. If you haven't used a service in over a year:

  1. Log in one last time
  2. Delete or deactivate the account
  3. Remove it from your password manager

Services like justdelete.me provide direct links to account deletion pages for hundreds of services.

Make It a Habit

Set a quarterly calendar reminder to:

  • Run your password manager's health report
  • Check haveibeenpwned.com for new breaches
  • Replace any flagged passwords
  • Review and remove unused accounts

How We Verified

Audit workflows tested with Bitwarden, 1Password, and Dashlane current versions. Have I Been Pwned verified as accurate against known breach databases. Recommendations based on NIST SP 800-63B. April 2026.

Found this helpful?

Share it with someone who needs it

Continue learning

Related Guides

Was this guide helpful?

Sources & Citations

  1. 1Have I Been Pwned — haveibeenpwned.com
  2. 2NIST SP 800-63B: Digital Identity Guidelines