• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Logo of Agilient Security Consultants, Australia

Agilient Security Consultants Australia

The Best Security Consultants

Menu
  • Industries
      • Aviation and Airport Security Consultants Australia
      • Defence Industry Security Consulting
      • Government Security Consulting
      • Healthcare & Hospitals Security Consulting
      • Corrections and Detention
      • Maritime Security Consultant
      • Aged Care Facilities
      • Mining, Oil & Gas
      • Public Venues & Events
      • Rail
      • School and Education Security Consultant
      • Telecommunications Security Consultant
      • Utilities
      • Places of Faith and Worship
    • advice-colleagues-communication-newIndustries
  • Services
      • Cybersecurity Consultants
      • Protective Security
      • Business Resilience
      • Building Security Consultants
      • Security Audits
      • Cyber Audits
      • Data
      • Azure
      • Electronic Security
      • IT Disaster Recovery Planning
      • Business Continuity Consultants
      • Identity Theft Consultant​
      • Security Consultants
      • Security Camera and CCTV Consultant
      • Duress Alarms
      • Awareness Training
      • Penetration Testing
      • Security Risk Assessment Consultants
      • Managed Security Service Provider
      • Protection against Vehicles as a Weapon
    • training-1Services
  • Locations
    • Security Consultant Melbourne
    • Security Consultant Sydney
    • Security Consultant Brisbane
    • Security Consultant Adelaide
    • Security Consultant Canberra
    • Security Consultant Perth
  • Resources
    • menumanagers-dealing-customer-agreTraining
    • working-together-newJoin The Tribe
    • Webinars_3-1.jpgUpcoming and Past Events
    • hacking-detected-shutterstock_newResources
  • Articles
  • About
    • About Us
      We are an Australian owned and operated security company specialising in risk, cybersecurity, protective security, crisis and business continuity management services.
    • frequently-asked-questions-smallFAQ’s
    • bg-menu-government-institutionsConsultant Registration
  • Contact Us
Contact Us

Pwned Passwords and Password Security

You are here: Home / General / Pwned Passwords and Password Security

2020 is an exceptional year in human history, as humanity is forced to follow a stern framework for socializing within their own communities. We now rely more than ever on virtual connections in order to continue working within our jobs. As businesses shift to remote working models, securing the new remote virtual environment, including passwords, is a critical task.

The smallest of things can be overlooked when it comes to securing business processes and operations. One might even overlook the vulnerabilities of passwords, the irony being that they were originally designed to protect systems forom unwanted access. When users re-use old passwords or patterns, the risk is higher that they will be pwned from other platforms.

How to increase password security

There are several tools that can be used to secure passwords. The first tool is the “Have I been Pwned ” API. This website was designed and developed by Troy Hunt, who created the site for people to check if their passwords were among the data leaked from data breaches from all over the world. The API provides the following features when integrated with an organization’s services:

  • Retrieving all breaches for an account;
  • Locating all breached sites in the system;
  • Reaching a single breached site; and
  • Getting all data classes.

Another tool that can be used is Azure AD Password Protection, which allows a system admin to block weak passwords and their variants, along with setting up parameters that fit the business environment. This allows only for passwords that fit the secure criteria when setting up.

While Azure ADPassword Protection might be an optimal solution for many users, it doesn’t fully address the vulnerabilities, because it lacks knowledge of breached passwords and has no end-user experience. However, password auditors can be used to help system admins scan their environment for blank, breached, identical or expiring passwords, as well as stale admin accounts.

Conclusion

Passwords still remain on the top list of vulnerabilities, and a risk factor that many businesses must address within their security plan and policies. Having the latest, advanced lock on a safe will mean nothing if the mechanics of the lock are broken.

To understand more about securing your systems and business, contact Agilient for professional cybersecurity consulting and implementation.

Author: Saeed Baayoun, Agilient Consultant

Tweet
Share

General

Looking for a security partner? Get in touch with Agilient.

Looking for practical and cost-effective security and risk solutions for your government department, agency or company? Speak with Australia’s leading senior security, risk and resilience experts.


Looking for a pandemic planning partner? Get in touch with Agilient.

Looking for practical and cost-effective risk management solutions for your government department, agency or company? Speak with Australia’s leading senior risk and emergency management experts.



Footer

Agilient is a proud member of

Ai Group Defence Council
Australian Industry & Defence Network
Australian Security Industry Association
Sydney Aerospace & Defence Interest Group

Company and Licensing Details:

ABN: 37 157 911 441
NSW Security Master Licence # 410783087
ACT Security Master Licence # 17502184
Vic Security Registration # 878-460-40S
Qld Security Firm Licence # 3834422

Join The Tribe

Sign up to receive our regular Agilient newsletter including the latest security, risk and resilience updates

Sign up now

Copyright © 2025 Agilient – Level 14, 275 Alfred St, North Sydney NSW 2060 Australia – 1300 341 692

Our Services

Security Consultant

Security Consultant Sydney

Security Consultant Melbourne

Security Consultant Canberra
Security Consultant Perth

Security Consultant Adelaide

Security Consultant Brisbane